Security control verification and monitoring subsystem for use in a computer information database system
First Claim
1. A security control verification and monitoring subsystem for use with a managed computer system, the security control verification and monitoring subsystem including:
- A. a security control manager for assigning respective security risk categories to groups of computers, associating benchmark security levels with the risk categories for the respective groups, and directing a computer within a given group as to the benchmark security level the computer should use for security compliance testing; and
B. a security verifier associated with a given computer for retrieving benchmark definition files that correspond to the benchmark security level specified by the security control manager and selected attributes of the computer, performing a security verification operation using the retrieved benchmark definition files, and reporting the results of the security control verification operation to the security control manager.
1 Assignment
0 Petitions
Accused Products
Abstract
A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each security control verification operation determines the applicable security benchmark level for use by a given computer. The subsystem assigns security risk categories to groups of computers based, for example, on overall system or group administrator supplied potential impact settings and/or system type and business or information type selections. The subsystem further associates the security risk categories with security benchmark levels based on mapping information supplied by the overall system or group administrator. The subsystem then directs the computer to benchmark definition files based on the assigned security risk category, the associated security benchmark level and attributes of the computer. The subsystem performs the security control verification operations whenever the computer performs computer profile data update operations, and thus, monitors essentially continuously the security control compliance of the computer. The subsystem stores the results of the security verification operations and includes the results in reports for the system, group or computer.
-
Citations
23 Claims
-
1. A security control verification and monitoring subsystem for use with a managed computer system, the security control verification and monitoring subsystem including:
-
A. a security control manager for assigning respective security risk categories to groups of computers, associating benchmark security levels with the risk categories for the respective groups, and directing a computer within a given group as to the benchmark security level the computer should use for security compliance testing; and
B. a security verifier associated with a given computer for retrieving benchmark definition files that correspond to the benchmark security level specified by the security control manager and selected attributes of the computer, performing a security verification operation using the retrieved benchmark definition files, and reporting the results of the security control verification operation to the security control manager. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for monitoring security control verification in a managed computer system, the method including:
-
A. assigning security risk categories to groups of computers;
B. for the respective groups mapping benchmark security levels to the risk categories;
C. associating a given computer with the benchmark security level associated with the group to which the computer belongs;
D. selecting benchmark definition files that correspond to the associated benchmark security level and selected attributes of the given computer;
D. comparing the security control settings of the given computer with the settings of the selected benchmark; and
E. reporting the results of the comparisons. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A security control manager for controlling security verification operations in a managed computer system, the security control manager including:
-
A. means for i. assigning security risk categories to respective groups of computers, ii. for the respective groups associating the risk categories with benchmark security levels, and iii. selecting the benchmark security level for use by a given computer based on the security risk category assigned to the group of which the computer is a member and the benchmark security level associated with the assigned risk category for the group; and
B. means for allowing an overall system or a group administrator to select a mapping of security risk categories to benchmark security levels. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification