DETERMINING RELEVANT SECURITY POLICY DATA BASED ON CLOUD ENVIRONMENT

    公开(公告)号:US20210367980A1

    公开(公告)日:2021-11-25

    申请号:US16879360

    申请日:2020-05-20

    Abstract: The disclosed technology is directed towards returning security policy requirements data based on user input that identifies a cloud environments, a service model, first or third party responsibilities, and/or code deployment information. A user provides answers to straightforward, generally non-expert questions directed to the user's cloud environment, first or third party responsibilities, and/or code deployment information for the user's scenario, e.g., technical workload. The answers result in determining which architecture layers apply (are in-scope architecture layers) relevant to the user's scenario. The in-scope architecture layers map to security requirements maintained in a security policy data store. The security requirements are returned (e.g., as a list) in response to the user's answers.

    Tag-based security policy creation in a distributed computing environment

    公开(公告)号:US11171994B2

    公开(公告)日:2021-11-09

    申请号:US16817786

    申请日:2020-03-13

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    Determining relevant security policy data based on cloud environment

    公开(公告)号:US11349883B2

    公开(公告)日:2022-05-31

    申请号:US16879360

    申请日:2020-05-20

    Abstract: A system and method for returning security policy requirements data based on user input that identifies a cloud environments, a service model, first or third party responsibilities, and/or code deployment information. A user provides answers to straightforward, generally non-expert questions directed to the user's cloud environment, first or third party responsibilities, and/or code deployment information for the user's scenario, e.g., technical workload. The answers result in determining which architecture layers apply (are in-scope architecture layers) relevant to the user's scenario. The in-scope architecture layers map to security requirements maintained in a security policy data store. The security requirements are returned (e.g., as a list) in response to the user's answers.

    Tag-Based Security Policy Creation in a Distributed Computing Environment

    公开(公告)号:US20200213365A1

    公开(公告)日:2020-07-02

    申请号:US16817786

    申请日:2020-03-13

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    DETERMINING RELEVANT SECURITY POLICY DATA BASED ON CLOUD ENVIRONMENT

    公开(公告)号:US20220263870A1

    公开(公告)日:2022-08-18

    申请号:US17661764

    申请日:2022-05-03

    Abstract: A system and method for returning security policy requirements data based on user input that identifies a cloud environments, a service model, first or third party responsibilities, and/or code deployment information is disclosed. A user provides answers to straightforward, generally non-expert questions directed to the user's cloud environment, first or third party responsibilities, and/or code deployment information for the user's scenario, e.g., technical workload. The answers result in determining which architecture layers apply (are in-scope architecture layers) relevant to the user's scenario. The in-scope architecture layers map to security requirements maintained in a security policy data store. The security requirements are returned (e.g., as a list) in response to the user's answers.

    Open Source Software Security Vulnerability Prioritization Scheme

    公开(公告)号:US20220083667A1

    公开(公告)日:2022-03-17

    申请号:US17022210

    申请日:2020-09-16

    Abstract: Concepts and technologies disclosed herein are directed to an open source security vulnerability prioritization scheme. According to one aspect disclosed herein, a software composition analysis system can obtain, from a vulnerability database, security vulnerability data about a set of known security vulnerabilities. The software composition analysis system can identify an application for analysis. The application can call a common library shared among a plurality of applications. The software composition analysis system can identify, based upon the set of known security vulnerabilities, a security vulnerability in the common library. The software composition analysis system can remediate the security vulnerability in the common library.

    Tag-based security policy creation in a distributed computing environment

    公开(公告)号:US10594735B2

    公开(公告)日:2020-03-17

    申请号:US15718347

    申请日:2017-09-28

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    Tag-Based Security Policy Creation in a Distributed Computing Environment

    公开(公告)号:US20190098054A1

    公开(公告)日:2019-03-28

    申请号:US15718347

    申请日:2017-09-28

    CPC classification number: H04L63/20

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

Patent Agency Ranking