×

Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments

  • US 10,484,430 B2
  • Filed: 05/08/2017
  • Issued: 11/19/2019
  • Est. Priority Date: 11/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computerized system comprising:

  • one or more hardware processors; and

    one or more computer storage media storing computer-useable instructions that, when used by the one or more hardware processors, cause the one or more hardware processors to;

    receive, at a service within a cloud computing environment, a request for just-in-time (JIT) access to a resource within a production environment of the cloud computing environment, the request being received from a portal on a DevOps device operated by a DevOps personnel who does not have persistent access to restricted data in the cloud computing environment, the request specifying request parameters including a level or type of access requested and information regarding an incident;

    access, from a database of JIT policies stored in the cloud computing environment for a plurality of resources within the production environment of the cloud computing environment, a JIT policy for the resource specified by the request, the JIT policy stored in the database for processing by the service within the cloud computing environment to allow the service to automatically determine whether to grant JIT access to the resource;

    determine, from the JIT policy for the resource, screening criteria restricting JIT access to the resource, the screening criteria specifying one or more security clearance procedures;

    receive screening information for the DevOps personnel;

    determine, by the service within the cloud computing environment, whether to approve the request for JIT access based at least in part on automatically evaluating the request parameters using the JIT policy for the resource to determine whether the level or type of access requested is automatically approved depending on;

    (1) a type of the incident;

    (2) whether the incident is active; and

    (3) a comparison of the screening information for the DevOps personnel to the screening criteria from the JIT policy to verify that the one or more security clearance procedures have been performed for the DevOps personnel;

    if it is determined to automatically approve the request for JIT access, provision a JIT access session for the DevOps device including setting a time limit for the JIT access session; and

    if it is determined not to automatically approve the request for JIT access, send the request for JIT access to a portal on an operator device for review by an operating personnel who has access to restricted data in the cloud computing environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×