Multidimensional vectors for analyzing and visually displaying identity permissions

    公开(公告)号:US10749910B1

    公开(公告)日:2020-08-18

    申请号:US16857874

    申请日:2020-04-24

    Abstract: Disclosed embodiments relate to systems and methods for multidimensional vectors for analyzing and visually displaying identity permissions. Techniques include identifying a plurality of identities, privileges used by the identities, and data associated with the identities, developing privilege vectors based on the identified information, and generating groupings of the identities based on the privilege vectors. Further techniques include generating a group score for an identity grouping, using the group score to determine if the grouping is a least privilege grouping, and updating the privileges of the identities within the grouping.

    Static and dynamic correlation of software development pipeline events

    公开(公告)号:US11500985B1

    公开(公告)日:2022-11-15

    申请号:US17731738

    申请日:2022-04-28

    Abstract: Disclosed embodiments relate to systems and methods for correlating software pipeline events. Techniques include receiving first data representing at least one aspect of a first software pipeline event; identifying a value as a potential identifier of the first software pipeline event; storing the value in a data structure in an associative manner with the first software pipeline event; receiving second data representing at least one aspect of a second software pipeline event; identifying an additional value as a potential identifier of the second software pipeline event; comparing additional value to the value stored in the data structure; based on the comparison, determining whether a correlation exists between the first software pipeline event and the second software pipeline event; and based on a determination that a correlation exists, providing an indication of the correlation.

    Developing least-privilege permission sets based on global optimization

    公开(公告)号:US11178154B1

    公开(公告)日:2021-11-16

    申请号:US17130428

    申请日:2020-12-22

    Inventor: Michael Balber

    Abstract: Disclosed embodiments relate to iteratively developing least-privilege profiles for network entities. Operations may include accessing a set of permissions associated with a network entity; obtaining a set of permission vectors for the network entity; evaluating each permission within the set of permission vectors, the evaluation being based on at least: whether each permission within the set of permission vectors provides sufficient authorization privileges for the network entity to perform an action, and a number of permissions in the set of permission vectors; selecting a group of the set of permission vectors; creating a new set of permission vectors for the network entity; iterating the evaluation for the new set of permission vectors; determining, following at least one instance of the iteration, whether an iteration termination condition has been met; and terminating the iteration based on the iteration termination condition being met.

    Dynamically generating multi-factor entity risk assessments within virtualized environments

    公开(公告)号:US12028366B2

    公开(公告)日:2024-07-02

    申请号:US17199069

    申请日:2021-03-11

    CPC classification number: H04L63/1433 H04L63/105 H04L63/1416 H04L63/20

    Abstract: Disclosed embodiments relate to systems and methods for dynamically performing entity-specific security assessments for entities of virtualized network environments. Techniques include identifying an entity associated with a virtualized network environment, identifying a plurality of security factors, determining entity-specific weights to the plurality of security factors, and generating a composite exposure assessment for the entity. Further techniques include selecting at least two security factors of the plurality of security factors, identifying the weights corresponding to the selected security factors, and calculating the composite exposure assessment using the selected security factors and corresponding weights, analyzing the composite exposure assessment, and generating at least one of: a security recommendation based on the analysis to alter a scope of privileges of the entity, a notification providing an indication of the composite exposure assessment, or a visual representation of the composite exposure assessment of the entity.

    Multidimensional vectors for analyzing and visually displaying identity permissions

    公开(公告)号:US11038927B1

    公开(公告)日:2021-06-15

    申请号:US16936516

    申请日:2020-07-23

    Abstract: Disclosed embodiments relate to systems and methods for multidimensional vectors for analyzing and visually displaying identity permissions. Techniques include identifying a plurality of identities, privileges used by the identities, and data associated with the identities, developing privilege vectors based on the identified information, and generating groupings of the identities based on the privilege vectors. Further techniques include generating a group score for an identity grouping, using the group score to determine if the grouping is a least privilege grouping, and updating the privileges of the identities within the grouping.

    Developing least-privilege permission sets based on global optimization

    公开(公告)号:US11943228B2

    公开(公告)日:2024-03-26

    申请号:US17511985

    申请日:2021-10-27

    Inventor: Michael Balber

    CPC classification number: H04L63/104 H04L63/20

    Abstract: Disclosed embodiments relate to iteratively developing profiles for network entities. Operations may include accessing a set of permissions associated with a network entity; obtaining a set of permission vectors for the network entity based on the set of permissions; evaluating each permission vector within the set of permission vectors for iteratively developing a profile for the network entity, the evaluation being based on at least: whether each permission vector within the set of permission vectors provides sufficient privileges for the network entity to perform an action, and a predefined rule; creating a new set of permission vectors for the network entity based on at least the selected group of the set of permission vectors; iterating the evaluation for the new set of permission vectors; determining whether an iteration termination condition has been met; and terminating the iteration based on the iteration termination condition being met.

    Isolation and authorization for segregated command and query database resource access

    公开(公告)号:US11907394B1

    公开(公告)日:2024-02-20

    申请号:US18080273

    申请日:2022-12-13

    CPC classification number: G06F21/6227 G06F21/31 G06F21/604

    Abstract: Disclosed embodiments relate to systems and methods for securely performing actions on a resource. Techniques include receiving a request by the entity to perform a privileged action on a resource, the request including a token associated with the entity; providing a first indication of the request to a first handler; providing a second indication of the request to a second handler configured to perform the privileged action on the resource, wherein when the privileged action includes a query, the second indication of the request is provided to a query handler, and when the privileged action includes a write command, the second indication of the request is provided to a command handler.

    ANALYZING SCRIPTS TO CREATE AND ENFORCE SECURITY POLICIES IN DYNAMIC DEVELOPMENT PIPELINES

    公开(公告)号:US20230367911A1

    公开(公告)日:2023-11-16

    申请号:US18185276

    申请日:2023-03-16

    CPC classification number: G06F21/64 G06F8/427

    Abstract: Disclosed embodiments relate to systems and methods for enforcing security policies in dynamic development pipelines. Techniques include accessing a build script, including a set of instructions for a software build process, parsing the build script to identify a set of scripted build instructions, determining a set of expected build actions based on the scripted build instructions, and constructing a representation of the set of expected build actions. The techniques may further include automatically generating a tiered security policy based on the representation of the set of expected build actions, monitoring a dynamic pipeline running the build script, and enforcing the security policy for the dynamic pipeline environment.

    Static and dynamic correlation of software development pipeline events

    公开(公告)号:US11693651B1

    公开(公告)日:2023-07-04

    申请号:US17984856

    申请日:2022-11-10

    CPC classification number: G06F8/70 H04L63/10

    Abstract: Disclosed embodiments relate to systems and methods for correlating software pipeline events. Techniques include receiving first data representing at least one aspect of a first software pipeline event; identifying a value as a potential identifier of the first software pipeline event; storing the value in a data structure in an associative manner with the first software pipeline event; receiving second data representing at least one aspect of a second software pipeline event; identifying an additional value as a potential identifier of the second software pipeline event; comparing additional value to the value stored in the data structure; based on the comparison, determining whether a correlation exists between the first software pipeline event and the second software pipeline event; and based on a determination that a correlation exists, providing an indication of the correlation.

    Analyzing scripts to create and enforce security policies in dynamic development pipelines

    公开(公告)号:US11609985B1

    公开(公告)日:2023-03-21

    申请号:US17741533

    申请日:2022-05-11

    Abstract: Disclosed embodiments relate to systems and methods for enforcing security policies in dynamic development pipelines. Techniques include accessing a build script, including a set of instructions for a software build process, parsing the build script to identify a set of scripted build instructions, determining a set of expected build actions based on the scripted build instructions, and constructing a representation of the set of expected build actions. The techniques may further include automatically generating a security policy based on the representation of the set of expected build actions, monitoring a build machine running the build script, and enforcing the security policy on the build machine.

Patent Agency Ranking