CPC H04L 41/0869 (2013.01) [H04L 41/0816 (2013.01); H04L 41/0873 (2013.01)] | 19 Claims |
1. A method for securing a computing environment using graphing of computing interfaces, comprising:
traversing a network configuration graph with respect to a first component deployed in a computing environment, wherein traversing the network configuration graph results in a plurality of connections between a plurality of components in the computing environment represented by a plurality of nodes including at least one connection to a first node representing the first component, wherein the plurality of nodes includes at least one computing interface node and at least one other node, wherein each computing interface node represents a computing interface of a plurality of computing interfaces deployed in the computing environment;
determining, based on the plurality of connections, a configuration of the first component with respect to service or consumption of at least one of the plurality of computing interfaces; and
detecting a misconfiguration of the first component based on the determined configuration of the first component.
|