-
公开(公告)号:US11968101B1
公开(公告)日:2024-04-23
申请号:US18318536
申请日:2023-05-16
Applicant: Splunk Inc.
Inventor: Chakravarthy Sridhar , Minjie Qiu , Atif Mahadik
IPC: H04L41/22 , G06F3/0482 , H04L9/40 , H04L12/46 , H04L41/0681 , H04L41/08 , H04L41/0816 , H04L41/0894 , H04L41/5054
CPC classification number: H04L41/5054 , G06F3/0482 , H04L12/4633 , H04L41/0681 , H04L41/0816 , H04L41/0886 , H04L41/0894 , H04L41/22 , H04L63/0263 , H04L63/0281 , H04L63/1441 , H04L63/20
Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.
-
公开(公告)号:US11895143B2
公开(公告)日:2024-02-06
申请号:US17326070
申请日:2021-05-20
Applicant: Splunk Inc.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
IPC: H04L9/40 , G06F21/55 , G06F16/28 , H04L47/2425
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20 , H04L47/2425
Abstract: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.
-
公开(公告)号:US11805148B2
公开(公告)日:2023-10-31
申请号:US17513595
申请日:2021-10-28
Applicant: Splunk Inc.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
IPC: H04L9/40 , G06F21/55 , G06F16/28 , H04L47/2425 , H04L29/06
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20 , H04L47/2425
Abstract: Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one example, an advisement system identifies a rule set for a security incident based on enrichment information obtained for the security incident, wherein the rule set is associated with action recommendations to be taken against the incident. The advisement system further identifies a default SLA for the security incident based on the rule set, and obtains environmental characteristics related to the security incident. Based on the environmental characteristics, the advisement system determines a modified SLA for the security incident.
-
公开(公告)号:US11765198B2
公开(公告)日:2023-09-19
申请号:US17185612
申请日:2021-02-25
Applicant: Splunk Inc.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
IPC: H04L9/40 , G06F21/55 , G06F16/28 , H04L47/2425
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20 , H04L47/2425
Abstract: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.
-
公开(公告)号:US11716260B2
公开(公告)日:2023-08-01
申请号:US17960310
申请日:2022-10-05
Applicant: Splunk Inc.
Inventor: Chakravarthy Sridhar , Minjie Qiu , Atif Mahadik
IPC: H04L41/22 , H04L41/00 , H04L41/0816 , H04L41/0681 , H04L41/08 , H04L41/0894 , H04L41/5054 , G06F3/0482 , H04L12/46 , H04L9/40 , G06F8/34
CPC classification number: H04L41/5054 , G06F3/0482 , G06F8/34 , H04L12/4633 , H04L41/0681 , H04L41/0816 , H04L41/0886 , H04L41/0894 , H04L41/20 , H04L41/22 , H04L63/0263 , H04L63/0281 , H04L63/1441 , H04L63/20
Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.
-
公开(公告)号:US11496371B2
公开(公告)日:2022-11-08
申请号:US17222789
申请日:2021-04-05
Applicant: Splunk Inc.
Inventor: Chakravarthy Sridhar , Minjie Qiu , Atif Mahadik
IPC: H04L41/5054 , H04L41/22 , H04L12/46 , H04L41/14 , H04L41/00 , H04L41/0816 , H04L41/0681 , G06F3/0482 , H04L9/40 , G06F8/20 , G06F8/34
Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.
-
公开(公告)号:US11019092B2
公开(公告)日:2021-05-25
申请号:US14677493
申请日:2015-04-02
Applicant: SPLUNK INC.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
IPC: H04L29/06 , G06F21/55 , G06F16/28 , H04L12/851
Abstract: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.
-
8.
公开(公告)号:US20210092152A1
公开(公告)日:2021-03-25
申请号:US17033146
申请日:2020-09-25
Applicant: Splunk Inc.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
Abstract: Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.
-
9.
公开(公告)号:US10834120B2
公开(公告)日:2020-11-10
申请号:US14868553
申请日:2015-09-29
Applicant: SPLUNK INC.
Inventor: Sourabh Satish , Oliver Friedrichs , Atif Mahadik , Govind Salinas
IPC: H04L29/06 , G06F21/55 , G06F16/28 , H04L12/851
Abstract: Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.
-
10.
公开(公告)号:US10742484B1
公开(公告)日:2020-08-11
申请号:US16051183
申请日:2018-07-31
Applicant: Splunk Inc.
Inventor: Oliver Friedrichs , Atif Mahadik , Govind Salinas , Sourabh Satish
Abstract: Described herein are systems, methods, and software to enhance the management of responses to incidents. In one example, a method of improving incident response comprises identifying an incident in an information technology (IT) environment associated with a first entity of a plurality of entities, and identifying action implementation information related to the incident. The method further anonymizes the action implementation information for the incident, and determines action suggestions based at least on the anonymized action implementation information.
-
-
-
-
-
-
-
-
-