Abstract: The present application generally relates to methods, systems, and programming for detecting security issues within a computing environment. In some embodiments, data flows may be analyzed to determine links between data sources and metadata. Using the derived relationships, a determination may be made as to whether the is a security issue, such as a security policy ambiguity, or a potential security issue. If so, one or more actions may be taken to prevent or minimize an impact of the security issue.
Abstract: The present application generally relates to methods, systems, and programming for detecting security issues within a computing environment. In some embodiments, data flows may be analyzed to determine links between data sources and metadata. Using the derived relationships, a determination may be made as to whether the is a security issue, such as a security policy ambiguity, or a potential security issue. If so, one or more actions may be taken to prevent or minimize an impact of the security issue.