CPC G06F 21/6218 (2013.01) [G06F 9/45558 (2013.01); G06F 11/0772 (2013.01); G06F 11/301 (2013.01); G06F 21/31 (2013.01); G06F 2009/45562 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45591 (2013.01); G06F 2009/45595 (2013.01)] | 20 Claims |
11. A computer-implemented method for identifying vulnerabilities for virtualized execution instances, the method comprising:
identifying a virtualized execution instance, before instantiation of the virtualized execution instance, wherein the virtualized execution instance is configured for instantiation in a virtual computing environment;
performing, before instantiation of the virtualized execution instance, a privileged configuration inspection for the virtualized execution instance, performing the privileged configuration inspection comprising:
obtaining one or more configuration parameters for the virtualized execution instance;
determining, based on the obtained one or more configuration parameters, that the virtualized execution instance is permitted to perform operations on a virtualized host environment beyond an environment of the virtualized execution instance, the determination comprising at least one of:
identifying whether a rights flag is set for the virtualized execution instance,
identifying whether a permission is granted for the virtualized execution instance, or
identifying whether secrets or credentials are included in, or accessible to, the virtualized execution instance; and
determining, based on the determination that the virtualized execution instance is permitted to perform operations on the virtualized host environment beyond the environment of the virtualized execution instance, that the virtualized execution instance presents a privilege vulnerability at least in part by determining that a criterion is satisfied by:
a one of the one or more configuration parameters,
a combination of the one or more configuration parameters, or
a score determined using the one or more configuration parameters; and
providing, based on the privileged configuration inspection, a notification associated with the privilege vulnerability or the virtualized execution instance.
|