| CPC H04L 63/1425 (2013.01) [G06F 9/455 (2013.01); G06F 9/545 (2013.01); G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2013.01); H04L 43/06 (2013.01); H04L 63/10 (2013.01); H04L 67/306 (2013.01); H04L 67/535 (2022.05); G06F 16/2456 (2019.01)] | 20 Claims |

|
1. A method comprising:
scanning, by a data platform, a compute environment associated with an entity;
identifying, by the data platform based on the scanning, one or more attack paths from a network to one or more datasets associated with the entity, the one or more attack paths each including a series of risk artifacts within the compute environment that can be exploited by an attacker to access the one or more datasets;
generating, by the data platform, one or more attack path risk scores associated with the one or more attack paths, the one or more attack path risk scores indicating one or more levels of risk that the one or more attack paths could be exploited to access the one or more datasets, wherein the one or more attack path risk scores are computed based on weighted risk factors associated with the series of risk artifacts, the weighted risk factors including attributes of each of the series of risk artifacts and characteristics of the one or more datasets;
ranking the one or more attack paths relative to one another, the ranking configured to facilitate remediation prioritization with respect to the one or more attack paths; and
performing, by the data platform based on the one or more attack path risk scores, a risk mitigation operation associated with the one or more attack paths.
|