GROUP PATCHING RECOMMENDATION AND/OR REMEDIATION WITH RISK ASSESSMENT

    公开(公告)号:US20190129705A1

    公开(公告)日:2019-05-02

    申请号:US15800612

    申请日:2017-11-01

    IPC分类号: G06F9/445 G06N99/00

    摘要: Techniques that facilitate group patching recommendation and/or remediation with risk assessment are provided. In one example, a system includes a vertical stack component, a horizontal stack component and a risk classification component. The vertical stack component identifies a first patch profile from a software system associated with a computer system environment. The horizontal stack component identifies a second patch profile from a hardware system associated with network nodes of the computer system environment. The system learns over time to identify repetitive patterns using machine learning techniques. Then, the risk classification component performs a machine learning process to determine a risk classification for the computer system environment based on the first patch profile and the second patch profile.

    Compliance content generation
    22.
    发明授权

    公开(公告)号:US11972255B2

    公开(公告)日:2024-04-30

    申请号:US17358166

    申请日:2021-06-25

    IPC分类号: G06F8/30 G06F8/10 G06F8/73

    CPC分类号: G06F8/73 G06F8/10 G06F8/31

    摘要: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.

    Compliance process risk assessment
    24.
    发明授权

    公开(公告)号:US11411979B2

    公开(公告)日:2022-08-09

    申请号:US16563504

    申请日:2019-09-06

    IPC分类号: H04L29/00 H04L9/40 G06N20/00

    摘要: Systems, computer-implemented methods, and computer program products that can facilitate compliance process risk assessment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a metric assignment component that assigns one or more risk assessment metrics based on vulnerability data of a compliance process. The computer executable components can further comprise a risk assignment component that assigns a risk score of the compliance process based on the one or more risk assessment metrics.

    VULNERABILITY AND ATTACK TECHNIQUE ASSOCIATION

    公开(公告)号:US20220131887A1

    公开(公告)日:2022-04-28

    申请号:US17078455

    申请日:2020-10-23

    IPC分类号: H04L29/06 G06N20/00

    摘要: Systems, computer-implemented methods, and computer program products that facilitate vulnerability and attack technique association are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a map component that defines mappings between vulnerability data representing a vulnerability of a computing resource and attack data representing at least one attack technique. The computer executable components can further comprise an estimation component that analyzes the mappings to estimate a probability that the vulnerability will be exploited to attack the computing resource.

    Controlling compliance remediations

    公开(公告)号:US11178110B2

    公开(公告)日:2021-11-16

    申请号:US16545977

    申请日:2019-08-20

    IPC分类号: H04L29/06 G06F21/57

    摘要: A method provides for controlling compliance remediation that includes performing compliance inspection runs by account nodes for multiple accounts. Inspection results of the inspection runs from each account node are aggregated by an account cognitive policy advisory (CPA) service. The inspection results from each account are aggregated. It is determined whether remediations are required by analyzing the inspection results combined with a current compliance mode of a server. Upon a determination that the current compliance mode of the server is a first mode, the account CPA service determines whether a policy fingerprint has changed. Upon a change to the policy fingerprint, compliance enforcement runs on the account nodes are temporarily suspended.

    Dynamic automation of selection of pipeline artifacts

    公开(公告)号:US11144289B1

    公开(公告)日:2021-10-12

    申请号:US16877599

    申请日:2020-05-19

    摘要: An artificial intelligence (AI) platform to support a continuous integration and deployment (CI/CD) pipeline for software development and operations (DevOps). One or more dependency graphs are generated based on application artifacts. A machine learning (ML) model is leveraged to capture a relationship between components in the dependency graph(s) and one or more pipeline artifacts. Responsive a change of an application artifact, the captured relationship is leveraged to identify an impact of the detected change on the pipeline artifact(s). The CI/CD pipeline is selectively optimized and executed based on the identified impact to improve the efficiency of the pipeline and the deployment time.