US 12,107,732 B2
Computing interface network configuration graphs and techniques for securing computing environments therewith
Dor Dankner, Tel Aviv (IL); Tomer Semo, Tel Aviv-Jaffa (IL); Aner Morag, Tel Aviv (IL); Shay Levi, Tel Aviv (IL); Oz Golan, Ramat Gan (IL); Oren Shpigel, Tel Aviv (IL); and Hila Zigman, Hod Hasharon (IL)
Assigned to Noname Gate Ltd., Tel Aviv (IL)
Filed by Noname Gate Ltd., Tel Aviv-Jaffa (IL)
Filed on Nov. 14, 2022, as Appl. No. 18/055,218.
Prior Publication US 2024/0163169 A1, May 16, 2024
Int. Cl. G06F 15/177 (2006.01); H04L 41/0816 (2022.01); H04L 41/0869 (2022.01); H04L 41/0873 (2022.01)
CPC H04L 41/0869 (2013.01) [H04L 41/0816 (2013.01); H04L 41/0873 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for securing a computing environment using graphing of computing interfaces, comprising:
traversing a network configuration graph with respect to a first component deployed in a computing environment, wherein traversing the network configuration graph results in a plurality of connections between a plurality of components in the computing environment represented by a plurality of nodes including at least one connection to a first node representing the first component, wherein the plurality of nodes includes at least one computing interface node and at least one other node, wherein each computing interface node represents a computing interface of a plurality of computing interfaces deployed in the computing environment;
determining, based on the plurality of connections, a configuration of the first component with respect to service or consumption of at least one of the plurality of computing interfaces; and
detecting a misconfiguration of the first component based on the determined configuration of the first component.