US 12,244,613 B2
Maintaining dependencies in a set of rules for security scanning in could-based web applications and API protection
Leslie Smith, San Jose, CA (US)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Feb. 18, 2022, as Appl. No. 17/674,917.
Application 17/674,917 is a continuation in part of application No. 17/367,760, filed on Jul. 6, 2021.
Prior Publication US 2023/0015603 A1, Jan. 19, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 63/1425 (2013.01); H04L 63/1458 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable medium comprising instructions that, when executed, cause one or more processors to perform steps of:
receiving a copy of a template file where the template file includes a plurality of rule tags and one or more dependency tags that define relationships and dependencies between any rules associated with the plurality of rule tags;
scanning the template file including, for each respective rule tag of the plurality of rule tags
checking if an enabled flag is set for the respective rule tag,
when the enable flag is set, looking up a respective rule in a rule database configured to enable an administrator to enable/disable rules based on the respective rule tag and replacing the respective rule tag with the respective rule text from the rule database, and
when the enable flag is not set, removing the respective rule tag from the template file;
providing an output file including a plurality of rules having the relationships and dependencies; and
utilizing the output file to provide a set of rules for performing security scanning via a cloud-based system.