-
公开(公告)号:US11509678B2
公开(公告)日:2022-11-22
申请号:US16917234
申请日:2020-06-30
发明人: Carl D. Roach , Clayton R. Joseck
IPC分类号: G06F15/173 , H04L9/40 , G06Q30/00
摘要: The federal government requires organizations it partners with to comply with a higher level of security requirements and issues guideline detailing vulnerabilities within computer systems, assessments to be conducted, and security requirements. Previously, the security assessments required to be in compliance with the government's security requirements were mostly conducted manually, creating a labor and time intensive process. The present disclosure provides computerized systems and methods that intelligently and dynamically conduct automatic security assessments to determine security compliance for one or more applications. These systems and methods significantly improve the security assessment process and result in significant savings of time, labor, and money. The system receives the security requirements, identifies one or more applications to undergo a security assessment, generates a script comprising commands for conducting an automatic assessment of the one or more applications, conducts the security assessments on the one or more applications, determines whether the one or more application are in compliance with the security requirements and generates a report comprising the security assessment findings.
-
公开(公告)号:US20210409437A1
公开(公告)日:2021-12-30
申请号:US16917234
申请日:2020-06-30
发明人: Carl D. Roach , Clayton R. Joseck
摘要: The federal government requires organizations it partners with to comply with a higher level of security requirements and issues guideline detailing vulnerabilities within computer systems, assessments to be conducted, and security requirements. Previously, the security assessments required to be in compliance with the government's security requirements were mostly conducted manually, creating a labor and time intensive process. The present disclosure provides computerized systems and methods that intelligently and dynamically conduct automatic security assessments to determine security compliance for one or more applications. These systems and methods significantly improve the security assessment process and result in significant savings of time, labor, and money. The system receives the security requirements, identifies one or more applications to undergo a security assessment, generates a script comprising commands for conducting an automatic assessment of the one or more applications, conducts the security assessments on the one or more applications, determines whether the one or more application are in compliance with the security requirements and generates a report comprising the security assessment findings.
-