Movatterモバイル変換


[0]ホーム

URL:


US20170339160A1 - Threat-aware provisioning and governance - Google Patents

Threat-aware provisioning and governance
Download PDF

Info

Publication number
US20170339160A1
US20170339160A1US15/156,594US201615156594AUS2017339160A1US 20170339160 A1US20170339160 A1US 20170339160A1US 201615156594 AUS201615156594 AUS 201615156594AUS 2017339160 A1US2017339160 A1US 2017339160A1
Authority
US
United States
Prior art keywords
user
resource
risk
provisioned
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/156,594
Inventor
Christopher J. Hockings
Dinesh T. Jain
Rohit U. Satyanarayana
Vincent C. Williams
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US15/156,594priorityCriticalpatent/US20170339160A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WILLIAMS, VINCENT C., HOCKINGS, CHRISTOPHER J., JAIN, DINESH T., SATYANARAYANA, ROHIT U.
Priority to US15/385,177prioritypatent/US9762582B1/en
Priority to US15/691,543prioritypatent/US9998468B2/en
Priority to US15/691,520prioritypatent/US9992201B2/en
Publication of US20170339160A1publicationCriticalpatent/US20170339160A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.

Description

Claims (20)

1. A method for managing a provisioned-resource, wherein the provisioned-resource is included in a computing system, wherein an end-user device is configured for use by an end-user to access the provisioned-resource, and wherein the method comprises:
forming a device risk vector, for the end user device, wherein the device risk vector includes at least one device risk attribute, wherein the at least one device risk attribute is an attribute of the end-user device, and wherein the at least one device risk attribute is included in a device compliance status associated with the end-user device;
forming a resource risk vector, for the provisioned resource, wherein the resource risk vector includes at least one resource risk attribute, wherein the at least one resource risk attribute is an attribute of the provisioned-resource, and wherein the at least one resource risk attribute is included in a resource compliance status associated with the provisioned-resource;
forming a policy vector, wherein the policy vector includes at least one security compliance attribute, and wherein the at least one security compliance attribute represents an access risk boundary associated with the end-user device accessing the provisioned-resource;
forming a threat vector, wherein the threat vector includes at least one system risk attribute, wherein the at least one system risk attribute is based, at least in part, on comparing the device risk vector and the resource risk vector to the policy vector, and wherein the at least one system risk attribute comprises the at least one device risk attribute, the at least one resource risk attribute, and the at least one security compliance attribute; and
performing an access management operation including determining an access-level, wherein the access-level is associated with access to the provisioned-resource by at least one of the end-user, the end-user device, and a user account, wherein the user account is associated with the end-user, and wherein the determining the access-level is based, at least in part, on the at least one system risk attribute included in the threat vector; and
in response to the at least one system risk attribute included in the threat vector exceeding the at least one security compliance attribute, modifying the access level for at least one of the end user, the end user device, and the user account according to particular attributes included within the threat vector.
3. The method ofclaim 2, wherein the access management operation is included in at least one of:
provisioning the provisioned-resource to at least one of the at least one of the end-user, the end-user device, and the user account;
certifying the at least one of the end-user, the end-user device, and the user account for the access to the provisioned-resource;
determining whether the access to the provisioned-resource by the at least one of the end-user, the end-user device, and the user account is within acceptable system security risk boundaries;
suspending the at least one of the end-user, the end-user device, and the user account from the access to the provisioned-resource; and
determining an organizational role classification associated with the at least one of the end-user, the end-user device, and the user account.
8. A computer program product for managing a provisioned-resource, wherein the provisioned-resource is included in a computing system, wherein an end-user device is configured for use by an end-user to access the provisioned-resource, wherein the computer program product comprises a computer readable storage medium having program instructions embodied therewith, and wherein the program instructions are executable by a first computing device to perform a method, the method comprising;
forming a device risk vector, for the end user device, wherein the device risk vector includes at least one device risk attribute, wherein the at least one device risk attribute is an attribute of the end-user device, and wherein the at least one device risk attribute is included in a device compliance status associated with the end-user device;
forming a resource risk vector, for the provisioned resource, wherein the resource risk vector includes at least one resource risk attribute, wherein the at least one resource risk attribute is an attribute of the provisioned-resource, and wherein the at least one resource risk attribute is included in a resource compliance status associated with the provisioned-resource;
forming a policy vector, wherein the policy vector includes at least one security compliance attribute, and wherein the at least one security compliance attribute represents an access risk boundary associated with the end-user device accessing the provisioned-resource;
forming a threat vector, wherein the threat vector includes at least one system risk attribute, wherein the at least one system risk attribute is based, at least in part, on comparing the device risk vector and the resource risk vector to the policy vector, and wherein the at least one system risk attribute comprises the at least one device risk attribute, the at least one resource risk attribute, and the at least one security compliance attribute; and
performing an access management operation including determining an access-level, wherein the access-level is associated with access to the provisioned-resource by at least one of the end-user, the end-user device, and a user account, wherein the user account is associated with the end-user, and wherein the determining the access-level is based, at least in part, on the at least one system risk attribute included in the threat vector; and
in response to the at least one system risk attribute included in the threat vector exceeding the at least one security compliance attribute, modifying the access level for at least one of the end user, the end user device, and the user account according to particular attributes included within the threat vector.
10. The computer program product ofclaim 9, the method wherein the access management operation is included in at least one of:
provisioning the provisioned-resource to the at least one of the end-user, the end-user device, and the user account;
certifying the at least one of the end-user, the end-user device, and the user account for the access to the provisioned-resource;
determining whether the access to the provisioned-resource by the at least one of the end-user, the end-user device, and the user account is within acceptable system security risk boundaries;
suspending the at least one of the end-user, the end-user device, and the user account from the access to the provisioned-resource; and
determining an organizational role classification associated with the at least one of the end-user, the end-user device, and the user account.
15. A system for managing a provisioned-resource, the system comprising:
a computing system, wherein the computing system includes a first computing device having a processor, and a memory in communication with the processor;
a provisioned-resource, wherein the provisioned-resource is included in the computing system; and
an end-user device, wherein the end-user device is configured for use by an end-user to access the provisioned-resource;
wherein the system is configured to form a device risk vector for the end user device, the device risk vector including at least one device risk attribute, the at least one device risk attribute being an attribute of the end-user device, the at least one device risk attribute included in a device compliance status associated with the end-user device;
wherein the system is configured to form a resource risk vector for the provisioned resource, the resource risk vector including at least one resource risk attribute, the at least one resource risk attribute being an attribute of the provisioned-resource, the at least one resource risk attribute included in a resource compliance status associated with the provisioned-resource;
wherein the system is configured to form a policy vector, the policy vector including at least one security compliance attribute, the at least one security compliance attribute representing an access risk boundary associated with the end-user device accessing the provisioned-resource;
wherein the system is configured to form a threat vector, the threat vector including at least one system risk attribute, wherein the at least one system risk attribute is based, at least in part, on comparing the device risk vector and the resource risk vector to the policy vector, and wherein the at least one system risk attribute comprises the at least one device risk attribute, the at least one resource risk attribute, and the at least one security compliance attribute;
wherein the system is configured to perform an access management operation to determine an access-level, the access-level associated with access to the provisioned-resource by at least one of the end-user, the end-user device, and a user account, the user account associated with the end-user, the determining the access-level based, at least in part, on the at least one system risk attribute included in the threat vector; and
in response to the at least one system risk attribute included in the threat vector exceeding the at least one security compliance attribute, modifying the access level for at least one of the end user, the end user device, and the user account according to particular attributes included within the threat vector.
16. The system ofclaim 15, wherein the system is further configured to determine the access-level as part of an access management operation, and wherein the access management operation is included in at least one of:
provisioning the provisioned-resource to the at least one of the end-user, the end-user device, and the user account;
certifying the at least one of the end-user, the end-user device, and the user account for the access to the provisioned-resource;
determining whether the access to the provisioned-resource by the at least one of the end-user, the end-user device, and the user account is within acceptable system security risk boundaries;
suspending the at least one of the end-user, the end-user device, and the user account from the access to the provisioned-resource; and
determining an organizational role classification associated with the at least one of the end-user, the end-user device, and the user account.
US15/156,5942016-05-172016-05-17Threat-aware provisioning and governanceAbandonedUS20170339160A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US15/156,594US20170339160A1 (en)2016-05-172016-05-17Threat-aware provisioning and governance
US15/385,177US9762582B1 (en)2016-05-172016-12-20Threat-aware provisioning and governance
US15/691,543US9998468B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance
US15/691,520US9992201B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US15/156,594US20170339160A1 (en)2016-05-172016-05-17Threat-aware provisioning and governance

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/385,177ContinuationUS9762582B1 (en)2016-05-172016-12-20Threat-aware provisioning and governance

Publications (1)

Publication NumberPublication Date
US20170339160A1true US20170339160A1 (en)2017-11-23

Family

ID=59752968

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US15/156,594AbandonedUS20170339160A1 (en)2016-05-172016-05-17Threat-aware provisioning and governance
US15/385,177Expired - Fee RelatedUS9762582B1 (en)2016-05-172016-12-20Threat-aware provisioning and governance
US15/691,543Expired - Fee RelatedUS9998468B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance
US15/691,520Expired - Fee RelatedUS9992201B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US15/385,177Expired - Fee RelatedUS9762582B1 (en)2016-05-172016-12-20Threat-aware provisioning and governance
US15/691,543Expired - Fee RelatedUS9998468B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance
US15/691,520Expired - Fee RelatedUS9992201B2 (en)2016-05-172017-08-30Threat-aware provisioning and governance

Country Status (1)

CountryLink
US (4)US20170339160A1 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2526501A (en)2013-03-012015-11-25Redowl Analytics IncModeling social behavior
US20140250052A1 (en)2013-03-012014-09-04RedOwl Analytics, Inc.Analyzing social behavior
US10542018B1 (en)2016-12-272020-01-21Wells Fargo Bank, N.A.Security breach notification
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US10318729B2 (en)2017-07-262019-06-11Forcepoint, LLCPrivacy protection during insider threat monitoring
US10803178B2 (en)2017-10-312020-10-13Forcepoint LlcGenericized data model to perform a security analytics operation
US11314787B2 (en)2018-04-182022-04-26Forcepoint, LLCTemporal resolution of an entity
US11810012B2 (en)2018-07-122023-11-07Forcepoint LlcIdentifying event distributions using interrelated events
US11755584B2 (en)2018-07-122023-09-12Forcepoint LlcConstructing distributions of interrelated event features
US11436512B2 (en)2018-07-122022-09-06Forcepoint, LLCGenerating extracted features from an event
US10949428B2 (en)2018-07-122021-03-16Forcepoint, LLCConstructing event distributions via a streaming scoring operation
US11025638B2 (en)2018-07-192021-06-01Forcepoint, LLCSystem and method providing security friction for atypical resource access requests
US11811799B2 (en)2018-08-312023-11-07Forcepoint LlcIdentifying security risks using distributions of characteristic features extracted from a plurality of events
US11025659B2 (en)2018-10-232021-06-01Forcepoint, LLCSecurity system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors
US11171980B2 (en)2018-11-022021-11-09Forcepoint LlcContagion risk detection, analysis and protection
US11290475B2 (en)2019-11-122022-03-29Bank Of America CorporationSystem for technology resource centric rapid resiliency modeling
US11394733B2 (en)2019-11-122022-07-19Bank Of America CorporationSystem for generation and implementation of resiliency controls for securing technology resources
US11570197B2 (en)2020-01-222023-01-31Forcepoint LlcHuman-centric risk modeling framework
US11630901B2 (en)2020-02-032023-04-18Forcepoint LlcExternal trigger induced behavioral analyses
US11080109B1 (en)2020-02-272021-08-03Forcepoint LlcDynamically reweighting distributions of event observations
US11836265B2 (en)2020-03-022023-12-05Forcepoint LlcType-dependent event deduplication
US11429697B2 (en)2020-03-022022-08-30Forcepoint, LLCEventually consistent entity resolution
US11080032B1 (en)2020-03-312021-08-03Forcepoint LlcContainerized infrastructure for deployment of microservices
US11568136B2 (en)2020-04-152023-01-31Forcepoint LlcAutomatically constructing lexicons from unlabeled datasets
US11516206B2 (en)2020-05-012022-11-29Forcepoint LlcCybersecurity system having digital certificate reputation system
US12130908B2 (en)2020-05-012024-10-29Forcepoint LlcProgressive trigger data and detection model
US11544390B2 (en)2020-05-052023-01-03Forcepoint LlcMethod, system, and apparatus for probabilistic identification of encrypted files
US11895158B2 (en)2020-05-192024-02-06Forcepoint LlcCybersecurity system having security policy visualization
US11704387B2 (en)2020-08-282023-07-18Forcepoint LlcMethod and system for fuzzy matching and alias matching for streaming data sets
DE102020212405A1 (en)*2020-09-302022-03-31Siemens Aktiengesellschaft Network operating method and computer program product
US11190589B1 (en)2020-10-272021-11-30Forcepoint, LLCSystem and method for efficient fingerprinting in cloud multitenant data loss prevention
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130047253A1 (en)*2011-08-152013-02-21Bank Of America CorporationMethod and apparatus for token-based real-time risk updating
US20150074390A1 (en)*2013-09-102015-03-12Opera Software AsaMethod and device for classifying risk level in user agent by combining multiple evaluations
US20150281287A1 (en)*2009-11-202015-10-01Alert Enterprise, Inc.Policy/rule engine, multi-compliance framework and risk remediation
US20160021117A1 (en)*2014-07-182016-01-21Ping Identity CorporationDevices and methods for threat-based authentication for access to computing resources
US20160088021A1 (en)*2014-09-242016-03-24Oracle International CorporationPolicy-based compliance management and remediation of devices in an enterprise system
US9436820B1 (en)*2004-08-022016-09-06Cisco Technology, Inc.Controlling access to resources in a network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8812342B2 (en)2010-06-152014-08-19International Business Machines CorporationManaging and monitoring continuous improvement in detection of compliance violations
US9058471B2 (en)2012-06-082015-06-16Oracle International CorporationAuthorization system for heterogeneous enterprise environments
US9021594B2 (en)2013-06-192015-04-28International Business Machines CorporationIntelligent risk level grouping for resource access recertification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9436820B1 (en)*2004-08-022016-09-06Cisco Technology, Inc.Controlling access to resources in a network
US20150281287A1 (en)*2009-11-202015-10-01Alert Enterprise, Inc.Policy/rule engine, multi-compliance framework and risk remediation
US20130047253A1 (en)*2011-08-152013-02-21Bank Of America CorporationMethod and apparatus for token-based real-time risk updating
US20150074390A1 (en)*2013-09-102015-03-12Opera Software AsaMethod and device for classifying risk level in user agent by combining multiple evaluations
US20160021117A1 (en)*2014-07-182016-01-21Ping Identity CorporationDevices and methods for threat-based authentication for access to computing resources
US20160088021A1 (en)*2014-09-242016-03-24Oracle International CorporationPolicy-based compliance management and remediation of devices in an enterprise system

Also Published As

Publication numberPublication date
US9998468B2 (en)2018-06-12
US20170366548A1 (en)2017-12-21
US9992201B2 (en)2018-06-05
US9762582B1 (en)2017-09-12
US20170366549A1 (en)2017-12-21

Similar Documents

PublicationPublication DateTitle
US9998468B2 (en)Threat-aware provisioning and governance
US10834108B2 (en)Data protection in a networked computing environment
US10650156B2 (en)Environmental security controls to prevent unauthorized access to files, programs, and objects
US20190347418A1 (en)System and method for protection against ransomware attacks
US9930071B2 (en)System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security
US9672348B2 (en)Risk-based credential management
US9576147B1 (en)Security policy application through data tagging
US9407664B1 (en)Systems and methods for enforcing enterprise data access control policies in cloud computing environments
US8776180B2 (en)Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US10528739B2 (en)Boot security
US20190034648A1 (en)Managing access to documents with a file monitor
US20140282518A1 (en)Enforcing policy-based compliance of virtual machine image configurations
US20220368702A1 (en)System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment
US11558367B2 (en)Network based password policy detection and enforcement
US9369478B2 (en)OWL-based intelligent security audit
US11182486B2 (en)Early boot driver for start-up detection of malicious code
US10963569B2 (en)Early boot driver for start-up detection of malicious code
US12445452B2 (en)Remote access control using validation of physical location of remote user
US20240205232A1 (en)Remote access control using validation of physical location of remote user
US20250039174A1 (en)Using hidden fields for bot detection
HashizumeA reference architecture for cloud computing and its security applications

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HOCKINGS, CHRISTOPHER J.;JAIN, DINESH T.;SATYANARAYANA, ROHIT U.;AND OTHERS;SIGNING DATES FROM 20160405 TO 20160425;REEL/FRAME:038616/0949

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp