-
公开(公告)号:US20220272111A1
公开(公告)日:2022-08-25
申请号:US17527466
申请日:2021-11-16
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
IPC分类号: H04L9/40
摘要: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
公开(公告)号:US20220407883A1
公开(公告)日:2022-12-22
申请号:US17711031
申请日:2022-04-01
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC分类号: H04L9/40
摘要: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
-
公开(公告)号:US20230018068A1
公开(公告)日:2023-01-19
申请号:US17829361
申请日:2022-06-01
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC分类号: H04L9/40
摘要: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
-