US 11,973,770 B1
Techniques for multi-tenant vulnerability scanning
Yarin Miran, Rishon Lezion (IL); Ami Luttwak, Binyamina (IL); Roy Reznik, Tel Aviv (IL); Avihai Berkovitz, Tel Aviv (IL); Moran Cohen, Tel Aviv (IL); Yaniv Shaked, Tel Aviv (IL); and Yaniv Joseph Oliver, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Nov. 22, 2021, as Appl. No. 17/532,557.
Claims priority of provisional application 63/196,384, filed on Jun. 3, 2021.
Claims priority of provisional application 63/123,154, filed on Dec. 9, 2020.
Int. Cl. H04L 9/40 (2022.01); G06F 9/50 (2006.01); H04L 67/1097 (2022.01)
CPC H04L 63/1416 (2013.01) [G06F 9/505 (2013.01); H04L 63/0435 (2013.01); H04L 63/0823 (2013.01); H04L 63/1425 (2013.01); H04L 67/1097 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method for scalable vulnerability detection, comprising:
selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume;
generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes;
generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume;
provisioning an inspector workload in response to demand for an inspector workload;
generating a persistent volume claim (PVC) of the PV for the inspector workload; and
inspecting the PV for an object.