US 12,278,897 B2
System and method for disk inspection utilizing disk cloning techniques
Daniel Hershko Shemesh, Givat-Shmuel (IL); Yarin Miran, Rishon Lezion (IL); Roy Reznik, Tel Aviv (IL); Ami Luttwak, Binyamina (IL); and Yinon Costica, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Jul. 17, 2024, as Appl. No. 18/775,854.
Application 18/775,854 is a continuation of application No. 18/396,309, filed on Dec. 26, 2023, granted, now 12,095,912.
Application 18/396,309 is a continuation of application No. 18/481,088, filed on Oct. 4, 2023, granted, now 11,936,785, issued on Mar. 19, 2024.
Application 18/481,088 is a continuation in part of application No. 18/146,074, filed on Dec. 23, 2022.
Application 18/481,088 is a continuation in part of application No. 18/146,076, filed on Dec. 23, 2022.
Application 18/481,088 is a continuation in part of application No. 17/664,508, filed on May 23, 2022.
Claims priority of provisional application 63/266,031, filed on Dec. 27, 2021.
Prior Publication US 2024/0372720 A1, Nov. 7, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/088 (2013.01) [H04L 9/0822 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A method for inspecting virtual instances in a cloud computing environment for cybersecurity threats, comprising:
selecting a virtual instance in a cloud computing environment, wherein the virtual instance includes a disk having a disk descriptor with an address in a cloud storage system;
generating a cloned disk of the virtual instance by generating a cloned disk descriptor, the cloned disk descriptor having a data field including the address of the disk of the virtual instance;
inspecting the cloned disk for a cybersecurity object; and
releasing the cloned disk in response to completing the inspection of the cloned disk.