Monitoring usage of an application to identify characteristics and trigger security control
First Claim
1. A computing environment for monitoring usage of an application to identify characteristics and trigger security control, the computing environment comprising:
- an originating system having a computing platform having a memory and at least one processor in communication with the memory;
a plurality of networked communication channels each configured to communicate one or more of a plurality of instructions for interacting with one or more control systems and one or more downstream resources in response to calling of an originating application by the originating system; and
an application system in operative communication with the originating system and the plurality of networked communication channels and for providing automatic application characteristic identification and triggering security control, and comprising a computing platform having a memory and at least one processor in communication with the memory, the memory comprising computer-executable instructions, that when executed cause the processor to;
perform a query configured to identify any application calls performed in a predetermined period of time within the computing environment;
for each identified application call, build a corresponding application characteristics entry in a database;
for each identified application call, identify a plurality of characteristics of the called application including at least one downstream resource;
associate the identified plurality of characteristics of the called application with the application characteristics entry in the database, thereby creating an application mapping;
identify one or more security controls associated with each of the applications in the application mapping;
associate the identified one or more security controls with the associated application characteristics entry in the application mapping; and
automatically trigger assessment of an effectiveness of the one or more security controls in response to identifying a future application call.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing environment for monitoring usage of an application to identify characteristics and trigger security control includes an application system that performs a query configured to identify any application calls performed in a predetermined period of time within the computing environment; for each identified application call, builds a corresponding application characteristics entry in a database; for each identified application call, identifies a plurality of characteristics of the called application including at least one downstream resource; associates the identified plurality of characteristics with the application characteristics entry in the database, thereby creating an application mapping; identifies security controls associated with each of the applications in the application mapping; associates the identified security controls with the associated application characteristics entry in the application mapping; and automatically triggers assessment of an effectiveness of the security controls in response to identifying a future application call.
29 Citations
20 Claims
-
1. A computing environment for monitoring usage of an application to identify characteristics and trigger security control, the computing environment comprising:
-
an originating system having a computing platform having a memory and at least one processor in communication with the memory; a plurality of networked communication channels each configured to communicate one or more of a plurality of instructions for interacting with one or more control systems and one or more downstream resources in response to calling of an originating application by the originating system; and an application system in operative communication with the originating system and the plurality of networked communication channels and for providing automatic application characteristic identification and triggering security control, and comprising a computing platform having a memory and at least one processor in communication with the memory, the memory comprising computer-executable instructions, that when executed cause the processor to; perform a query configured to identify any application calls performed in a predetermined period of time within the computing environment; for each identified application call, build a corresponding application characteristics entry in a database; for each identified application call, identify a plurality of characteristics of the called application including at least one downstream resource; associate the identified plurality of characteristics of the called application with the application characteristics entry in the database, thereby creating an application mapping; identify one or more security controls associated with each of the applications in the application mapping; associate the identified one or more security controls with the associated application characteristics entry in the application mapping; and automatically trigger assessment of an effectiveness of the one or more security controls in response to identifying a future application call. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for monitoring usage of an application to identify characteristics and trigger security control, the method comprising:
-
performing, by an application system, a query configured to identify any application calls performed in a predetermined period of time within the computing environment; for each identified application call, building, by the application system, a corresponding application characteristics entry in a database; for each identified application call, identifying, by the application system, a plurality of characteristics of the called application; associating, by the application system, the identified plurality of characteristics of the called application with the application characteristics entry in the database, thereby creating an application mapping; identifying, by the application system, one or more security controls associated with each of the applications in the application mapping; associating, by the application system, the identified one or more security controls with the associated application characteristics entry in the application mapping; and automatically triggering assessment, by the application system, of an effectiveness of the one or more security controls in response to identifying a future application call. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for monitoring usage of an application to identify characteristics and trigger security control, the computer program product comprising a non-transitory computer-readable medium comprising a set of code, that when executed by a processor cause the processor to:
-
perform a query configured to identify any application calls performed in a predetermined period of time within the computing environment; for each identified application call, build a corresponding application characteristics entry in a database; for each identified application call, identify a plurality of characteristics of the called application; associate the identified plurality of characteristics of the called application with the application characteristics entry in the database, thereby creating an application mapping; identify one or more security controls associated with each of the applications in the application mapping; associate the identified one or more security controls with the associated application characteristics entry in the application mapping; and automatically trigger assessment of an effectiveness of the one or more security controls in response to identifying a future application call. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification