US 11,954,516 B1
Techniques for inspecting managed workloads deployed in a cloud computing environment
Niv Roit Ben David, Tel Aviv (IL); Yaniv Shaked, Tel Aviv (IL); Yarin Miran, Rishon Lezion (IL); Raaz Herzberg, Tel Aviv (IL); and Amir Lande Blau, Tel Aviv (IL)
Assigned to WIZ, INC., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Sep. 15, 2023, as Appl. No. 18/468,166.
Application 18/468,166 is a continuation of application No. 17/804,212, filed on May 26, 2022.
Int. Cl. G06F 21/57 (2013.01); G06F 9/455 (2018.01); H04L 9/40 (2022.01)
CPC G06F 9/45558 (2013.01) [G06F 21/577 (2013.01); H04L 63/00 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45595 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method for inspecting running containers in a cloud computing environment for cybersecurity threats, comprising:
discovering a container running in a cloud computing environment;
detecting an identifier of the running container, wherein the identifier includes an indicator to a repository in which an image of the container is stored, the repository further storing a plurality of images, wherein a second image of the plurality of images does not correspond to a container running in the cloud computing environment;
accessing the repository to pull the image;
inspecting the image of the running container for a cybersecurity threat;
inspecting the image of the running container for the cybersecurity threat when the container is running in the cloud computing environment; and
configuring an inspector to halt inspection of an image not corresponding to a container running in the cloud computing environment.