Abstract:
Embodiments of the invention provide a method and an apparatus for generating a security document for a farm in a utility computing environment. In one method embodiment, the present invention accesses a farm specification in a utility computing environment (UCE) repository. In addition, information related to each device in the farm is accessed. Information criticality types and attributes are then collected for the farm, the information criticality matrix comprising information criticality types and attributes for each the device in the farm. The information criticality types and attributes are then combined with an abstract of a security plan to provide a complete farm security document.
Abstract:
Methods and systems for verifying that devices in a network are properly connected physically are described. A listing is received from a device in the network. The listing identifies other devices coupled to the device and also identifies which communication port of the device each of the other devices is coupled to. The listing is compared against reference information representing the design of the network. Discrepancies between the listing and the reference information are identified.