| CPC H04L 9/0861 (2013.01) [H04L 63/1416 (2013.01)] | 23 Claims |

|
1. A method for reducing use of restricted operations in a computing environment during cybersecurity threat inspection, comprising:
detecting an encrypted disk in a computing environment, the encrypted disk utilizing a first key in a key management system (KMS) for decryption;
generating a second key for decryption in the KMS, the second key associated with an entity of an inspection environment;
generating a snapshot of the encrypted disk;
generating a volume based on the snapshot;
re-encrypting the volume with the second key;
generating an inspectable disk from the re-encrypted volume; and
initiating inspection for a cybersecurity object on the inspectable disk.
|