×

Techniques for security artifacts management

  • US 10,171,437 B2
  • Filed: 04/22/2016
  • Issued: 01/01/2019
  • Est. Priority Date: 04/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving a request to manage security of an application;

    identifying, by a computer system of a security management system, a plurality of security artifacts related to security for accessing the application, wherein the computer system is in a secure zone protected by one or more security measures;

    determining, by the computer system, security access for accessing the application;

    generating, by the computer system, a security artifact archive for the application, the security artifact archive including security data and security artifact data, wherein the security data is based on the security access, wherein the security data includes an access policy that indicates the security access and the security data includes attribute data indicating one or more attributes of the application, and wherein the security artifact data identifies one or more of the plurality of security artifacts;

    storing the security artifact archive in association with an application identifier that identifies the application and a version identifier corresponding to the application, wherein the version identifier indicates a version of the security artifact archive, and wherein different versions of the security artifact archive correspond to changes in security access based on a different version of the application; and

    responsive to the request, transmitting, by the computer system, the security artifact archive to the application, wherein the application operates to manage security for accessing the application based on the security artifact data and the security access in the security data of the security artifact archive, and wherein the application is outside the secure zone.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×