US 12,452,313 B2
Cyberthreat remediation using a zero trust engine
Timucin Ozugur, Fairview, TX (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Feb. 21, 2024, as Appl. No. 18/582,933.
Prior Publication US 2025/0267175 A1, Aug. 21, 2025
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/205 (2013.01) [H04L 63/1433 (2013.01); H04L 63/1441 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing platform comprising:
at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, configure the computing platform to:
receive, based on cyberthreat modeling and vulnerability scanning of one or more applications corresponding to a network, information of cyberthreats and vulnerabilities corresponding to the one or more applications;
train, based on the information of cyberthreats and vulnerabilities, a zero trust model, wherein training the zero trust model configures the zero trust model to generate cyberthreat mappings for applications based on input of information of cyberthreats and vulnerabilities;
identify, based on one or more parameters, a first application, of the one or more applications, for cyberthreat testing;
generate, based on a subset of information, of the information of cyberthreats and vulnerabilities and corresponding to the first application, a cyberthreat mapping for the first application, wherein the cyberthreat mapping comprises a plurality of vulnerability-cyberthreat pairings and wherein the generating the cyberthreat mapping is further based on inputting the subset of information into the zero trust model;
generate, based on the cyberthreat mapping, a cyberthreat record, wherein the cyberthreat record comprises a representation of the cyberthreat mapping;
generate, by comparing the cyberthreat record to one or more trigger criteria, a cyberthreat level indicator for the first application, wherein the cyberthreat level indicator indicates a likelihood of a cyberthreat affecting the first application;
identify, by comparing the cyberthreat level indicator to a threshold, whether the cyberthreat level indicator satisfies the threshold;
initiate, based on identifying that the cyberthreat level indicator satisfies the threshold, one or more cyberthreat remediation actions for the application;
update, based on identifying whether the cyberthreat level indicator satisfies the threshold, the information of cyberthreats and vulnerabilities; and
update, based on the updated information of cyberthreats and vulnerabilities, the zero trust model.