Method for the automatic setting and updating of a security policy
First Claim
1. A method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising:
- a. Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system;
b. Periodically operating said at least one trusted source in order to periodically issue said report;
c. Importing each trusted source report into a security correcting unit, and forming one consolidated file containing the details from all said reports;
d. Importing into said security correcting unit the attributes files of all the security packages;
e. Separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and
f. Separately exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising: (a) Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system; (b) Periodically operating said at least one trusted source in order to periodically issue said report; (c) Importing each trusted source report into a security correcting unit, and forming one consolidated file containing the details from all said reports; (d) Importing into said security correcting unit the attributes files of all the security packages; (e) Separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and (f) Separately exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy.
-
Citations
18 Claims
-
1. A method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising:
-
a. Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system;
b. Periodically operating said at least one trusted source in order to periodically issue said report;
c. Importing each trusted source report into a security correcting unit, and forming one consolidated file containing the details from all said reports;
d. Importing into said security correcting unit the attributes files of all the security packages;
e. Separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and
f. Separately exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for creating and/or updating a security policy, comprising:
-
a. At least one security package enforcing a security policy within a predefined range of responsibility, said policy being defined by means of a specific attributes file associated with each of said packages;
b. At least one trusted source capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system;
c. A security correcting unit for;
importing said reports from all the trusted sources, and producing a consolidated file including information from all said reports; and
importing the attributes files from all the security packages, separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, which is missing from the said attributes file, and is relevant to said attributes file, and exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification