20240031376. SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS simplified abstract (Wiz, Inc.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS

Organization Name

Wiz, Inc.

Inventor(s)

Avi Tal Lichtenstein of Tel Aviv (IL)

Ami Luttwak of Binyamina (IL)

Daniel Hershko Shemesh of Givat-Shmuel (IL)

SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240031376 titled 'SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS

Simplified Explanation

The patent application describes a system and method for detecting potential lateral movement in a cloud computing environment using cloud keys. Here is a simplified explanation of the abstract:

  • The system identifies a compromised node in a security graph that represents cloud entities in the cloud computing environment.
  • It detects a cloud key node connected to the compromised node, where the cloud key node represents a cloud key of the cloud computing environment.
  • The system generates a potential lateral movement path that includes the compromised node and a second node connected to the cloud key node.

Potential applications of this technology:

  • Cloud security: The system can be used to detect and prevent lateral movement within a cloud computing environment, enhancing overall security.
  • Intrusion detection: By identifying compromised nodes and potential lateral movement paths, the system can help in detecting and mitigating intrusions in the cloud environment.

Problems solved by this technology:

  • Lateral movement detection: The system addresses the challenge of detecting potential lateral movement within a cloud computing environment, which is crucial for preventing unauthorized access and data breaches.
  • Cloud security management: By identifying compromised nodes and cloud keys, the system helps in managing and securing the cloud environment effectively.

Benefits of this technology:

  • Enhanced security: The system improves the security of cloud computing environments by detecting and preventing potential lateral movement, reducing the risk of unauthorized access and data breaches.
  • Efficient intrusion detection: By automating the detection of compromised nodes and potential lateral movement paths, the system enables faster and more accurate intrusion detection, minimizing the impact of security incidents.


Original Abstract Submitted

a system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.