US 12,278,729 B2
Systems, methods, and media for monitoring cloud configuration settings
Sekhar Sarukkai, Cupertino, CA (US); Prasad Raghavendra Somasamudram, Bangalore (IN); and Syed Ummar Farooqh, Bangalore (IN)
Assigned to Skyhigh Security LLC, Plano, TX (US)
Filed by Skyhigh Security LLC, Plano, TX (US)
Filed on Mar. 1, 2021, as Appl. No. 17/188,243.
Claims priority of application No. 202011031723 (IN), filed on Jul. 24, 2020.
Prior Publication US 2022/0029882 A1, Jan. 27, 2022
Int. Cl. H04L 12/24 (2006.01); H04L 41/08 (2022.01); H04L 41/0816 (2022.01); H04L 41/0866 (2022.01); H04L 41/0893 (2022.01)
CPC H04L 41/0866 (2013.01) [H04L 41/0816 (2013.01); H04L 41/0886 (2013.01); H04L 41/0893 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method comprising:
receiving configuration settings from a cloud service resource using an application programming interface;
determining a resource risk score, a first tactic risk score, a first plurality of technique risk scores, a second tactic risk score, and a second plurality of technique risk scores, wherein the resource risk score is based on the first tactic risk score and the second tactic risk score, wherein the first tactic risk score is based on the first plurality of technique risk scores, wherein the second tactic risk score is based on the second plurality of technique risk scores, wherein each of the first plurality of technique risk scores is based on a corresponding subset of a set of policy scores, wherein each of the second plurality of technique risk scores is based on a corresponding subset of the set of policy scores, and wherein each of the set of policy scores is based on compliance of the configuration settings with a corresponding setting; and
selecting a first tactic based on the first tactic risk score being worse than the second tactic risk score, selecting a technique of the first tactic based on the technique corresponding to a worst of the first plurality of technique risk scores, and remediating a configuration setting corresponding to the technique,
wherein each of the first tactic risk score and the second tactic risk score reflects a risk of a corresponding tactic that can be used to attack a resource, and
wherein each of the first plurality of technique risk scores and the second plurality of technique risk scores reflects a risk of a corresponding technique that can be used to perform a corresponding tactic in attacking a resource.