×

Techniques for monitoring privileged users and detecting anomalous activities in a computing environment

  • US 10,701,094 B2
  • Filed: 06/18/2018
  • Issued: 06/30/2020
  • Est. Priority Date: 06/22/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising, at a computer system of a security management system:

  • obtaining activity data from a service provider system, wherein the activity data describes actions performed during use of a cloud service, wherein the actions are performed by one or more users associated with a tenant, wherein the service provider system provides the tenant with a tenant account, and wherein the tenant account enables the one or more users to access the cloud service;

    identifying, in the activity data, one or more actions that are privileged with respect to the cloud service;

    identifying, using the activity data, a set of users who performed the one or more actions, wherein the set of users is determined from the one or more users associated with the tenant;

    categorizing the set of users as privileged;

    determining, using the activity data, one or more risk scores for the one or more users;

    determining that a risk score for user in the set of users is greater than a threshold;

    determining a security control for the service provider system, wherein the security control is used by the service provider system to configure access to the cloud service;

    determining one or more instructions to send to the service provider system; and

    sending the one or more instructions to the service provider system, wherein the one or more instructions cause the security control to be changed with respect to the user, wherein access to the cloud service by the user is modified due to the change to the security control.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×