×

Incremental security policy development for an enterprise network

  • US 10,511,632 B2
  • Filed: 03/03/2017
  • Issued: 12/17/2019
  • Est. Priority Date: 03/03/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for prompting incremental security policy development for an enterprise network, the system comprising:

  • at least one processor; and

    at least one memory in communication with the at least one processor, the at least one memory having computer-readable instructions stored thereupon that, when executed by the at least one processor, cause the at least one processor to;

    obtain security policy data defining access permissions for a plurality of computing resources with respect to an enterprise data resource;

    analyze a data request to identify a particular computing resource that is requesting access to the enterprise data resource, wherein the particular computing resource is a uniquely identifiable application or device that enables a user to at least one of view data files or manipulate the data files;

    determine that the security policy data lacks both;

    particular access permissions that expressly permit the particular computing resource to access the enterprise data resource, andparticular access restrictions that expressly restrict the particular computing resource from accessing the enterprise data resource;

    in response to the security policy data lacking both the particular access permissions and the particular access restrictions, cause an entry that identifies the particular computing resource to be added to a policy learning log to indicate that the security policy data lacks both of the particular access permissions and the particular access restrictions for the particular computing resource with respect to the enterprise data resource; and

    provide a policy gap notification that corresponds to the entry to a policy management service, wherein the policy gap notification is configured to prompt policy adjudication associated with the particular access permissions for the particular computing resource with respect to the enterprise data resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×