| CPC H04L 63/1425 (2013.01) [G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2013.01); H04L 43/06 (2013.01); H04L 63/10 (2013.01); H04L 67/306 (2013.01); H04L 67/535 (2022.05); G06F 16/2456 (2019.01)] | 20 Claims |

|
1. A method comprising:
identifying, by a data platform based on static workload data associated with a compute environment, one or more attack paths from a network to one or more datasets associated with an entity, the one or more attack paths each including a series of risk artifacts within the compute environment that could be exploited by an attacker to access the one or more datasets;
accessing, by the data platform, runtime workload data associated with the compute environment;
determining, based on differences between the static workload data and the runtime workload data, privilege configurations or access configurations that are unused or partially-used by the entity; and
performing, by the data platform based on the runtime workload data, a risk mitigation operation associated with the one or more attack paths.
|