Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.
Type:
Grant
Filed:
July 16, 2024
Date of Patent:
March 11, 2025
Assignee:
Wiz, Inc.
Inventors:
Mattan Shalev, Yaniv Shaked, Gal Kozoshnik, Omri Kornblau, Roy Reznik, Ami Luttwak, Yinon Costica
Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.
Type:
Application
Filed:
July 16, 2024
Publication date:
March 6, 2025
Applicant:
Wiz, Inc.
Inventors:
Mattan SHALEV, Yaniv SHAKED, Gal KOZOSHNIK, Omri KORNBLAU, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA
Abstract: A system and method for generating a database query based on a natural language query improves database utilization is presented. The method includes receiving a natural language query directed to a security database, wherein the security database includes a representation of a computing environment; selecting a first database query from a plurality of database queries; generating a second database query based on the first database query adapted by the received natural language query; and executing the second database query on the security database.
Type:
Application
Filed:
April 30, 2024
Publication date:
March 6, 2025
Applicant:
Wiz, Inc.
Inventors:
Alon SCHINDEL, Barak SHARONI, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.
Type:
Application
Filed:
September 17, 2024
Publication date:
March 6, 2025
Applicant:
Wiz, Inc.
Inventors:
Mattan SHALEV, Yaniv SHAKED, Gal KOZOSHNIK, Omri KORNBLAU, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA
Abstract: A system and method for providing cybersecurity incident response is presented. The method includes receiving an incident input based on an event in a computing environment; generating an input for a generative artificial intelligence (AI) based on the received incident input; utilizing the generative AI to generate an output based on the generated input; utilizing the generative AI to associate the received incident input with an incident response action of a plurality of incident response actions; generating a query based on the received incident; executing the query on a security database, the security database including a representation of the computing environment; and initiating a mitigation action based on a result of the executed query and the associated incident response action.
Type:
Application
Filed:
August 9, 2024
Publication date:
March 6, 2025
Applicant:
Wiz, Inc.
Inventors:
Alon SCHINDEL, Barak SHARONI, Amitai COHEN, Ami LUTTWAK, Roy REZNIK, Yinon COSTICA
Abstract: A system and method for evaluating definitions from a markup language document for agentless host configuration includes generating an inspectable disk based on a disk of a host, the host deployed in a virtualized computing environment. The system is configured to: receive a markup language document, the markup language document including a plurality of definitions, each definition including a data element; inspect the inspectable disk for a cybersecurity object corresponding to a first data element of a first definition of the plurality of definitions; evaluate the first definition further based on the cybersecurity object to generate an evaluated first definition result, in response to determining that the definition is evaluable; generate an output based on the evaluated first definition result; and generate the output based on a predetermined notification, in response to determining that the definition is unevaluable.
Type:
Grant
Filed:
September 8, 2022
Date of Patent:
March 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Yaniv Shaked, Mattan Shalev, Gal Kozoshnik, Daniel Klein, Roy Reznik, Ami Luttwak
Abstract: A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.
Type:
Grant
Filed:
April 26, 2024
Date of Patent:
March 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Avihai Berkovitz, George Pisha, Yaniv Joseph Oliver, Udi Reitblat, Or Heller, Raaz Herzberg, Osher Hazan, Niv Roit Ben David
Abstract: A system and method for performing active inspection of vulnerability exploitation in a cloud computing environment. The method includes receiving at least one network path to access a first resource, wherein the first resource is a cloud object is deployed in the cloud computing environment and having a known vulnerability, wherein the first resource is potentially accessible from a network which is external to the cloud computing environment; actively inspecting the at least one network path to determine if the first resource is accessible through the at least one network path from a network external to the cloud computing environment; and triggering the known vulnerability to determine if the first resource can be exploited with the known vulnerability, in response to determining that the first resource is accessible through the external network.
Type:
Grant
Filed:
April 13, 2022
Date of Patent:
March 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Matilda Lidgi, Shai Keren, Raaz Herzberg, Avi Tal Lichtenstein, Ami Luttwak, Roy Reznik
Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.
Type:
Grant
Filed:
March 26, 2024
Date of Patent:
February 18, 2025
Assignee:
Wiz, Inc.
Inventors:
Avi Tal Lichtenstein, Ami Luttwak, Daniel Hershko Shemesh
Abstract: A technique and method for detection and display of the cybersecurity risk context of a cloud environment initiates an inspection of cybersecurity objects within a cloud environment utilizing an inspection environment and stores information pertaining to discovered cybersecurity objects within the inspected cloud environment in a storage environment. The technique and method further generate a cybersecurity risk context for the inspected cloud environment based on the observations made concerning the cybersecurity objects contained within it. The technique and method further configure a web browser running on a client device to automatically display the generated cybersecurity risk context to a user, either through a web page overlay or through a toolbar plugin which has been installed in the web browser and configured to enable inspections of a cloud environment, once the user has navigated to a web page containing cybersecurity object identifiers.
Type:
Grant
Filed:
March 27, 2024
Date of Patent:
February 18, 2025
Assignee:
Wiz, Inc.
Inventors:
Tomer Gil Levi, Yinon Costica, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener
Abstract: A system and method for preventing cloud identity misuse in a cloud computing environment is presented. The method includes: deploying a runtime sensor on a workload in a cloud computing environment; detecting an event in a cloud log, the event including an identifier of the workload; associating a runtime process detected by the runtime sensor on the workload with the event detected in the cloud log; generating an enriched event based on: the detected event, and an identifier of the associated runtime process; applying a policy on the enriched event; and initiating a mitigation action in the cloud computing environment based on a result of applying the policy on the enriched event.
Type:
Grant
Filed:
March 29, 2024
Date of Patent:
February 18, 2025
Assignee:
Wiz, Inc.
Inventors:
Ami Luttwak, Alon Schindel, Shir Tamari, Ron Cohen
Abstract: A system and method for associating an event in a cloud computing log to a process running on a workload is presented. The method includes: configuring a workload deployed in a cloud computing environment to deploy thereon a sensor, the sensor configured to detect a runtime process on the workload, the runtime process utilizing an identity; detecting in a log of the cloud computing environment an event based on an identifier of the workload, the log including a plurality of events; inspecting a code object for a cybersecurity object, the code object utilized in deploying the workload in the cloud computing environment; associating the runtime process with the event based on an identifier of the workload and the cybersecurity object, wherein the cybersecurity object indicates the identity; and generating an enriched log including an identifier of the runtime process associated with the event and the cybersecurity object.
Type:
Grant
Filed:
March 29, 2024
Date of Patent:
February 11, 2025
Assignee:
Wiz, Inc.
Inventors:
Ami Luttwak, Alon Schindel, Shir Tamari, Ron Cohen
Abstract: A system and method reduces use of restricted operations in a cloud computing environment during cybersecurity threat inspection. The method includes: detecting an encrypted disk in a cloud computing environment, the encrypted disk encrypted utilizing a first key in a key management system (KMS); generating a second key in the KMS, the second key providing access for a principal of an inspection environment; generating a snapshot of the encrypted disk; generating a volume based on the snapshot, wherein the volume is re-encrypted with the second key; generating a snapshot of the re-encrypted volume; generating an inspectable disk from the snapshot of the re-encrypted volume; and initiating inspection for a cybersecurity object on the inspectable disk.
Type:
Grant
Filed:
April 29, 2024
Date of Patent:
February 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Shahar Rand, Eric Abramov, Yaniv Shaked, Elad Gabay
Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a generic key is disclosed. The method includes: detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a default key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the default key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
Type:
Grant
Filed:
October 4, 2023
Date of Patent:
February 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Yaniv Shaked, Eyal Moscovici
Abstract: A system and method for applying cybersecurity policies across multiple computing environments is presented.
Type:
Grant
Filed:
December 29, 2023
Date of Patent:
February 4, 2025
Assignee:
Wiz, Inc.
Inventors:
Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Raaz Herzberg, Yaniv Joseph Oliver, Osher Hazan, Niv Roit Ben David
Abstract: A system and method for detecting cybersecurity risk on a resource in a computing environment utilizes static analysis of a cloned resource and runtime data from the live resource. The method includes: configuring a resource deployed in a computing environment to deploy thereon a sensor, the sensor configured to detect runtime data; detecting runtime data from the sensor of the resource; generating an inspectable disk based on an original disk of the resource; initiating inspection based on the detected runtime data for a cybersecurity object on the inspectable disk; detecting the cybersecurity object on an inspectable disk; and initiating a mitigation action on the resource.
Type:
Grant
Filed:
January 31, 2024
Date of Patent:
January 28, 2025
Assignee:
Wiz, Inc.
Inventors:
Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Aviel Fogel, Udi Reitblat, Alon Schindel
Abstract: A system and method for inspecting managed workloads in a cloud computing environment for cybersecurity threats improves inspection of managed workload service repositories, by only inspecting bases of managed workload deployed in the cloud computing environment. The method includes discovering a managed workload deployed in a cloud computing environment; determining an identifier of the managed workload, wherein the identifier includes an indicator to a base repository in which a base is stored, and wherein the managed workload is currently deployed in the cloud computing environment, the base repository further storing a plurality of bases, wherein a portion of the plurality of bases do not correspond to a deployed workload; accessing the base repository to pull the base; and inspecting the base of the deployed managed workload for a cybersecurity threat.
Type:
Application
Filed:
March 1, 2024
Publication date:
January 9, 2025
Applicant:
Wiz, Inc.
Inventors:
Niv Roit BEN DAVID, Yaniv SHAKED, Yarin MIRAN, Raaz HERZBERG, Amir LANDE BLAU
Abstract: A system and method for detecting potential lateral movement using cloud keys in a cloud computing environment includes determining a first node in a security graph is a compromised node, wherein the security graph represents cloud entities of the cloud computing environment; detecting a cloud key node connected to the first node, wherein the cloud key node represents a cloud key of the cloud computing environment; and generating a potential lateral movement path, including the first node, and a second node, wherein the second node is connected to the cloud key node.
Type:
Application
Filed:
September 17, 2024
Publication date:
January 9, 2025
Applicant:
Wiz, Inc.
Inventors:
Avi Tal LICHTENSTEIN, Ami LUTTWAK, Daniel Hershko SHEMESH