US 12,223,062 B1
Techniques for identifying gaps in security controls
Snir Havdala, Tel Aviv (IL); and Ben Seri, Ramat Gan (IL)
Assigned to Zafran Security LTD, Tel Aviv (IL)
Filed by Zafran Security LTD, Tel Aviv (IL)
Filed on Apr. 29, 2024, as Appl. No. 18/649,484.
Claims priority of provisional application 63/570,547, filed on Mar. 27, 2024.
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/034 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A method for identifying security control gaps, comprising:
integrating with a set of security controls deployed with respect to a computing environment, wherein integrating with the set of security controls further comprises deploying an artifact in the computing environment, wherein the artifact is configured to record a plurality of activities performed in the computing environment by the set of controls, wherein integrating with the set of security controls further comprises enforcing at least one policy requiring code releases in the computing environment to be signed using an instance of the artifact;
identifying at least one computing asset to be protected by the set of security controls;
identifying at least one security control gap in the computing environment based on a configuration of the set of security controls, wherein each security control gap is defined with respect to one of the identified at least one computing asset; and
performing at least one remediation action with respect to the identified at least one security control gap.