| CPC H04L 63/1416 (2013.01) [G06F 9/541 (2013.01); G06F 16/2379 (2019.01); G06F 21/577 (2013.01); G06F 21/604 (2013.01); G06F 21/6245 (2013.01); H04L 63/0209 (2013.01); H04L 63/1425 (2013.01); H04L 63/1466 (2013.01); H04L 63/20 (2013.01); G06F 2221/034 (2013.01)] | 2 Claims |

|
1. A method for implementing a cloud-platform push for one or more known data breaches comprising:
for each data breach of the one or more known data breaches:
providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions;
generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions;
pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability to the data breach;
generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network; and
determining that the data breach can occur within the enterprise's cloud-based network,
wherein the TTPs comprises a cyber-threat behavior, a cyber-threat method, a cyber-threat tool, and a cyber-threat strategy,
wherein the TTPs execute a computer-system security threat on a specified network;
mapping a disclosed data breach to the TTPs represented through a set of security vectors; and
using the functionality to map one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions to determine a vulnerability rating for an enterprise against a known data breach which indicates if the enterprise is susceptible to the same data breach,
computing a plurality of security vectors for every enterprise which helps map the enterprise's cloud data store posture and characteristics and with the security vectors and security rule, representing the TTPs for a plurality of known cloud data breaches;
and once the TTPs are mapped, protecting the enterprise, for any new known cloud data breach by providing a vulnerability rating which indicates a chance that an enterprise has a same posture which leads to the cloud data breach.
|