COMPLIANCE ENFORCEMENT VIA SERVICE DISCOVERY ANALYTICS

    公开(公告)号:US20220357954A1

    公开(公告)日:2022-11-10

    申请号:US17307482

    申请日:2021-05-04

    Abstract: Systems and techniques that facilitate compliance enforcement via service discovery analytics are provided. In various embodiments, a system can comprise a receiver component that can access one or more declarative deployment manifests associated with a computing application. In various instances, the system can comprise a dependency component that can build a dependency topology based on the one or more declarative deployment manifests. In various cases, the dependency topology can indicate dependencies among one or more computing objects that are declared by the one or more declarative deployment manifests. In various aspects, the system can comprise a compliance component that can determine, based on the dependency topology, whether the computing application satisfies one or more compliance standards.

    Compliance-aware runtime generation based on application patterns and risk assessment

    公开(公告)号:US10803177B2

    公开(公告)日:2020-10-13

    申请号:US15653676

    申请日:2017-07-19

    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.

    Compliance enforcement via service discovery analytics

    公开(公告)号:US11829766B2

    公开(公告)日:2023-11-28

    申请号:US17307482

    申请日:2021-05-04

    CPC classification number: G06F9/3838 G06F8/30 G06F8/75 G06F11/3604

    Abstract: Systems and techniques that facilitate compliance enforcement via service discovery analytics are provided. In various embodiments, a system can comprise a receiver component that can access one or more declarative deployment manifests associated with a computing application. In various instances, the system can comprise a dependency component that can build a dependency topology based on the one or more declarative deployment manifests. In various cases, the dependency topology can indicate dependencies among one or more computing objects that are declared by the one or more declarative deployment manifests. In various aspects, the system can comprise a compliance component that can determine, based on the dependency topology, whether the computing application satisfies one or more compliance standards.

    TRUSTED EXECUTION ENVIRONMENT FOR SERVICE MESH

    公开(公告)号:US20230155984A1

    公开(公告)日:2023-05-18

    申请号:US17530185

    申请日:2021-11-18

    CPC classification number: H04L63/0281

    Abstract: Techniques for managing and processing of configuration changes associated with a service container associated with a service mesh are presented. An application management component can determine immutable configuration data (ICD) relating to configuration change processing for the service container based on policies received from an application owner. A message processing component (MMC) of a service proxy associated with the service container can receive, via a control plane, a message associated with an untrusted entity. MMC can determine whether the message comprises a configuration change request relating to interaction between the application and the service mesh, and, if so, can determine whether to allow the service proxy to process the configuration change based on analysis of the configuration change and ICD. If ICD indicates the configuration change is not allowed, service proxy can discard the request. If ICD indicates the configuration change is allowed, service proxy can implement the configuration change.

    SECURITY VULNERABILITY MANAGEMENT
    19.
    发明申请

    公开(公告)号:US20220382876A1

    公开(公告)日:2022-12-01

    申请号:US17329448

    申请日:2021-05-25

    Abstract: A vulnerability management method includes analyzing a system environment to uncover one or more vulnerabilities. The method includes subsequently identifying one or more system weaknesses corresponding to the one or more uncovered vulnerabilities and analyzing a set of historical data to identify similar past vulnerabilities. The method further includes analyzing available information to extract one or more impacts of the identified similar past vulnerabilities and determining one or more impacts to the present system environment that would correspond to the extracted one or more impacts of the identified similar past vulnerabilities. The method additionally includes recommending one or more actions to remediate the uncovered vulnerabilities.

Patent Agency Ranking