| CPC H04L 63/205 (2013.01) [H04L 63/1433 (2013.01); H04L 63/1441 (2013.01)] | 20 Claims |

|
1. A computing platform comprising:
at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, configure the computing platform to:
receive, based on cyberthreat modeling and vulnerability scanning of one or more applications corresponding to a network, information of cyberthreats and vulnerabilities corresponding to the one or more applications;
train, based on the information of cyberthreats and vulnerabilities, a zero trust model, wherein training the zero trust model configures the zero trust model to generate cyberthreat mappings for applications based on input of information of cyberthreats and vulnerabilities;
identify, based on one or more parameters, a first application, of the one or more applications, for cyberthreat testing;
generate, based on a subset of information, of the information of cyberthreats and vulnerabilities and corresponding to the first application, a cyberthreat mapping for the first application, wherein the cyberthreat mapping comprises a plurality of vulnerability-cyberthreat pairings and wherein the generating the cyberthreat mapping is further based on inputting the subset of information into the zero trust model;
generate, based on the cyberthreat mapping, a cyberthreat record, wherein the cyberthreat record comprises a representation of the cyberthreat mapping;
generate, by comparing the cyberthreat record to one or more trigger criteria, a cyberthreat level indicator for the first application, wherein the cyberthreat level indicator indicates a likelihood of a cyberthreat affecting the first application;
identify, by comparing the cyberthreat level indicator to a threshold, whether the cyberthreat level indicator satisfies the threshold;
initiate, based on identifying that the cyberthreat level indicator satisfies the threshold, one or more cyberthreat remediation actions for the application;
update, based on identifying whether the cyberthreat level indicator satisfies the threshold, the information of cyberthreats and vulnerabilities; and
update, based on the updated information of cyberthreats and vulnerabilities, the zero trust model.
|