logo

Your company, as a Knowledge Graph - the foundation of cybersecurity’s future

2021-09-24

Authors:   Ovidiu Cical


Summary

Applying knowledge graph to cyber security will improve data organization and provide a contextual view of digital assets, resulting in a more effective cyber security program.
  • A knowledge graph can provide a map of all digital assets and their relationships, allowing for a contextual view of data
  • Importing data from various sources, such as HR tools, can create an abstract layer for the knowledge graph
  • Using a knowledge graph can surface vulnerabilities and prioritize mediation
  • Managed services, such as Amazon Web Services Neptune, can be leveraged for a graph database system
  • Tools like Cartography and OpenCSPM can be used to map assets and create relationships
Imagine being able to import and create a mapping not just of laptops, but also of the people who have access to those laptops and what type of vulnerabilities are in that specific endpoint. All of this can be surfaced from a contextual view of all of these digital assets.

Abstract

Merging the knowledge graph model with cloud security posture management results in an innovative new technology called Security Knowledge Graph.It uses a data model that maps networks of cloud entities in an exhaustive graph which supports automated reasoning across multi-cloud infrastructures. The Security Knowledge Graph will surface crucial issues of all your interlinked cloud assets, helping you improve your security and data governance procedures.Welcome to your connected organization, as a Knowledge Graph.

Materials: