×

Detection and management of unauthorized use of cloud computing services

  • US 10,122,724 B2
  • Filed: 11/30/2015
  • Issued: 11/06/2018
  • Est. Priority Date: 06/26/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • aggregating, by a computing system comprising a processor, access logs from a plurality of network edge components communicatively coupled to an internal network;

    obtaining, by the computer system, internet protocol information from the access logs, the internet protocol information comprising destination internet protocol addresses and source internet protocol addresses;

    generating, by the computing system, a list of unique networks accessed from within the internal network based on the internet protocol information contained within the access logs;

    identifying, by the computing system based on the internet protocol information, a cloud computing service resource that has been accessed from within the internal network;

    determining, by the computing system, that the cloud computing service resource is not approved to be accessed from within the internal network, where the cloud computing service resource is designated as an unauthorized cloud computing service resource;

    generating an unauthorized list comprising at least one source internet protocol address that has been used to access the unauthorized cloud computing service resource;

    sending, to a vendor management team via the computing system comprising a processor, information about the unauthorized cloud computing service resource that has been accessed from within the internal network;

    determining, by the computing system, based upon feedback received from the vendor management team, whether a vendor agreement exists between a first entity associated with the internal network and a second entity associated with the unauthorized cloud computing service resource that has been accessed from within the internal network;

    in response to determining, based upon the feedback received from the vendor management team, that no vendor agreement exists between the first entity associated with the internal network and the second entity associated with the unauthorized cloud computing service resource, instructing, by the computing system, a network edge component to block access to the unauthorized cloud computing service resource from the internal network;

    instructing, by the computing system, a device management application to identify any cloud computing service software applications that are installed on a computing device within the internal network;

    determining, by the computing system, that a cloud computing service software application associated with the unauthorized cloud computing service resource is resident on the computing device within the internal network; and

    appending, by the computing system, an internet protocol address associated with the computing device to the unauthorized list.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×