throbber
WIZ, Inc. EXHIBIT - 1001
`WIZ, Inc. v. Orca Security LTD. - IPR2024-00220
`
`

`

`US 11,431,735 B2
` Page 2
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2015/0052520 Al
`2016/0004449 Al*
`
`2016/0094568 Al*
`
`2017/0011138 Al
`2017/0103212 Al*
`2018/0137032 Al*
`2018/0255080 Al
`2018/0293374 Al
`
`* cited by examiner
`
`2/2015 Crowell et al.
`1/2016 Lakshman ............ GO6F 3/0604
`711/162
`3/2016 Balasubramanian...
`GO06F 9/45558
`726/23
`
`1/2017 Venkatesh et al.
`4/2017 Deng........
`5/2018 Tannous ....
`9/2018 Paine
`10/2018 Chen
`
`bases GO6F 3/0619
`.. GO6F 11/3664
`
`
`

`

`U.S. Patent
`
`Aug. 30, 2022
`
`Sheet 1 of 4
`
`US 11,431,735 B2
`
`100
`
`User Console
`
`180
`
`
`
`
`
` External
`systems
`170
`
`
`
`
`Management
`Console
`150
`
`
`
`Cloud Computing Platform
`110
`
`
`
`FIG. 1A
`
`

`

`U.S. Patent
`
`Aug. 30, 2022
`
`Sheet 2 of 4
`
`US 11,431,735 B2
`
`Security System
`
`140
`
`FIG. 1B
`
`

`

`U.S. Patent
`
`Aug. 30, 2022
`
`Sheet 3 of 4
`
`US 11,431,735 B2
`
`Receive a request to scan a VM for vulnerabilities
`
`$210
`
`Determine a location of the virtual disk of the VM and its snapshot
`
`
`
`Access a snapshotof virtual disk
`
`5230
`
`$240
`
`
`
`
`
`Analyze the snapshot
`
`
`$250
`
`Report detected threats
`
`Trigger a mitigation action
`
`
`FIG. 2
`
`

`

`U.S. Patent
`
`Aug. 30, 2022
`
`Sheet 4 of 4
`
`US 11,431,735 B2
`
`340
`
`Processing
`Circuitry
`310
`
`Network
`Interface
`
`Storage
`330
`
`FIG. 3
`
`

`

`US 11,431,735 B2
`
`1
`TECHNIQUES FOR SECURING VIRTUAL
`MACHINES
`
`This application claims the benefit of U.S. Provisional
`Application No. 62/797,718 filed on Jan. 28, 2019,
`the
`contents of which are hereby incorporated by reference.
`
`TECHNICAL FIELD
`
`‘This disclosure relates generally to cyber-security systems
`and, more specifically,
`to techniques for securing virtual
`machines.
`
`BACKGROUND
`
`Organizations have increasingly adapted their applica-
`tions to be run from multiple cloud computing platforms.
`Some leading public cloud service providers include Ama-
`zon®, Microsoft®, Google®, and the like.
`Virtualization is a keyrole in a cloud computing, allowing
`multiple applications and users to share the same cloud
`computing infrastructure. For example, a cloud storage
`service can maintain data of multiple different users.
`In one instance, virtualization can be achieved by means
`ofvirtual machines. A virtual machine emulates a number of
`
`20
`
`“computers”or instances, all within a single physical device.
`In more detail, virtual machines provide the ability to
`emulate a separate operating system (OS), also referred to as
`a guest OS, and therefore a separate computer, from an
`existing OS(the host). This independent instanceis typically
`isolated as a completely standalone environment.
`Modern virtualization technologies are also adapted by
`cloud computing platforms. Examples tor such technologies
`include virtual machines, software containers, and serverless
`functions. With their computing advantages. applications
`and virtual machines running on top of virtualization tech-
`nologies are also vulnerable to some cyber threats. For
`example, virtual machines can execute vulnerable software
`applications or infected operating systems.
`Protection of a cloud computing infrastructure, and par-
`ticularly of virtual machines can be achieved via inspection
`of traffic. Traditionally, traffic inspection is performed by a
`network device connected between a client and a server
`
`40
`
`2
`by the traffic monitor. As such, traffic monitoring would not
`allow detection of vulnerabilities in software executed by
`the server.
`
`To overcomethe limitationsof traflic inspection solutions,
`some cyber-security solutions, such as vulnerability man-
`agement and security assessment solutions are based on
`agents installed in each server in a cloud computing platform
`or data center. Using agents is a cumbersomesolution for a
`number of reasons,
`including IT resources management,
`governance, and performance.
`['or example.
`installing
`agents in a large data center may take months.
`It would therefore be advantageous to provide a security
`solution that would overcome the deficiencies noted above.
`
`SUMMARY
`
`A summary of several example embodiments of the
`disclosure follows. This summary is provided for the con-
`venience of the reader to provide a basic understanding of
`such embodiments and does not wholly define the breadth of
`the disclosure. This summary is not an extensive overview
`of all contemplated embodiments, and is intended to neither
`identify keyor critical elements of all embodiments nor to
`delineate the scope of anyor all aspects. Its sole purpose is
`to present some concepts of one or more embodiments in a
`simplified form as a prelude to the more detailed description
`that is presented later. For convenience, the term “some
`embodiments” or “certain embodiments” may be used
`herein to refer to a single embodiment or multiple embodi-
`ments of the disclosure.
`Certain embodiments disclosed herein include a method
`
`for securing virtual cloud assets in a cloud computing
`environment against cyber threats, comprising: determining
`a location of a snapshot of at least one virtual disk of a
`protected virtual cloud asset, wherein the virtual cloud asset
`is instantiated in the cloud computing environment; access-
`ing the snapshotofthevirtual disk based on the determined
`location; analyzing, the snapshot of the protected virtual
`cloud asset
`to detect potential cyber threats risking the
`protected virtual cloud asset; and alerting detected potential
`cyber threats based on a determinedpriority.
`Certain embodiments disclosed herein also include a
`
`non-transitory computer readable medium having stored
`thereon instructions for causing a processing circuitry to
`execule a process,
`the process comprising: determining a
`location of a snapshot of at least one virtual disk of a
`protected virtual cloud asset, wherein the virtual cloud asset
`is instantiated in the cloud computing, environment; access-
`ing the snapshotof the virtual disk based on the determined
`location; analyzing the snapshot of the protected virtual
`cloud asset
`to detect potential cyber threats risking the
`protected virtual cloud asset; and alerting detected potential
`cyber threats based on a determinedpriority.
`Certain embodiments disclosed herein also include a
`
`wi on
`
`(deployed in a cloud computing platform or a data center)
`hosting virtual machines. Traflic inspection may not provide
`an accurate indication of the security status of the server due
`to inherent limitations, such as encryption and whether the
`necessary data is exposed in the communication.
`Furthermore, inspection of computing infrastructure may 5
`be performed by a network scanner deployed out of path.
`The scanner queries the server to determine if the server
`executes an application that possess a security threat, such as
`vulnerability in the application. The disadvantage of such a
`scanneris that the server may not respond to all queries by
`the scanner, or not exposethe necessarydata in the response.
`Further, the network scanner usually communicates with the
`system for securing virtual cloud assets in a cloud comput-
`server, and the network configuration may prevent it. In
`ing environment against cyber threats, comprising: a pro-
`addition, some types of queries may require credentials to
`cessing circuitry; and a memory, the memory containing
`access the server. Such credentials may not be available to
`the scanner.
`instructions that, when executed by the processing circuitry,
`configure the system to: determine a location of a snapshot
`Traffic inspection may also be performed byatraffic
`monitor that listens to traffic ows between clients and the
`of at least one virtual disk of a protected virtual cloud asset,
`wherein the virtual cloud asset is instantiated in the cloud
`server. The traffic monitor can detect some cyber threats,
`computing environment; access the snapshot of the virtual
`e.g., based on the volume oftraflic. However, the monitor
`disk based on the determined location; analyze the snapshot
`can detect threats only based on the monitoredtraffic. For
`example, misconfiguration of the server maynot be detected
`of the protected virtual cloud asset to detect potential cyber
`
`60
`
`65
`
`

`

`US 11,431,735 B2
`
`3
`threats risking the protected virtual cloud asset; and alert
`detected potential cyber threats based on a determined
`priority.
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`‘The foregoing and other objects, features, and advantages
`of the disclosed embodiments will be apparent from the
`following detailed description taken in conjunction with the
`accompanying drawings.
`FIGS. 1A and 1B are network diagrams utilized to
`describe the various embodiments.
`
`FIG. 2 is a flowchart illustrating a method detecting cyber
`threats,
`including potential vulnerabilities
`in virtual
`machines executed in a cloud computing platform according
`to same embodiments.
`FIG.3 is an example block diagram of the security system
`according to an embodiment.
`
`DETAILED DESCRIPTION
`
`5
`
`20
`
`It is important to note that the embodiments disclosed
`herein are only examples of the many advantageous uses of
`the innovative teachings herein. In general, statements made
`in the specification of the present application do not neces-
`sarily limit any of the various claimed embodiments. More-
`over, some statements may apply to someinventive features
`but not to others. In general, unless otherwise indicated,
`singular elements maybe in plural and vice versa with no
`loss of generality. In the drawings, like numeralsrefer to like
`parts through several views.
`FIGS. 1A and 1B show an example network diagram 100
`utilized to describe the various embodiments. A cloud com-
`
`we 5
`
`40
`
`puting plattorm 110 is communicably connected to a net-
`work 120. Examples of the cloud computing platform 110
`may include a public cloud, a private cloud, a hybrid cloud,
`and the like. Examples for a public cloud, but are not limited
`to, AWS® by Amazon®, Microsoft Azure®, Google
`Cloud®, andthe like. In some configurations, the disclosed
`embodiments operable in on premise virtual machines envi-
`ronments. The network 120 may be the Internet, the world-
`wide-web (WWW), a local area network (LAN), a wide area
`network (WAN), and other networks.
`The arrangement of the example cloud computing plat-
`form 110 is shown in FIG. 1B. Asillustrated, the platform
`110 includes a server 115 and a storage 117, serving as the
`storage space for the server 115. The server 115 is a physical
`device hosting at least one virtual machine (VM) 119. The
`VM 119 is a protected VM, which maybe any virtual cloud
`asset including, but not limited to, a software container, a 5
`micro-service, a serverless function, and the like.
`The storage 117 emulates virtual discs for the VMs
`executed in by the server 115. The storage 117 is typically
`connected to the server 115 through a high-speed connec-
`tion, such as optic fiber allowing fast retrieval of data. In
`other configurations, the storage 117 may be part of the
`server 115. In this example illustrated in FIG. 1B, virtual
`disk 118-1 is allocated for the VM 119. The server 115, and
`hence the VM 119, may be executed in a client environment
`130 within the platform 110.
`The client environment 130 is an environment within the
`cloud computing platform 110 utilized to execute cloud-
`hosted applications of the client. A client may belong to a
`specific tenant. In some example embodiment, the client
`environment 130 may be part of a virtualized environment
`or on-premises virtualization environment,
`such as
`a
`VMware® based solution.
`
`wi on
`
`60
`
`65
`
`4
`Also deployed in the cloud computing platform 110 is a
`security system 140 configured to perform the various
`disclosed embodiments. In some embodiments, the system
`140 may be part of the client environment 130. In an
`embodiment, the security system 140 maybe realized as a
`physical machine configured to executea plurality of virtual
`instances, such as, but not
`limited to virtual machines
`executed by a host server. In yet another embodiment, the
`security system 140 mayberealized as a virtual machine
`executed by a host server. Such a host server is a physical
`machine (device) and may be either the server 115, a
`dedicated server, a different shared server, or another virtu-
`alization-based computing entity, such as a serverless func-
`tion.
`In an embodiment, the interface between the client envi-
`ronment 130 and the security system 140 can be realized
`using APIs or services provided by the cloud computing
`platform 110. For example, in AWS, a crass account policy
`service can be utilized to allow interfacing the client envi-
`ronment 130 with the security system 140.
`In the deployment, illustrated in FIG. 1, the configuration
`of resources of the cloud computing platform 110 is per-
`formed by meansofthe management console 150. As such,
`the management console 150 may be queried on the current
`deploymentandsettings ofresourcesin the cloud computing
`platform 110. Specifically,
`the management console 150
`may be queried, by the security system 140, about as the
`location (e.g., virtual address) ofthe virtual disk 118-1 in the
`storage 117. The system 140 is configured to interface with
`the managementconsole 150 through, for example, an API.
`In some example embodiments, the security system 140
`mayfurther interface with the cloud computing platform 110
`and external systems 170. ‘lhe external systems may include
`intelligence systems, security information and event man-
`agement (SIEM) systems, and mitigation tools. The external
`intelligence systems may include common vulnerabilities
`
`and exposures (CVE®) databases, reputation services, secu-
`rity systems (providing feeds on discovered threats), and so
`on. The information provided by the intelligence systems
`may detect certain known vulnerabilities identified in, for
`example, a CVE database.
`the security
`According to the disclosed embodiments,
`system 140 is configured to detect vulnerabilities and other
`cyberthreats related to the execution VM 119. The detection
`is performed while the VM 119 is live, without using any
`agent installed in the server 115 or the VM 119, and without
`relying on cooperation from VM 119 guest OS. Specifically,
`the security system 140 can scan and detect vulnerable
`software, non-secure configuration, exploitation attempts,
`compromisedasserts, data leaks, data mining, and so on. The
`security system 140 may be further utilized to provide
`security services, such as incident response, anti-ransom-
`ware, and cyber insurance by accessing the security posture.
`In some embodiments, the security system 140 is config-
`ured to query the cloud management console 150 for the
`address of the virtual disk 118-1 serving the VM 119 and a
`location of the snapshot.A VM’s snapshotis a copy of the
`machine’s virtual disk (or disk file) at a given point in time.
`Snapshots provide a change log for the virtual disk and are
`used to restore a VM to a particular point in time when a
`failure error occurs. Typically, any data that was writable on
`a VM becomes read-only when the snapshot
`is taken.
`Multiple snapshots of a VM can be created at multiple
`possible point-in-time restore points. When a VM reverts to
`a snapshot, current disk and memory states are deleted and
`the snapshot becomes the new parent snapshot for that VM.
`
`
`
`

`

`US 11,431,735 B2
`
`5
`The snapshot of the VM 119 is located and maybe saved
`from the virtual disk 118-1 is accessed by the system 140. In
`an embodiment, the VM’s 119 snapshot may be copied to the
`system 140. If such a snapshot doesnot exist, the system 140
`may take a new snapshot, or request such an action. The
`snapshots may be taken at a predefined schedule or upon
`predefined events (e.g., a network event or abnormal event).
`Further,
`the snapshots may be accessed or copied on a
`predefined schedule or upon predefined events. It should be
`noted that when the snapshotis taken or copied, the VM 119
`still runs.
`
`It should be noted that the snapshot of the virtual disk
`118-1 may not be necessary stored in the storage 117, but for
`ease ofthe discussionit is assumedthat the snapshotis saved
`in the storage 117.
`It should be further noted that
`the
`snapshotis being accessed without cooperation of the guest,
`virtual OS of the virtual machine.
`
`is parsed and analyzed by the security
`The snapshot
`system 140 to detect vulnerabilities. This analysis of the
`snapshot does not require any interaction and/or information
`from the VM 119. As further demonstrated herein,
`the
`analysis of the snapshot by the system 140 does not require
`any agent installed on the server 115 or VM 119.
`Various techniques can be utilized to analyze the snap-
`shots, depending on the type of vulnerability and cyber
`threats to be detected. Following are some example embodi-
`ments for techniques that may be implemented by the
`security system 140.
`In an embodiment, the security system 140 is configured
`to detect whether there is vulnerable code executed by the
`VM 119. The VM 119 being checked may be running,
`paused, or shutdown.To this end, the security system 140 is
`configured to match installed application lists, with their
`respective versions, to a knownlist of vulnerable applica-
`tions. I'urther, the security system 140 maybe configured to
`match the application files, either directly (using binary
`comparison) or by computing a cryptographic hash against
`database of files in vulnerable applications. ‘he matching
`maybe also on sub-modulesofan application. Alternatively,
`the security system 140 mayread installation logs of pack-
`age managers usedto install the packages of the application.
`In yet another embodiment, the security system 140 is
`configured to verify whether the vulnerability is relevant to
`the VM 119. For example,if there is a vulnerable version or
`module not in use,
`the priority of that issue is reduced
`dramatically.
`To this end, the security system 140 maybe configured to
`check the configuration files of the applications and oper-
`ating system of the VM 119; to verify access times tofiles
`bythe operating system; and/or to analyze the active appli-
`cation and/or system logs in order to deduce what applica-
`tions and modules are running.
`In yet another embodiment, the security system 140 may
`instantiate a copy of the VM 119 and/or a subset ofappli-
`cations of the VM119 onthe server 115 or a separate server
`and monitor all activity performed by the instance of the
`VM.The execution of the instance of the VM is an isolated
`sandbox, which can be a full VM or subset of it, such as a
`software container (e.g., Docker® container) or another
`virtualized instances. The monitored activity may be further
`analyzed to determine abnormality. Such analysis may
`include monitoring of API activity, process creation, file
`activity, network communication,
`registry changes, and
`active probing of the said subset
`in order to assess its
`security posture. This may include, but not
`limited to,
`actively communicating with the VM 119, using either
`
`6
`legitimate communicate and/or attack attempts, to assess its
`posture and bythat deriving the security posture of the entire
`VM 119.
`
`In order to determine if the vulnerability is relevant to the
`VM 119,the security system 140 is configured to analyze the
`machine memory,as reflected in the pagefile. The pagefile
`is saved in the snapshot and. extends how much system-
`committed memory (also known as “virtual memory”) a
`system can back. In an embodiment, analyzing the pagefile
`allows deduction of running applications and modules by the
`VM 119.
`Tn an embodiment, the security system 140 is configured
`to read process identification number (PID)files and check
`their access or write times, which are matched against
`process descriptors. The PID can be used to deduce which
`processes are running, and hencethe priority of vulnerabili-
`ties detected in processes existing on the disk. It should be
`noted the PID files are also maintained in the snapshot.
`In yet another embodiment, the security system 140 is
`configured to detect cyber threats that do not represent
`vulnerabilities. For example, the security system 140 may
`detect and alert on sensitive data not being encrypted on the
`logical disk, private keys found on the disks, system cre-
`dentials stored clearly on the disk, risky application features
`(c.g., support of weak cipher suites or authentication meth-
`ods), weak passwords, weak encryption schemes, a disable
`address space layout randomization (ASLR) feature, suspi-
`cious manipulation to a boot record, suspicious PATH,
`LD_LIBRARY_PATH, or LD_PRELOADdefinitions, ser-
`vices running on startup, and thelike.
`In an embodiment, the security system 140 may further
`monitor changes in sensitive machine areas, and alert on
`unexpected changes(e.g., added or changed application files
`withoutinstallation). In an example embodiment, this can be
`achieved by computing a cryptographic hashofthe sensitive
`areas in the virtual disk and checking for differences over
`time.
`In some embodiments, the detected cyber threats (includ-
`ing vulnerabilities) are reported to a user console 180 and/or
`a security information and event management (SIEM) sys-
`tem (not shown). The reported cyber threats may be filtered
`or prioritized based inpart on their determined risk. Further,
`the reported cyber threats may be filtered or prioritized
`based in part on the risk level of the machine. This also
`reduces the numberofalerts reported to the user.
`In an embodiment, any detected cyber threats related to
`sensitive data (including personally identifiable information,
`PID) is reported at a higherpriority. In an embodiment, such
`data is determined by searching for the PII, analyzing the
`application logs to determine whether the machine accessed
`PIVPI containing servers, or whether the logs themselves
`contain PII, and searching the machine memory,as reflected
`in the pagefile, for PII.
`In an embodiment, the security system 140 may deter-
`mine the risk of the VM 119 based on communication with
`
`20
`
`25
`
`40
`
`45
`
`an untrusted network. This can be achieved by analyzing the
`VM’s 119 logsas savedin the virtual disk and can be derived
`from the snapshot.
`In an example embodiment, the security system 140 may
`cause an execution of one or more mitigation actions.
`Examples of such actions may include blockingtraflic from
`untrusted networks, halting the operation of the VM. quar-
`antining an infected VM,andthe like. The mitigation actions
`may be performed by a mitigation tool and. not the system
`140.
`
`60
`
`65
`
`the example implementation
`It should be noted that
`shownin F'IG. 1 is described with respect to a single cloud
`
`

`

`US 11,431,735 B2
`
`7
`computing platform 110 hosting a single VM 119 ina single
`server 115, merely for simplicity purposes and without
`limitation on the disclosed embodiments.‘lypically, virtual
`machines are deployed and executed in a single cloud
`computing platform, a virtualized environment, or data
`center and can be protected without departing from the
`scope of the disclosure. It should be further noted that the
`disclosed embodiments can operate using multiple security
`systems 140, each of which may operate in a different client
`environment.
`FIG. 2 shows an example flowchart 200 illustrating a
`method for detecting cyber threats including potential vul-
`nerabilities in virtual machines executed in a cloud comput-
`ing platform according to some embodiments. The method
`may be performed by the security system 140.
`At $210, a request, for example,
`to scan a VM for
`vulnerabilities is received. The request may be received, or
`otherwise triggered every predefined time interval or upon
`detection of an external event. An external event may be a
`preconfigured event, such as a network event or abnormal
`event including, but not limited to, changesto infrastructure
`such as instantiation of an additional container on existing
`VM,image change on a VM, new VMcreated, unexpected
`shutdowns, access requests from unauthorized users, and the
`like. The request may at least designate an identifier of the
`VMto be scanned.
`At $220, a location of a snapshotof a virtual disk of the
`VMto be scanned is determined. In an embodiment, $220
`may include determining the virtual disk allocated for the
`VM,prior to determining the location of the snapshot. As
`noted above,
`this can be achieved by querying a cloud
`management console. At S230, a snapshotof the virtual disk
`is accessed, or otherwise copied.
`At $240, the snapshot is analyzed to detect cyber threats
`and potential vulnerabilities. S240 may be also include
`detecting cyber threats that do not represent vulnerabilities.
`Examples for cyber threats and vulnerabilities are provided
`above.
`
`
`
`In an embodiment, $240 may include comparing the
`snapshot to some baseline, which may include, but is not
`limited to, a copy of the image usedto create the VM,(e.g.,
`lists of applications, previous snapshots), cryptographic
`hashes gathered in the previous scan, analyzing logs of the
`VMs,
`instantiating a copy of the VM and executing the
`instance or applications executed by the VM in a sandbox,
`analyzing the machine memory,asreflected in the pagefile,
`or any combination of
`these techniques. Some example
`embodiments for analyzing the snapshots and the types of
`detected vulnerabilities and threats are provided above.
`At $250, the detected cyber threats and/or vulnerabilities
`are reported, for example,as alerts. In an embodiment, $250
`mayinclude filtering and prioritizing the reported alerts. In
`an embodiment, the prioritization is based, in part, on the
`risk level of a vulnerable machine. Thefiltering and priori-
`tizing allow to reduce the numberofalerts reported to the
`user. The filtering can be done performed on external
`intelligence on the likelihood of this vulnerability being
`exploited, analyzing the machine configuration in order to
`deduce the vulnerability relevancy, and correlating, the vul-
`nerability with the network location, and by weighting the
`risk of this machine being taken over by the attacker by
`taking into considerationthe criticality of the machinein the
`organizalion based by the contents stored or other assets
`accessible from the VM 110.
`
`At optional $260, a mitigation action may betriggered to
`mitigate a detected threat or vulnerability. A mitigation
`action may be executed by a mitigation tool andtriggered by
`
`20
`
`25
`
`40
`
`45
`
`60
`
`65
`
`8
`the system 140. Such an action may include blockingtraffic
`from untrusted networks, halting the operation of the VM,
`quarantining an infected VM,andthe like.
`FIG.3 is an example block diagram ofthe security system
`140 according to an embodiment. The security system 140
`includes a processing circuitry 310 coupled to a memory
`320, a storage 330, and a network interface 340. In an
`embodiment, the components of the security system 140
`may be communicatively connected via a bus 360.
`The processing circuitry 310 may be realized as one or
`more hardware logic components and circuits. For example,
`and without limitation, illustrative types of hardware logic
`components that can be used include field programmable
`gate arrays (FPGAs), application-specific integrated circuits
`(ASICs), application-specific standard products (ASSPs),
`system-on-a-chip systems (SOCs), general-purpose micro-
`processors, microcontrollers,
`digital
`signal processors
`(DSPs), and the like, or any other hardware logic compo-
`nents that can perform calculations or other manipulations of
`information.
`The memory 310 may be volatile (e.g., RAM, etc.),
`non-volatile (e.g., ROM, flash memory, etc.), or a combi-
`nation thereof. In one configuration, computer readable
`instructions to implement one or more embodiments dis-
`closed herein may be stored in the storage 330.
`In another embodiment, the memory 320 is configured to
`store software. Software shall be construed broadly to mean
`any type of instructions, whether referred to as software,
`firmware. middleware, microcode, hardware description
`language, or otherwise. Instructions may include code(e.g.,
`in source code format, binary code format, executable code
`format, or any other suitable format of code). The instruc-
`tions, when executed by the one or more processors, cause
`the processing circuitry 310 to perform the various processes
`described herein. Specifically,
`the
`instructions, when
`executed, cause the processing circuitry 310 to determine
`over-privileged roles vulnerabilities in serverless functions.
`The storage 330 may be magnetic storage, optical storage,
`and the like, and may be realized, for example, as flash
`memory or other memory technology, CD-ROM,Digital
`Versatile Disks (DVDs), hard-drives, SSD, or any other
`medium which can be used to store the desired information.
`The storage 330 may store communication consumption
`patterns associated with one or more communications
`devices.
`The network interface 340 allows the security system 140
`to communicate with the external systems, suchas intelli-
`gence systems, SIEM systems, mitigation systems, a cloud
`management console, a user console, and the like.
`It should be understood that the embodiments described
`herein are not limited to the specific architecture illustrated
`in FIG. 3, and other architectures may be equally used
`without departing from the scope of the disclosed embodi-
`ments.
`
`The various embodiments disclosed herein can be imple-
`mented as hardware, firmware, software, or any combination
`thereof. Moreover, the software is preferably implemented
`as an application program tangibly embodied on a program
`storage unit or computer readable medium consisting of
`parts, or of certain devices and/or a combination of devices.
`The application program may be uploaded to, and executed
`by, a machine comprising any suitable architecture. Prefer-
`ably, the machine is implemented on a computer platform
`having hardware such as one or more central processing
`units (“CPUs”). a memory, and input/output interfaces. ‘The
`computer platform may also include an operating system
`and microinstruction code. The various processes and func-
`
`

`

`US 11,431,735 B2
`
`9
`tions described herein may be either part of the microin-
`struction code or part of the application program, or any
`combination thereof, which may be executed by a CPU,
`whether or not such a computer or processor is explicitly
`shown. In addition, various other peripheral units may be
`connected to the computer platform such as an additional
`data storage unit and a printing unit. Furthermore, a non-
`transitory computer readable medium is any computer read-
`able medium except for a transitory propagating signal.
`As used herein, the phrase “at least one of” followed by
`a listing of items means that any of the listed items can be
`utilized individually, or any combination of two or more of
`the listed items can be utilized. For example, if a system is
`described as including “at least one of A, B, and C,” the
`system can include A alone; B alone; C alone; A and B in
`combination; B and C in combination; A and C in combi-
`nation; or A, B, and C in combination.
`All examples and conditional language recited herein are
`intended for pedagogical purposes to aid the reader in
`understanding the principles of the disclosed embodiment
`and the concepts contributed by the inventor to furthering
`the art, and are to be construed as being without limitation
`to such specifically recited examples and conditions. More-
`over, all statements herein reciting principles, aspects, and
`embodiments of the disclosed embodiments, as well as
`specific examples thereof, are intended to encompass both
`structural and functional equivalents thereof. Additionally, it
`is intended that such equivalents include both currently
`knownequivalents as well as equivalents developed in the
`future, ie., any elements developed that perform the same
`function, regardless of structure.
`
`ra 0
`
`20
`
`25
`
`30
`
`What is claimed is:
`
`35
`
`40
`
`1. A method for securing virtual cloud assets in a cloud
`computing environment against cyber threats, comprising:
`determininga location of a snapshotof at least one virtual
`disk of a protected virtual cloud asset, wherein the
`virtual cloud asset is instantiated in the cloud comput-
`ing environment;
`accessing the snapshot of the virtual disk based on the
`determined location; analyzing the snapshot of the
`protected virtual cloud asset to detect potential cyber
`threats risking the protected virtual cloud asset; and
`alerting detected potential cyber threats based on a deter-
`minedpriority.
`2. The method of claim 1, further comprising:
`prioritizing each of the detected potential cyber threats
`based on their respective risk to the protected virtual
`cloud asset; and
`mitigating a potential cyber threat posing a risk to the 5
`protected virtual cloud asset.
`3. The method of claim 1, wherein determining the
`location of the snapshot of at least one virtual disk further
`comprises:
`determining a virtual disk allocated to the protected
`virtual cloud asset.
`4. The method of claim 2, further comprising:
`querying

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket