US 11,989,308 B2
Method to intelligently manage the end to end container compliance in cloud environments
Suren Kumar, Bangalore (IN); and Vinod Durairaj, Bangalore (IN)
Assigned to EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed by EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed on Jul. 22, 2021, as Appl. No. 17/383,252.
Claims priority of application No. 202111023665 (IN), filed on May 27, 2021.
Prior Publication US 2022/0382879 A1, Dec. 1, 2022
Int. Cl. G06F 21/57 (2013.01); G06N 5/02 (2023.01)
CPC G06F 21/577 (2013.01) [G06N 5/02 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising the operations:
collecting container information concerning a container with port information of communication undertaken by the container;
analyzing the container information and the port information to identify a security tool needed to perform a vulnerability scan of the container;
accessing the security tool from a knowledge lake;
running the security tool on the container information to identify a security vulnerability of the container;
based on the running of the security tool, generating an alert indicating that the container has the security vulnerability;
capturing the security vulnerability; and
based on the captured security vulnerability, updating a container image that was used to spawn the container.