Wiz, Inc. (20240267389). SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS

Organization Name

Wiz, Inc.

Inventor(s)

Avi Tal Lichtenstein of Tel Aviv (IL)

Ami Luttwak of Binyamina (IL)

Daniel Hershko Shemesh of Givat-Shmuel (IL)

SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240267389 titled 'SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYS

The patent application describes a system and method for detecting potential lateral movement using cloud keys in a cloud computing environment. This involves identifying compromised nodes in a security graph representing cloud entities, detecting cloud key nodes connected to these compromised nodes, and generating potential lateral movement paths between them.

  • The system determines compromised nodes in a security graph representing cloud entities.
  • It detects cloud key nodes connected to these compromised nodes.
  • It generates potential lateral movement paths between compromised nodes and cloud key nodes.

Potential Applications: - Enhancing security in cloud computing environments. - Preventing unauthorized lateral movement within cloud networks.

Problems Solved: - Detecting and preventing potential lateral movement in cloud computing environments. - Enhancing overall security and data protection in cloud networks.

Benefits: - Improved detection of security threats. - Enhanced protection against unauthorized access. - Increased overall security of cloud computing environments.

Commercial Applications: Title: "Enhancing Cloud Security with Lateral Movement Detection" This technology can be utilized by cloud service providers, IT security companies, and businesses utilizing cloud computing services to enhance the security of their networks and protect sensitive data from unauthorized access.

Questions about the technology: 1. How does this system improve security in cloud computing environments? - This system enhances security by detecting and preventing potential lateral movement within cloud networks, reducing the risk of unauthorized access to sensitive data. 2. What are the key features of this technology that set it apart from existing security measures? - The system's ability to detect compromised nodes and cloud key nodes, and generate potential lateral movement paths, provides a unique approach to enhancing security in cloud computing environments.


Original Abstract Submitted

a system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.