Abstract:
A computer-implemented method for managing one or more operations of a workload includes selecting a resource type for workload management on a platform. One or more operations of the selected resource to be managed are identified. A reconciliation time for execution of each of the identified operations is determined. A reconciliation period between two consecutive reconciliations is determined for each of the identified operations. A minimum number of processes for workload management of a given set of the operations on resources is calculated, and the determined minimum number of processes is deployed to manage the workload.
Abstract:
A system, computer program product, and method are provided for supporting risk evaluation and modification of an executable codified infrastructure. The codified infrastructure is analyzed to identify any non-native program instructions. A selection of the identified non-native program instructions are combined and subjected to a risk evaluation by non-native tools. A risk evaluation result is mapped to corresponding lines of the source code, and a risk identifier is assigned to the corresponding lines of the source code. One or more modifications are selectively applied to the codified infrastructure in correspondence with the assigned risk identifier. The applied modification mitigates any defects in the source code.
Abstract:
An assessment component that facilitates assessment and enforcement of policies within a computer environment can comprise a compliance component that determines whether a policy, that defines one or more requirements associated with usage of one or more enterprise components of an enterprise computing system, is in compliance with a plurality of standardized policies that govern operation of the one or more enterprise components of the enterprise computing system. The assessment component can also comprise a policy optimization component that determines one or more changes to the policy that achieve the compliance with the plurality of standardized polices based on a determination that the policy complies with a first standardized policy of the plurality of standardized policies and fails to comply with a second standardized policy of the plurality of standardized policies.
Abstract:
A method, product, and apparatus for treating idle servers in a cloud system provide for extrapolating a purpose of each of a plurality of servers by comparing a list of processes active on the server to a plurality of lists of processes associated with a plurality of purposes; selecting vectors of idle/active features corresponding to the extrapolated purposes of each of the plurality of servers; classifying as idle or active each of the plurality of servers, by assessing the specified feature vectors using a linear support vector machine; validating as idle or active each server classified as idle, by assessing the connectivity of the server with all servers classified as active; and implementing at least one treatment option on servers that have been validated as idle. The treatment options may include terminating, terminating with snapshot, and stopping a virtual machine.
Abstract:
A method and system of identifying technical experts for an identified vulnerability is provided. One or more technical experts for each of one or more categories of the vulnerability are identified. Questions are sent to and answers are received from the one or more identified technical experts for each of the one or more categories of vulnerabilities, via a chatbot module. Answers to parameters that are missing for a Common Vulnerability Scoring System (CVSS) for the identified vulnerability are determined from the received answers to the parameters. The answers to the parameters are validated and a CVSS score is calculated based on the validated determined answers.
Abstract:
An assessment component that facilitates assessment and enforcement of policies within a computer environment can comprise a compliance component that determines whether a policy, that defines one or more requirements associated with usage of one or more enterprise components of an enterprise computing system, is in compliance with a plurality of standardized policies that govern operation of the one or more enterprise components of the enterprise computing system. The assessment component can also comprise a policy optimization component that determines one or more changes to the policy that achieve the compliance with the plurality of standardized polices based on a determination that the policy complies with a first standardized policy of the plurality of standardized policies and fails to comply with a second standardized policy of the plurality of standardized policies.
Abstract:
A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.
Abstract:
A computer system, program code, and a method are provided to leverage an AI model with respect to a target specification for a target standard. The AI model is configured to identify at least one candidate control associated with a corresponding standard. A map is subject to traversal to identify the candidate control in the map. Source and destination controls of the map are leveraged to identify at least one mapped control associated with the target standard. The AI model is selectively subject to training with the mapped control and the target standard.
Abstract:
Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.
Abstract:
A method, product, and apparatus for treating idle servers in a cloud system provide for extrapolating a purpose of each of a plurality of servers by comparing a list of processes active on the server to a plurality of lists of processes associated with a plurality of purposes; selecting vectors of idle/active features corresponding to the extrapolated purposes of each of the plurality of servers; classifying as idle or active each of the plurality of servers, by assessing the specified feature vectors using a linear support vector machine; validating as idle or active each server classified as idle, by assessing the connectivity of the server with all servers classified as active; and implementing at least one treatment option on servers that have been validated as idle. The treatment options may include terminating, terminating with snapshot, and stopping a virtual machine.