METHOD AND SYSTEM FOR MULTIPLE SUB-SYSTEMS META SECURITY POLICY
First Claim
1. A method for multiple sub-systems meta Security Policy (MSSMSP) comprising business process policies for a business organization having a meta policy server, Business Asset Monitors (BAM'"'"'s) and security sub-systems, wherein the security sub-systems are supported by Policy Connectors and wherein the BAM'"'"'s are software agents on each business asset that are responsible to monitor the organizational users'"'"' activities and report that information to the meta policy server, the method comprising:
- defining by a Chief Security Officer (CSO) of the organizational business assets, wherein the business assets are supported by the BAM'"'"'s;
correlating by said CSO of abstract, business oriented parameters with technical, low-level parameters of the security sub-systems; and
validating the security policy relative to the user'"'"'s by monitoring the users'"'"' activities against the business assets and by using the meta policy server,thereby enabling the creation, management and control of one central MSSMSP in correlation to the various security sub-system'"'"'s policies.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for multiple sub-systems meta Security Policy (MSSMSP) including business process policies for a business organization having a meta policy server, Business-Asset-Monitors (BAM'"'"'s) and security sub-systems, wherein the security sub-systems are supported by Policy Connectors and wherein the BAM'"'"'s are software agents on each business asset that are responsible to monitor the organizational users'"'"' activities and report that information to the meta policy server. The method includes defining by a Chief-Security-Officer (CSO) of the organizational business assets, wherein the business assets are supported by the BAM'"'"'s. The method also includes correlating by the CSO of abstract, business-oriented-parameters with technical, low-level parameters of the security sub-systems and validating the security policy relative to the user'"'"'s by monitoring the users'"'"' activities against the business assets and by using the meta policy server, thereby enabling the creation, management and control of one central MSSMSP in correlation to the various security sub-system'"'"'s policies.
-
Citations
12 Claims
-
1. A method for multiple sub-systems meta Security Policy (MSSMSP) comprising business process policies for a business organization having a meta policy server, Business Asset Monitors (BAM'"'"'s) and security sub-systems, wherein the security sub-systems are supported by Policy Connectors and wherein the BAM'"'"'s are software agents on each business asset that are responsible to monitor the organizational users'"'"' activities and report that information to the meta policy server, the method comprising:
-
defining by a Chief Security Officer (CSO) of the organizational business assets, wherein the business assets are supported by the BAM'"'"'s; correlating by said CSO of abstract, business oriented parameters with technical, low-level parameters of the security sub-systems; and validating the security policy relative to the user'"'"'s by monitoring the users'"'"' activities against the business assets and by using the meta policy server, thereby enabling the creation, management and control of one central MSSMSP in correlation to the various security sub-system'"'"'s policies. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system under the direction of a chief security officer (CSO), said system providing Multiple Sub-Systems Meta Security Policy (MSSMSP) for a business organization comprising organizational business assets and employees/users, said system comprising:
-
a meta policy server (MPS) enabling the CSO to define the organizational business assets and to correlate abstract, business oriented parameters with technical, low-level parameters; a plurality of business processes, wherein said business processes represent the activities the employees/user are activating on the business assets; and a connectors framework comprising; a business asset monitor (BAM) framework, wherein the BAM'"'"'s are components designed to monitor said business assets as part of the connectors framework; and a policy connectors (PC) framework, wherein the PC framework comprises components to communicate with the various security sub-systems, thereby enabling the creation, management and control of one central MSSMSP in correlation to the various security sub-system'"'"'s policies various security sub-system'"'"'s policies. - View Dependent Claims (9, 10, 11, 12)
-
Specification