US 12,452,281 B2
Automated container security
Thiagarajan Ramakrishnan, Round Rock, TX (US); Shamik Kacker, Austin, TX (US); and Leandro Lopes, Austin, TX (US)
Assigned to DELL PRODUCTS, L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Nov. 16, 2022, as Appl. No. 18/055,900.
Prior Publication US 2024/0163306 A1, May 16, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/1441 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A device, comprising:
a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
scanning containerized applications deployed on a container orchestration platform and identifying a vulnerability of a containerized application of the containerized applications;
performing a vulnerability mitigation procedure that identifies solution data based on a source of the vulnerability, where in the source represents a portion of the containerized application that exhibits the vulnerability, and wherein the solution data is indicated to mitigate the vulnerability of the containerized application and is determined in response to building a docker file that is constructed as a function of the source of the vulnerability;
determining a confidence score indicative of a likelihood that the containerized application to function nominally after application of the solution data that is selected as a function of the source of the vulnerability; and
in response to the confidence score being above a defined threshold, applying the solution data to the containerized application.