Automated asset criticality assessment
First Claim
Patent Images
1. A method, comprising:
- identifying a set of attributes of an asset of a computing environment, wherein the set of attributes identifies one or more users and a context of use of the asset by the one or more users;
determining, using at least one processor device, a criticality rating value for the asset based at least in part on the one or more users and the context of use, wherein the criticality rating value indicates an impact of damage to or loss of the asset, and the criticality rating value is determined in response to a countermeasure deployment involving the asset or an attempt to launch the asset or an application hosted by or interacting with the asset;
calculating a risk measure for the asset from the criticality rating value, vulnerability detection data identifying vulnerabilities of the asset, and countermeasure detection data identifying countermeasures deployed on the asset; and
causing a security activity to be performed based at least in part on the risk measure for the asset.
2 Assignments
0 Petitions
Accused Products
Abstract
A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.
28 Citations
20 Claims
-
1. A method, comprising:
-
identifying a set of attributes of an asset of a computing environment, wherein the set of attributes identifies one or more users and a context of use of the asset by the one or more users; determining, using at least one processor device, a criticality rating value for the asset based at least in part on the one or more users and the context of use, wherein the criticality rating value indicates an impact of damage to or loss of the asset, and the criticality rating value is determined in response to a countermeasure deployment involving the asset or an attempt to launch the asset or an application hosted by or interacting with the asset; calculating a risk measure for the asset from the criticality rating value, vulnerability detection data identifying vulnerabilities of the asset, and countermeasure detection data identifying countermeasures deployed on the asset; and causing a security activity to be performed based at least in part on the risk measure for the asset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory storage medium having instructions stored thereon, wherein the instructions, when executed on a machine, cause the machine to perform a method comprising:
-
identifying a set of attributes of an asset of a computing environment, wherein the set of attributes identifies one or more users and a context of use of the asset by the one or more users; determining, using at least one processor device, a criticality rating value for the asset based at least in part on the one or more users and the context of use, wherein the criticality rating value indicates an impact of damage to or loss of the asset, and the criticality rating value is determined in response to a countermeasure deployment involving the asset or an attempt to launch the asset or an application hosted by or interacting with the asset; calculating a risk measure for the asset from the criticality rating value, vulnerability detection data identifying vulnerabilities of the asset, and countermeasure detection data identifying countermeasures deployed on the asset; and causing a security activity to be performed based at least in part on the risk measure for the asset. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
at least one memory element that stores instructions; and at least one processor device that executes the instructions to identify a set of attributes of an asset of a computing environment, wherein the set of attributes identifies one or more users and a context of use of the asset by the one or more users; determine a criticality rating value for the asset based at least in part on the one or more users and the context of use, wherein the criticality rating value indicates an impact of damage to or loss of the asset, and the criticality rating value is determined in response to a countermeasure deployment involving the asset or an attempt to launch the asset or an application hosted by or interacting with the asset; calculate a risk measure for the asset from the criticality rating value, vulnerability detection data identifying vulnerabilities of the asset, and countermeasure detection data identifying countermeasures deployed on the asset; and cause a security activity to be performed based at least in part on the risk measure for the asset. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification