US 12,225,013 B2
Securing application behavior in serverless computing
Ory Segal, Tel Aviv (IL); Yuri Shapira, Holon (IL); Avraham Shulman, Tel Aviv (IL); Benny Nissimov, Givataim (IL); and Shaked Zin, Tel Aviv-Jaffa (IL)
Assigned to Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed by Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed on Jul. 17, 2023, as Appl. No. 18/353,238.
Application 18/353,238 is a continuation of application No. 17/807,812, filed on Jun. 20, 2022, granted, now 11,706,220.
Application 17/807,812 is a continuation of application No. 16/795,681, filed on Feb. 20, 2020, granted, now 11,425,127, issued on Aug. 23, 2022.
Claims priority of provisional application 62/807,773, filed on Feb. 20, 2019.
Prior Publication US 2023/0362168 A1, Nov. 9, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06N 5/04 (2023.01); G06N 20/00 (2019.01); H04L 9/32 (2006.01)
CPC H04L 63/10 (2013.01) [G06N 5/04 (2013.01); G06N 20/00 (2019.01); H04L 9/3247 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
determining components of a serverless application;
learning intended behavior of the serverless application, wherein learning intended behavior of the serverless application comprises determining a set of one or more usage flows among the components of the serverless application; and
creating a set of one or more security policies to restrict behavior of the serverless application to the intended behavior, wherein creating the set of one or more security policies is based, at least in part, on the set of one or more usage flows.