US 12,003,520 B1
Techniques for multi-tenant vulnerability scanning
Yarin Miran, Rishon Lezion (IL); Ami Luttwak, Binyamina (IL); Roy Reznik, Tel Aviv (IL); Avihai Berkovitz, Tel Aviv (IL); Moran Cohen, Tel Aviv (IL); Yaniv Shaked, Tel Aviv (IL); and Yaniv Joseph Oliver, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Sep. 15, 2023, as Appl. No. 18/468,149.
Application 18/468,149 is a continuation of application No. 17/532,557, filed on Nov. 22, 2021.
Claims priority of provisional application 63/196,384, filed on Jun. 3, 2021.
Claims priority of provisional application 63/123,154, filed on Dec. 9, 2020.
Int. Cl. H04L 9/40 (2022.01); G06F 9/50 (2006.01); H04L 67/1097 (2022.01)
CPC H04L 63/1416 (2013.01) [G06F 9/505 (2013.01); H04L 63/0435 (2013.01); H04L 63/0823 (2013.01); H04L 63/1425 (2013.01); H04L 67/1097 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method for scalable vulnerability detection, comprising:
selecting a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first disk;
generating in a remote orchestration system an inspection node, the inspection node including an inspection disk, wherein the inspection node is provisioned in response to demand for an inspection node;
generating a volume on which the inspection disk is mounted, wherein the inspection disk is generated from the first disk;
providing access to the volume for the inspection node; and
inspecting the volume for an object, the object indicating a vulnerability.