| CPC H04L 9/0822 (2013.01) [H04L 9/0861 (2013.01); H04L 9/0891 (2013.01); H04L 63/1416 (2013.01)] | 19 Claims |

|
1. A method for inspecting encrypted disks using a default key for detecting a cybersecurity object, comprising:
detecting a first encrypted disk on a workload in a cloud computing environment, the first encrypted disk having an address in a cloud storage system;
generating a key for an inspector account that is distinct from any information of any account of any of one or more users that have access to the first encrypted disk;
generating a second encrypted disk with a reencrypt command utilizing the generated key for the inspector account such that the second encrypted disk is a clone of the first encrypted disk, the second encrypted disk including a cloned disk descriptor having a data field including an address of the first encrypted disk, and wherein the second encrypted disk becomes available for inspection substantially immediately upon creation and is not accessible at any time by any of the one or more users that have access to the first encrypted disk;
inspecting the second encrypted disk for a cybersecurity threat, wherein the first encrypted disk remains accessible to the one or more users that have access to the first encrypted disk while the inspecting is performed; and
releasing a resource allocated to the second encrypted disk in response to completing the inspection.
|