COMPLIANCE POLICY MANAGEMENT AND SCHEDULING

    公开(公告)号:US20210055933A1

    公开(公告)日:2021-02-25

    申请号:US16546775

    申请日:2019-08-21

    Abstract: Systems, computer-implemented methods, and computer program products that can facilitate compliance policy management and scheduling are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a policy analyzer component that identifies one or more dependency relationships between a first compliance policy and one or more second compliance policies. The computer executable components can further comprise a scheduler component that generates a policy execution plan based on the one or more dependency relationships.

    COMPLIANCE-AWARE RUNTIME GENERATION BASED ON APPLICATION PATTERNS AND RISK ASSESSMENT

    公开(公告)号:US20190026474A1

    公开(公告)日:2019-01-24

    申请号:US15842534

    申请日:2017-12-14

    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.

    COMPLIANCE-AWARE RUNTIME GENERATION BASED ON APPLICATION PATTERNS AND RISK ASSESSMENT

    公开(公告)号:US20190026472A1

    公开(公告)日:2019-01-24

    申请号:US15653676

    申请日:2017-07-19

    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.

Patent Agency Ranking