US 12,445,474 B1
Attack path risk mitigation by a data platform
Theodore M. Reed, Berkeley Heights, NJ (US); Nolan K. Karpinski, San Francisco, CA (US); Xiaofei Guo, Sunnyvale, CA (US); Yijou Chen, Cupertino, CA (US); Christopher Hall, Baltimore, MD (US); Matti A. Vanninen, Cary, CA (US); Carsten Varming, Brooklyn, NY (US); John Payyappillil John, Seattle, WA (US); Nicholas W. McNutt, Kodak, TN (US); and Sowmya A. Karmali, Tustin, CA (US)
Assigned to Fortinet, Inc., Sunnyvale, CA (US)
Filed by Lacework, Inc., Mountain View, CA (US)
Filed on Aug. 23, 2023, as Appl. No. 18/237,090.
Application 18/237,090 is a continuation in part of application No. 18/119,045, filed on Mar. 8, 2023, granted, now 11,882,141.
Application 18/119,045 is a continuation of application No. 17/510,179, filed on Oct. 25, 2021, granted, now 11,637,849, issued on Apr. 25, 2023.
Application 17/510,179 is a continuation of application No. 16/786,822, filed on Feb. 10, 2020, granted, now 11,157,502, issued on Oct. 26, 2021.
Application 16/786,822 is a continuation of application No. 16/134,806, filed on Sep. 18, 2018, granted, now 10,614,071, issued on Apr. 7, 2020.
Claims priority of provisional application 63/438,161, filed on Jan. 10, 2023.
Claims priority of provisional application 63/422,950, filed on Nov. 5, 2022.
Claims priority of provisional application 63/400,523, filed on Aug. 24, 2022.
Claims priority of provisional application 62/650,971, filed on Mar. 30, 2018.
Claims priority of provisional application 62/590,986, filed on Nov. 27, 2017.
Int. Cl. G06F 16/9038 (2019.01); G06F 9/455 (2018.01); G06F 9/54 (2006.01); G06F 16/901 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 9/40 (2022.01); H04L 43/045 (2022.01); H04L 43/06 (2022.01); H04L 67/306 (2022.01); H04L 67/50 (2022.01); G06F 16/2455 (2019.01)
CPC H04L 63/1425 (2013.01) [G06F 9/455 (2013.01); G06F 9/545 (2013.01); G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2013.01); H04L 43/06 (2013.01); H04L 63/10 (2013.01); H04L 67/306 (2013.01); H04L 67/535 (2022.05); G06F 16/2456 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
scanning, by a data platform, a compute environment associated with an entity;
identifying, by the data platform based on the scanning, one or more attack paths from a network to one or more datasets associated with the entity, the one or more attack paths each including a series of risk artifacts within the compute environment that can be exploited by an attacker to access the one or more datasets;
generating, by the data platform, one or more attack path risk scores associated with the one or more attack paths, the one or more attack path risk scores indicating one or more levels of risk that the one or more attack paths could be exploited to access the one or more datasets, wherein the one or more attack path risk scores are computed based on weighted risk factors associated with the series of risk artifacts, the weighted risk factors including attributes of each of the series of risk artifacts and characteristics of the one or more datasets;
ranking the one or more attack paths relative to one another, the ranking configured to facilitate remediation prioritization with respect to the one or more attack paths; and
performing, by the data platform based on the one or more attack path risk scores, a risk mitigation operation associated with the one or more attack paths.