US 12,452,293 B1
Detection of stale data objects and associated cybersecurity risk
Matilda Lidgi, Haifa (IL); and Liron Levin, Kfar Saba (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Mar. 4, 2025, as Appl. No. 19/070,154.
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01)
CPC H04L 63/1433 (2013.01) [G06F 9/45558 (2013.01); G06F 2009/45562 (2013.01); G06F 2009/4557 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for detecting underutilized objects in a cloud computing environment, comprising:
detecting a plurality of resources deployed in a cloud computing environment;
generating for each resource a representation in a security database, the security database including a representation of the cloud computing environment;
generating for each resource a state, based at least on a detected utilization of a respective resource;
detecting, based on the state, a resource of the plurality of resources which is an underutilized resource; and
initiating a mitigation action to disable a permission associated with a principal of the resource on the underutilized resource.