Wiz, Inc. (20240223614). SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH

Organization Name

Wiz, Inc.

Inventor(s)

Roy Reznik of Tel Aviv (IL)

Matilda Lidgi of Tel Aviv (IL)

Shai Keren of Tel Aviv (IL)

Eliran Marom of Yehud-Monoson (IL)

SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240223614 titled 'SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH

The abstract describes a system and method for applying a policy on a network path, specifically in a cloud computing environment. The method involves selecting a reachable resource with a network path, inspecting the external network path to ensure accessibility, applying a policy on the valid path, and initiating a mitigation action if the policy is violated.

  • Selecting a reachable resource in a cloud computing environment
  • Actively inspecting the external network path for accessibility
  • Applying a policy on the valid network path
  • Initiating a mitigation action if the policy is violated

Potential Applications: - Network security in cloud computing environments - Policy enforcement in network paths - Mitigation actions for policy violations

Problems Solved: - Ensuring network path accessibility - Policy enforcement in cloud environments - Mitigating policy violations effectively

Benefits: - Enhanced network security - Improved policy compliance - Efficient mitigation of policy violations

Commercial Applications: Title: Network Security Policy Enforcement System This technology can be used in cloud service providers, data centers, and network security companies to enhance policy enforcement and mitigate security risks effectively.

Questions about the technology: 1. How does this system improve network security in cloud computing environments? 2. What are the key advantages of actively inspecting external network paths for policy enforcement?


Original Abstract Submitted

a system and method for applying a policy on a network path is presented. the method includes: selecting a reachable resource having a network path to access the reachable resource, wherein the reachable resource is deployed in a cloud computing environment, having access to an external network; actively inspecting an external network path to determine if the network path of the reachable resource is accessible from the external network; determining that the network path is a valid path, in response to determining that the reachable resource is accessible from the external network path; applying a policy on the valid path; and initiating a mitigation action, in response to determining that the policy is violated.