System for associating data policies with data objects

    公开(公告)号:US10853350B1

    公开(公告)日:2020-12-01

    申请号:US14838042

    申请日:2015-08-27

    Abstract: Described are techniques for determining a data policy suitable for association with a data object based on the data access pattern for the data object. Correspondence between the data access pattern of the data object and pattern data, indicative of data access patterns stored in association with data policies, may be determined. Based on the correspondence between the data access pattern of the data object and a particular data access pattern of the pattern data, the data policy associated with the particular data access pattern may be suitable for use with the data object. A set of suitable data policies may be refined based on the content or metadata associated with the data object and the code or deployment status of services that access the data object. Once the access pattern for a data object is known, subsequent interactions with the data object may be analyzed to identify anomalous traffic.

    End-to-end change tracking for triggering website security review

    公开(公告)号:US10776498B2

    公开(公告)日:2020-09-15

    申请号:US16548733

    申请日:2019-08-22

    Abstract: An end-to-end request path associated with an application frontend is determined. A change to a service in the end-to-end request path is identified. A weight value to associate with the change is determined based at least in part on the characteristics of the change. The weight value is aggregated with weight values associated with other code changes is obtained from aggregating the weight value with the weight values of other code changes to produce a collective weight of the code changes. A security review is determined to be triggered based at least in part on the collective weight reaching a value relative to a threshold.

    Data exfiltration control
    33.
    发明授权

    公开(公告)号:US10764294B1

    公开(公告)日:2020-09-01

    申请号:US15067042

    申请日:2016-03-10

    Abstract: A service request and a credential are sent from a customer environment to a service provider. The service provider maintains information, such as a credential whitelist, that identifies which credentials may be used with each customer environment. The service provider identifies the particular customer environment from which the service request was submitted using the IP address of the requester (or other environment-identifying information), and retrieves information that restricts the use of the credentials. A request may be approved or rejected based on the presence of the associated credential in a whitelist notwithstanding whether the credential otherwise authorizes the service request. In some examples, the system is used to limit data exfiltration from a customer environment.

    EVENT-RESTRICTED CREDENTIALS FOR RESOURCE ALLOCATION

    公开(公告)号:US20200228572A1

    公开(公告)日:2020-07-16

    申请号:US16832265

    申请日:2020-03-27

    Abstract: A customer of a resource allocation service can register a function to be executed using virtual resources, where the function includes customer code to be executed. Customer events are defined as triggers for a registered function, and a resource instance is allocated to execute the registered function when triggering event is detected. An identity role associated with the triggering function is used to obtain access credentials for any data source which a triggering event might require for processing. An event-specific access credential is generated that provides a subset of these access privileges using a template policy for the registered function that is filled with values specific to the triggering event. The filled template policy and base credential are used to generate an event-specific credential valid only for access needed for the event. This event-specific credential can be passed with the event data for processing by an allocated instance.

    POLICY APPROVAL LAYER
    35.
    发明申请

    公开(公告)号:US20200213362A1

    公开(公告)日:2020-07-02

    申请号:US16810331

    申请日:2020-03-05

    Abstract: A customer of a policy management service may use an interface with a configuration and management service to interact with policies that may be applicable to the customer's one or more resources. The customer may create and/or modify the policies and the configuration and management service may notify one or more other entities of the created and/or modified policies. The one or more other entities may be operated by user authorized to approve the created and/or modified policies. Interactions with the configuration and management service may be the same as the interactions with the policy management service.

    Communication channel security enhancements

    公开(公告)号:US10567434B1

    公开(公告)日:2020-02-18

    申请号:US14483071

    申请日:2014-09-10

    Abstract: A secure channel is generated using a third party to the channel. A first secure channel between two computer systems is established. The first secure channel is used to relay information about a third party. The third party provides security parameters for a second secure channel to enable the two computer systems to communicate over a second secure channel.

    Pre-caching data for use upon execution of program code

    公开(公告)号:US10530887B1

    公开(公告)日:2020-01-07

    申请号:US15371107

    申请日:2016-12-06

    Abstract: Systems for processing requests to execute a program code of a user use a message queue service to store requests when there are not enough resources to process the requests. The message queue service determines whether a request to be queued is associated with data that the program code needs in order to process the request. If so, the message queue service locates and retrieves the data and stores the data in a cache storage that provides faster access by the program code to the pre-fetched data. This provides faster execution of asynchronous instances of the program code.

    Data storage key rotation
    39.
    发明授权

    公开(公告)号:US10523434B1

    公开(公告)日:2019-12-31

    申请号:US15061937

    申请日:2016-03-04

    Abstract: The present document describes a data storage system that includes a sandboxed execution environment. The execution environment is made available to clients of the data storage system. Clients are able to upload executable instructions to the execution environment, which can be used to manipulate data stored on the data storage system. In various examples, clients use the execution environment to perform key rotation operations on encrypted data stored on the data storage system. Clients transfer executable instructions and cryptographic keys to the execution environment, where the encrypted data stored on the data storage system can be read into the execution environment, decrypted with an old key, re-encrypted with a new key, and returned to the data storage system.

    Digital certificate management
    40.
    发明授权

    公开(公告)号:US10454689B1

    公开(公告)日:2019-10-22

    申请号:US14838165

    申请日:2015-08-27

    Abstract: A client maintains a pinned collection of trusted digital certificates. An original digital certificate in the collection may be updated by sending a request to the certificate authority that issued the original digital certificate. The certificate authority generates an updated certificate, signs the updated certificate with a private key of the updated certificate, and also signs the updated certificate with the private key of the original digital certificate. The server provides the updated certificate to the client. The client can validate the signature created with the updated private key using the updated public key of the certificate authority, and the signature created with the original private key can be validated using the original public key of the certificate authority. If both signatures are valid, a continuity of trust may be established, and the updated certificate added to the collection of trusted digital certificates.

Patent Agency Ranking