Policy approval layer
    84.
    发明授权

    公开(公告)号:US11588855B2

    公开(公告)日:2023-02-21

    申请号:US16810331

    申请日:2020-03-05

    Abstract: A customer of a policy management service may use an interface with a configuration and management service to interact with policies that may be applicable to the customer's one or more resources. The customer may create and/or modify the policies and the configuration and management service may notify one or more other entities of the created and/or modified policies. The one or more other entities may be operated by user authorized to approve the created and/or modified policies. Interactions with the configuration and management service may be the same as the interactions with the policy management service.

    Provisional computing resource policy evaluation

    公开(公告)号:US11558388B2

    公开(公告)日:2023-01-17

    申请号:US16384866

    申请日:2019-04-15

    Abstract: A policy management service receives a request to evaluate a provisional policy to determine the impact of implementation of the provisional policy. The policy management service evaluates an active policy against a request to access a computing resource to determine an authorization decision. The policy management service then evaluates the provisional policy against the request to access the computing resource to generate an evaluation of the provisional policy. The policy management service provides the evaluation and the authorization decision in response to the request to evaluate the provisional policy.

    Detecting unknown software vulnerabilities and system compromises

    公开(公告)号:US11366908B2

    公开(公告)日:2022-06-21

    申请号:US16821501

    申请日:2020-03-17

    Abstract: Disclosed are various embodiments for detecting unknown software vulnerabilities and system compromises. During a learning period in which execution of a software package is monitored, invoked portions of the software package are determined. Also, during learning period, a frequency of use of at least one of the invoked portions of the software package is determined. It is determined that the frequency of use during the learning period is different from a frequency of use after the learning period, and in response, an action is performed.

    Limited access policy bypass
    87.
    发明授权

    公开(公告)号:US11252190B1

    公开(公告)日:2022-02-15

    申请号:US14694973

    申请日:2015-04-23

    Abstract: The current document discloses systems and methods that implement access controls for service providers. When a client requests access to a service provider, but does not satisfy the conditions for non-limited access, the service provider provides limited access to the services based at least in part on a limited access policy. The limited access policy establishes a limitation that defines when the limited access to the service provider expires. In some implementations, the service provider issues a signed access token to the client, and the access token includes an expiration value that is updated when service requests are processed. When the access token expires, access to the service is terminated.

    Execution request prioritization by context

    公开(公告)号:US11218419B1

    公开(公告)日:2022-01-04

    申请号:US15371108

    申请日:2016-12-06

    Abstract: Systems for processing requests to execute a program code of a user use a message queue service to store requests when there are not enough resources to process the requests. The message queue service distributes the stored requests across multiple queues; each queue is associated with a context of the underlying events that generate the requests. A context describes one or more attributes of the event, such as information identifying the requestor or the event source. Thus, queued messages are divided into different queues based on user ID, event source or location, event type, etc. The message queue service then selects from the queues when requested to deliver a queued request. This provides a balanced delivery of requests from different requestors or groups of requestors.

    DISTRIBUTED THREAT SENSOR ANALYSIS AND CORRELATION

    公开(公告)号:US20210344690A1

    公开(公告)日:2021-11-04

    申请号:US16865005

    申请日:2020-05-01

    Abstract: Various embodiments of apparatuses and methods for distributed threat sensor analysis and correlation of a malware threat intelligence system are described. In some embodiments, the system comprises a plurality of threat sensors, deployed at different network addresses and physically located in different geographic regions in a provider network, which detect interactions from sources. In some embodiments, a distributed threat sensor analysis and correlation service obtains significance scores for different sources of the interactions with the plurality of threat sensors. The service determines which of the sources are malicious actors based on the significance scores. The service receives identifiers of known actors such as compute instances in the provider network, client devices in a client network, or deployed IoT devices in a remote network, and correlates the malicious actors with the known actors to identify which known actors might be infected by malware.

Patent Agency Ranking