SYSTEMS AND METHODS FOR ENABLING ASSURED RECORDS USING FINE GRAINED AUDITING OF VIRTUAL PRIVATE NETWORK TRAFFIC
First Claim
1. A method for enabling assured compliance records using fine grained auditing of network traffic, the method comprising:
- (a) establishing, by an appliance, a transport layer virtual private network connection with a client operated by a user;
(b) receiving, by the appliance via the connection, a request from the client identifying a resource;
(c) determining, by the appliance, the request meets at least one security condition;
(d) transmitting, by the appliance to an audit log, a record of the request;
(e) receiving, by the appliance from the audit log, a confirmation that the record was received; and
(f) granting, responsive to the received confirmation, access to the identified resource.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods for enabling assured records using fine grained auditing of virtual private network traffic include establishing, by an appliance, a transport layer virtual private network connection with a client operated by a user; receiving, by the appliance via the connection, a request from the client identifying a resource; determining, by the appliance, the request meets at least one security condition; transmitting, by the appliance to an audit log, a record of the request; receiving, by the appliance from the audit log, a confirmation that the record was logged; and granting, responsive to the received confirmation, access to the identified resource. Security conditions may identify at least one user, at least one application, a network or group of networks, and one or more resources. Corresponding systems are also described.
141 Citations
20 Claims
-
1. A method for enabling assured compliance records using fine grained auditing of network traffic, the method comprising:
-
(a) establishing, by an appliance, a transport layer virtual private network connection with a client operated by a user; (b) receiving, by the appliance via the connection, a request from the client identifying a resource; (c) determining, by the appliance, the request meets at least one security condition; (d) transmitting, by the appliance to an audit log, a record of the request; (e) receiving, by the appliance from the audit log, a confirmation that the record was received; and (f) granting, responsive to the received confirmation, access to the identified resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented system for enabling assured compliance records using fine grained auditing of network traffic, the system comprising:
an appliance which establishes a transport layer virtual private network connection with a client operated by a user;
receives via the connection, a request from the client identifying a resource;
determines the request meets at least one security condition;
transmits, to an audit log, a record of the request;
receives, from the audit log, a confirmation that the record was received; and
grants, responsive to the received confirmation, access to the identified resource.- View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification