CPC G06F 21/53 (2013.01) [G06F 9/45558 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45587 (2013.01)] | 15 Claims |
1. A method for inspecting a running container for a cybersecurity object in a cloud computing environment, comprising:
generating a clone of a disk, wherein the disk is deployed in a cloud computing environment, wherein the disk comprises a base image;
detecting a first software container identifier of a first software container on the generated cloned disk, wherein the first software container is a running container;
determining a location of a software container repository based on the identifier;
accessing, based at least on the identifier, the software container repository to inspect the cloned disk for a cybersecurity object, wherein the inspection comprises inspecting each layer of a plurality of layers of the first software container;
detecting the cybersecurity object on the cloned disk;
detecting a cybersecurity threat based on the detection of the cybersecurity object;
detecting in the cloud computing environment a second software container deployed based on the base image; and
initiating a mitigation action for the first software container and the second software container, in response to the detection of the cybersecurity threat.
|