| CPC H04L 63/1433 (2013.01) [G06N 5/046 (2013.01); H04L 63/1416 (2013.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
generating an image for an enterprise that indicates one or more software application stacks of a virtual instance of a cloud provider from an application programming interface of the cloud provider and a network architecture for the one or more software application stacks without installing and utilizing security monitoring software on the cloud provider;
determining one or more vulnerabilities of the one or more software application stacks and one or more vulnerabilities of the network architecture from the image;
providing the one or more vulnerabilities of the one or more software application stacks, and the one or more vulnerabilities of the network architecture as input to a machine learning model;
generating an inference by the machine learning model that indicates one or more attack paths for an attacker in the one or more software application stacks and the network architecture; and
transmitting the inference to a storage location or a security software application.
|