US 12,287,899 B2
Techniques for detecting sensitive data in cloud computing environments utilizing cloning
Raaz Herzberg, Tel Aviv (IL); Avi Tal Lichtenstein, Tel Aviv (IL); Roy Reznik, Tel Aviv (IL); Ami Luttwak, Binyamina (IL); Moran Cohen, Tel Aviv (IL); Yaniv Shaked, Tel Aviv (IL); Yinon Costica, Tel Aviv (IL); George Pisha, Giv'atayim (IL); Daniel Hershko Shemesh, Givat-Shmuel (IL); and Yarin Miran, Rishon Lezion (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Dec. 29, 2023, as Appl. No. 18/400,720.
Application 18/400,720 is a continuation in part of application No. 18/049,093, filed on Oct. 24, 2022, granted, now 12,061,719.
Application 18/400,720 is a continuation in part of application No. 17/664,508, filed on May 23, 2022.
Claims priority of provisional application 63/377,403, filed on Sep. 28, 2022.
Prior Publication US 2024/0135027 A1, Apr. 25, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/53 (2013.01); G06F 9/455 (2018.01); G06F 21/62 (2013.01)
CPC G06F 21/6227 (2013.01) [G06F 21/6245 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A method for agentless detection of sensitive data in a cloud computing environment, comprising:
generating a cloned disk directly from an original disk of a resource deployed in a cloud computing environment;
inspecting the cloned disk for a cybersecurity object, the cybersecurity object indicating a sensitive data;
extracting a data schema from the cybersecurity object, in response to detecting the cybersecurity object on the cloned disk;
generating a classification of the data schema;
detecting in the cloned disk a plurality of data files, each data file including the classified data schema;
determining that the data schema corresponds to sensitive data based on the generated classification;
generating in a security database: a representation of the resource, a representation of the data schema, and a representation of each data file;
connecting the representation of the resource with the representation of the data schema in response to detecting the plurality of data files in the cloned disk; and
rendering a visual representation of the cloud computing environment including a representation of the data schema.