×

Runtime behavior of computing resources of a distributed environment

  • US 10,362,046 B1
  • Filed: 03/29/2017
  • Issued: 07/23/2019
  • Est. Priority Date: 03/29/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining a runtime configuration generated based at least in part on a set of security rules defining a set of security threats to a computer system instance and a set of remedial operations, the set of security rules generated based at least in part on customer input provided through a web service front-end, the computer system instance and the web service front-end provided by a computing resource service provider, the computer system instance a member of a set of computer system instance provided to customers of the computing resource service provider, where the runtime configuration indicates a threat level associated with a security threat included in the set of security threats;

    obtaining access to operational information of the computer system instance, the operational information indicating at least a configuration of the computer system instance, a set of processes executed by the computer systems instance, and a set of operations performed by the computer systems instance;

    determining a security threat of the set of security threats to the computer system instance by at least processing the operational information based at least in part on the runtime configuration;

    performing a remedial operation of the set of operations indicated by the runtime configuration; and

    providing the operational information and information associated with the remedial operation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×