US 12,271,490 B1
Unified inspection techniques based on abstracted compute type
Yaniv Shaked, Tel Aviv (IL); Ami Luttwak, Binyamina (IL); Roy Reznik, Tel Aviv (IL); Yarin Miran, Rishon Lezion (IL); and Moran Cohen, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Sep. 18, 2023, as Appl. No. 18/469,151.
Application 18/469,151 is a continuation of application No. 17/804,923, filed on Jun. 1, 2022.
Claims priority of provisional application 63/196,384, filed on Jun. 3, 2021.
Int. Cl. G06F 21/57 (2013.01); G06F 8/61 (2018.01); G06F 9/455 (2018.01); G06F 9/50 (2006.01); G06F 21/60 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 8/63 (2013.01); G06F 9/45558 (2013.01); G06F 9/5077 (2013.01); G06F 21/602 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45595 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method for inspecting a cloud computing environment deployed on a cloud computing infrastructure for a cybersecurity threat, comprising:
detecting, by an inspection account configured to access a cloud computing environment, the cloud computing environment including a plurality of workloads, a first workload of the plurality of workloads, the first workload being a container that includes a plurality of software layers;
extracting data from each of at least a first layer and a second layer into a single inspection environment based on a predefined schema;
inspecting, by a first inspector, the extracted data of the first layer of-the first workload for a first cybersecurity object on a first layer of the plurality of software layers;
inspecting, by a second inspector, the extracted data of the second layer of the first workload for a second cybersecurity object on a second layer of the plurality of software layers; and
detecting a cybersecurity threat based on detecting the first cybersecurity object and the second cybersecurity object.