DEEP APPLICATION DISCOVERY AND FORENSICS FOR AUTOMATED THREAT MODELING

    公开(公告)号:US20210357509A1

    公开(公告)日:2021-11-18

    申请号:US17322874

    申请日:2021-05-17

    摘要: In an embodiment, a method for deep application discovery and forensics of a reference system includes a computing device, such as an orchestrator, receiving and/or obtaining from an inspection layer executing on the reference system, during runtime of the reference system, architecture and configuration information describing the reference system. Also, the computing device generates, during runtime of the reference system, dependency matrices describing relationships between components of the reference system which allow for generation, during runtime of the reference system, at least one threat model describing vulnerabilities of the reference system based on the dependency matrices. The inspection layer identifies the applications and databases accessed by the applications. From this information, the inspection layer discovers components associated with the applications and databases, APIs, URIs, URLs, and individual processes spawned by the applications, along with storage tables, and store-procedures invoked between the applications and the databases.

    Deep application discovery and forensics for automated threat modeling

    公开(公告)号:US11966476B2

    公开(公告)日:2024-04-23

    申请号:US17322874

    申请日:2021-05-17

    摘要: In an embodiment, a method for deep application discovery and forensics of a reference system includes a computing device, such as an orchestrator, receiving and/or obtaining from an inspection layer executing on the reference system, during runtime of the reference system, architecture and configuration information describing the reference system. Also, the computing device generates, during runtime of the reference system, dependency matrices describing relationships between components of the reference system which allow for generation, during runtime of the reference system, at least one threat model describing vulnerabilities of the reference system based on the dependency matrices. The inspection layer identifies the applications and databases accessed by the applications. From this information, the inspection layer discovers components associated with the applications and databases, APIs, URIs, URLs, and individual processes spawned by the applications, along with storage tables, and store-procedures invoked between the applications and the databases.