US 12,170,682 B1
Application endpoint cybersecurity techniques
Matilda Lidgi, Tel Aviv (IL); Danielle Aminov, Tel Aviv (IL); Eliran Marom, Yehud-Monoson (IL); Ron David Ben Arzi, Tel Aviv (IL); Rotem Lipowitch, Tel Aviv (IL); and Amitai Cohen, Kfar Saba (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Jan. 29, 2024, as Appl. No. 18/425,847.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1425 (2013.01) [H04L 63/1433 (2013.01); H04L 63/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for application endpoint validation and securement, comprising:
detecting an application endpoint on a resource already deployed in a computing environment;
generating in a security database: a representation of the application endpoint, and a representation of the resource, wherein the security database includes a representation of the computing environment;
determining the existence of at least one already existing network path between the resource and an external network, the network path including the application endpoint and a reachability parameter;
initiating active inspection of the application endpoint over the network path; and
initiating a mitigation action in the computing environment in response to determining through active inspection that the application endpoint is exposed to the external network.