Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes
First Claim
Patent Images
1. A computer-implemented method, comprising:
- accessing published enterprise threat detection (ETD) security notes in a computer data store;
determining applicability of the published ETD security notes for an information technology computing (IT) landscape;
determining that a particular applicable ETD security note has not yet been implemented in the IT computing landscape;
analyzing aggregated impact of compromise (IoC) and state of compromise (SoC) values associated with the published ETD security note; and
performing a computing system patching action based on the aggregated IoC and SoC values.
1 Assignment
0 Petitions
Accused Products
Abstract
Published enterprise threat detection (ETD) security notes are accessed in a computer data store. Applicability of the published ETD security notes are determined for an information technology computing (IT) landscape. A determination is made that a particular applicable ETD security note has not yet been implemented in the IT computing landscape. Aggregated impact of compromise (IoC) and state of compromise (SoC) values associated with the published ETD security note are analyzed and a computing system patching action is performed based on the aggregated IoC and SoC values.
44 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
accessing published enterprise threat detection (ETD) security notes in a computer data store; determining applicability of the published ETD security notes for an information technology computing (IT) landscape; determining that a particular applicable ETD security note has not yet been implemented in the IT computing landscape; analyzing aggregated impact of compromise (IoC) and state of compromise (SoC) values associated with the published ETD security note; and performing a computing system patching action based on the aggregated IoC and SoC values. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
accessing published enterprise threat detection (ETD) security notes in a computer data store; determining applicability of the published ETD security notes for an information technology computing (IT) landscape; determining that a particular applicable ETD security note has not yet been implemented in the IT computing landscape; analyzing aggregated impact of compromise (IoC) and state of compromise (SoC) values associated with the published ETD security note; and performing a computing system patching action based on the aggregated IoC and SoC values. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
a computer memory; and a hardware processor interoperably coupled with the computer memory and configured to perform operations comprising; accessing published enterprise threat detection (ETD) security notes in a computer data store; determining applicability of the published ETD security notes for an information technology computing (IT) landscape; determining that a particular applicable ETD security note has not yet been implemented in the IT computing landscape; analyzing aggregated impact of compromise (IoC) and state of compromise (SoC) values associated with the published ETD security note; and performing a computing system patching action based on the aggregated IoC and SoC values. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification