| CPC H04L 63/1433 (2013.01) [H04L 63/10 (2013.01); H04L 63/20 (2013.01)] | 15 Claims |

|
1. A method for active inspection of vulnerability exploitation in a cloud computing environment, comprising:
receiving at least one network path to access a first resource, wherein the first resource is a cloud object deployed in the cloud computing environment and the cloud object having a known vulnerability, wherein the first resource is potentially accessible from an external network which is external to the cloud computing environment;
actively inspecting the at least one network path to determine if the first resource is accessible through the at least one network path from the external network;
generating a trigger instruction, based on at least one predetermined triggering instruction, wherein each of the at least one predetermined triggering instruction is programmed to trigger the known vulnerability in the first resource and wherein the at least one predefined triggering instruction, when executed by the first resource, causes the first resource to generate a predetermined outcome; and
triggering the known vulnerability to determine if the first resource can be exploited with the known vulnerability, in response to determining that the first resource is accessible through the external network.
|