Automated security enclave generation
First Claim
Patent Images
1. A method comprising:
- determining one or more risk parameters that define risk profiles of one or more applications and one or more services operating in a network;
determining an optimal number of clusters for grouping the one or more applications and the one or more services based on the risk profiles;
grouping the one or more applications and the one or more services into the optimal number of clusters based on the risk profiles; and
applying one or more security enclaves to each of the clusters.
1 Assignment
0 Petitions
Accused Products
Abstract
Creating security enclaves includes determining one or more parameters of one or more applications and one or more services operating in the network. An optimal number of clusters for grouping the one or more applications and the one or more services is determined based on the one or more parameters. Then, the one or more applications and the one or more services are grouped into the clusters and one or more security enclaves are applied to each of the clusters so as to maximize operational security of the network.
17 Citations
20 Claims
-
1. A method comprising:
-
determining one or more risk parameters that define risk profiles of one or more applications and one or more services operating in a network; determining an optimal number of clusters for grouping the one or more applications and the one or more services based on the risk profiles; grouping the one or more applications and the one or more services into the optimal number of clusters based on the risk profiles; and applying one or more security enclaves to each of the clusters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a network in which one or more applications and one or more services are operating; a server having connectivity to the network, the server configured to; determine one or more risk parameters that define risk profiles of the one or more applications and the one or more services operating in the network; determine an optimal number of clusters for grouping the one or more applications and the one or more services based on the risk profiles; group the one or more applications and the one or more services into the optimal number of clusters based on the risk profiles; and apply one or more security enclaves to each of the clusters. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage media encoded with software comprising computer executable instructions and when the software is executed operable to:
-
determine one or more risk parameters that define risk profiles of one or more applications and one or more services operating in a network; determine an optimal number of clusters for grouping the one or more applications and the one or more services based on the risk profiles; group the one or more applications and the one or more services into the optimal number of clusters based on the risk profiles; and apply one or more security enclaves to each of the clusters. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification