RUNTIME SECURITY ANALYTICS FOR SERVERLESS WORKLOADS

    公开(公告)号:US20220129540A1

    公开(公告)日:2022-04-28

    申请号:US17077592

    申请日:2020-10-22

    Abstract: Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats.

    DATA SECURITY AT CLOUD SCALE
    13.
    发明申请

    公开(公告)号:US20250005184A1

    公开(公告)日:2025-01-02

    申请号:US18345254

    申请日:2023-06-30

    Abstract: A method to protect data in a database. The method includes detecting an actual flow path for an API call between a source node and a destination node, determining whether the actual flow path for the API call deviates from an expected flow path for the API call, and in response to determining that the actual flow path for the API call deviates from the expected flow path by a predetermined threshold, denying access to data sought by the API call at the destination node.

    MICROSERVICE VISIBILITY AND CONTROL
    14.
    发明公开

    公开(公告)号:US20240305603A1

    公开(公告)日:2024-09-12

    申请号:US18647322

    申请日:2024-04-26

    CPC classification number: H04L61/4511

    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.

    Microservice visibility and control

    公开(公告)号:US11985107B2

    公开(公告)日:2024-05-14

    申请号:US18163979

    申请日:2023-02-03

    CPC classification number: H04L61/4511

    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.

    Continuous integrity validation-based control plane communication in a container-orchestration system

    公开(公告)号:US11770251B2

    公开(公告)日:2023-09-26

    申请号:US17016046

    申请日:2020-09-09

    CPC classification number: H04L9/3213 G06F9/5072 H04L9/0656 H04L9/3268

    Abstract: Techniques and mechanisms for providing continuous integrity validation-based control plane communication in a container-orchestration system, e.g., the Kubernetes platform. A worker node generates a nonce and forwards the nonce to a master node while requesting an attestation token. Using the nonce, the master node generates the attestation token and replies back to the worker node with the attestation token. The worker node validates the attestation token with a CA server to ensure that the master node is not compromised. The worker node sends its authentication credentials to the master node. The master node generates a nonce and forwards the nonce to the worker node while requesting an attestation token. Using the nonce, the worker node generates the attestation token and replies back to the master node with the attestation token. The master node validates the attestation token with the CA server to ensure that the worker node is not compromised.

    INFRASTRUCTURE AND POLICY ORCHESTRATION FOR SHARED WORKSPACES

    公开(公告)号:US20230254379A1

    公开(公告)日:2023-08-10

    申请号:US17667890

    申请日:2022-02-09

    CPC classification number: H04L67/141

    Abstract: Presented herein are techniques to facilitate infrastructure and policy orchestration in a shared workspace network environment. In one example, a method may include obtaining, by a service broker, a reservation request from a consumer network for a consumer, wherein the reservation request seeks a reservation to reserve, at least in part, at least one workspace device for the consumer for a workspace for a particular day and a particular time period; based on determining that the at least one workspace device is available, providing a response to the consumer network that includes a first indicator for identifying the reservation of the workspace and at least one second indicator identifying the at least one workspace device; and upon receiving a session request from the consumer network that includes the second indicator, establishing a management tunnel to interconnect the consumer network and the at least one workspace device via the service broker.

    INTEGRITY VERIFIED PATHS BETWEEN ENTITIES IN A CONTAINER-ORCHESTRATION SYSTEM

    公开(公告)号:US20220103570A1

    公开(公告)日:2022-03-31

    申请号:US17035065

    申请日:2020-09-28

    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.

    Integrity verified paths between entities in a container-orchestration system

    公开(公告)号:US11811784B2

    公开(公告)日:2023-11-07

    申请号:US17832159

    申请日:2022-06-03

    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.

Patent Agency Ranking