Deep application discovery and forensics for automated threat modeling
摘要:
In an embodiment, a method for deep application discovery and forensics of a reference system includes a computing device, such as an orchestrator, receiving and/or obtaining from an inspection layer executing on the reference system, during runtime of the reference system, architecture and configuration information describing the reference system. Also, the computing device generates, during runtime of the reference system, dependency matrices describing relationships between components of the reference system which allow for generation, during runtime of the reference system, at least one threat model describing vulnerabilities of the reference system based on the dependency matrices. The inspection layer identifies the applications and databases accessed by the applications. From this information, the inspection layer discovers components associated with the applications and databases, APIs, URIs, URLs, and individual processes spawned by the applications, along with storage tables, and store-procedures invoked between the applications and the databases.
信息查询
0/0