Security health checking tool
First Claim
Patent Images
1. A method in a storage management system comprising:
- accessing one or more security parameters of said storage management system;
evaluating said security parameters against a set of security policies, rules and allowable parameter values; and
indicating in a user-readable report which security parameters fail to meet said security policies, rules and allowable parameter values.
1 Assignment
0 Petitions
Accused Products
Abstract
A tool for checking storage management system security settings which accesses one or more security parameters, compares them to security policies, rules, and allowable values, and reports noncompliant settings via a user-readable report. A set of automatic correction rules may be employed to automatically modify noncompliant settings to bring them into compliance, which actions may also be reported in the user-readable report.
108 Citations
27 Claims
-
1. A method in a storage management system comprising:
-
accessing one or more security parameters of said storage management system;
evaluating said security parameters against a set of security policies, rules and allowable parameter values; and
indicating in a user-readable report which security parameters fail to meet said security policies, rules and allowable parameter values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
one or more accessible security settings associated with a storage management system;
a security setting retriever operative to access said security settings;
a policy defining one or more acceptable values for security settings;
a setting comparitor which evaluates said retrieved security settings against said policy; and
a report generator operative to produce a user-readable report with indications of security settings which do not comply with said policy. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable media encoded with software for performing the steps of:
-
accessing one or more security parameters of said storage management system;
evaluating said security parameters against a set of security policies, rules and allowable parameter values; and
indicating in a user-readable report which security parameters fail to meet said security policies, rules and allowable parameter values. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification