| CPC G06Q 30/0609 (2013.01) | 15 Claims |

|
1. A computer-implemented method comprising:
causing, by a processor, a plurality of commands to be performed at a client computing environment having vendor storage systems, at least some of the vendor storage systems having different physical configurations than other ones of the vendor storage systems;
identifying, by the processor, a plurality of attributes of the vendor storage systems of the client computing environment;
collecting, by the processor over a network, threat modeling content relating to the plurality of commands performed on the vendor storage systems;
analyzing, by the processor and using natural language processing, the threat modeling content to identify one or more vulnerabilities associated with one or more vendor storage systems of the vendor storage systems;
comparing, by the processor, the analyzed threat modeling content with the plurality of attributes of the client computing environment;
identifying, by the processor and based on the comparing, one or more security gaps associated with the client computing environment;
generating, by the processor and based on the identifying, a client threat model for the client computing environment;
generating, by the processor, a ranking value for the client threat model, wherein the ranking value is based in part on a confidence level between the client threat model and the threat modeling content;
comparing, by the processor, the ranking value to an orchestration threshold;
causing changes to be made to one or more of the plurality of attributes of the client computing environment in response to the ranking value not meeting the orchestration threshold;
in response to the changes being made to the one or more attributes, re-evaluating the client threat model; and
orchestrating, by the processor and in response to the ranking value meeting the orchestration threshold, at least one container of the client computing environment based on the client threat model.
|