×

Identifying sensitive data writes to data stores

  • US 10,114,960 B1
  • Filed: 03/20/2014
  • Issued: 10/30/2018
  • Est. Priority Date: 03/20/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, over a network and from a data access detection plugin running on a device with an application, a data access event notification corresponding to access by the application to a set of sensitive data;

    creating a data event object, the data event object including at least one or more metadata items associated with the data access event notification;

    writing, based at least in part on a determination by a policy service, a data log entry, the data log entry based at least in part on at least a subset of the data event object;

    determining, based at least in part on a similar characteristic between the data log entry and one or more other entries in a computer system log, that the data log entry is correlated with the one or more other entries;

    determining, based at least in part on the data log entry being correlated with the one or more other entries, a confidence value for a data access rule violation having occurred with the set of sensitive data;

    determining a data store location based at least in part on a metadata item included in the data event object;

    searching, in the data store location, for a set of data corresponding at least in part to a subset of the set of sensitive data; and

    as a result of locating the set of data corresponding at least in part to the subset of the set of sensitive data, performing, based at least in part on the confidence value and a sensitivity of the set of sensitive data, one or more operations to mitigate further access to the set of sensitive data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×