US 11,947,693 B2
Memory management in virtualized computing environments
Nimrod Stoler, Zoran (IL); and Lavi Lazarovitz, Petach-Tikva (IL)
Assigned to CyberArk Software Ltd., Petach-Tikva (IL)
Filed by CyberArk Software Ltd., Petach-Tikva (IL)
Filed on Nov. 17, 2020, as Appl. No. 16/950,003.
Application 16/950,003 is a continuation of application No. 16/837,625, filed on Apr. 1, 2020, granted, now 10,878,119.
Application 16/837,625 is a continuation in part of application No. 16/451,680, filed on Jun. 25, 2019, granted, now 10,735,430, issued on Aug. 4, 2020.
Application 16/451,680 is a continuation in part of application No. 16/390,542, filed on Apr. 22, 2019.
Prior Publication US 2021/0073405 A1, Mar. 11, 2021
Int. Cl. G06F 21/31 (2013.01); G06F 9/455 (2018.01); G06F 11/07 (2006.01); G06F 11/30 (2006.01); G06F 21/62 (2013.01)
CPC G06F 21/6218 (2013.01) [G06F 9/45558 (2013.01); G06F 11/0772 (2013.01); G06F 11/301 (2013.01); G06F 21/31 (2013.01); G06F 2009/45562 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45591 (2013.01); G06F 2009/45595 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for applying access restrictions to sensitive memory resources while virtualized execution instances access prohibited data elements, the operations comprising:
identifying a virtualized execution instance configured for execution in a virtual computing environment;
identifying an indication of access to a prohibited data element by the virtualized execution instance;
identifying a memory resource accessible to the virtualized execution instance during execution of the virtualized execution instance; and
applying, in response to a determination that the virtualized execution instance has access to the prohibited data element, the determination being based on the prohibited data element being provisioned to the virtualized execution instance, access restrictions to at least one of the memory resource, the prohibited data element, or the virtualized execution instance;
wherein the access restrictions limit access to the at least one of the memory resource, the prohibited data element, or the virtualized execution instance by at least one of non-privileged processes or processes external to the virtualized execution instance.