VULNERABILITY-BASED REMEDIATION SELECTION
First Claim
1. A host device comprising:
- at least one processor;
at least one memory device;
a network interface device;
a sensor program held in the at least one memory device and executable by the at least one processor to;
assess a current state of the host device;
send information representative of the current state of the host device to a server via the network interface device;
receive, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including;
instructions executable by the processor though the sensor program, the instructions including at least one remediation for at least one vulnerability of the host device and a plurality of T_ID fields, wherein the content of a T_ID field denotes an identification (ID) of a technology species (T) present in the host device; and
for each of the T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT); and
implement the at least one remediation upon the host device through execution of the instructions of the received remediation information to mitigates the at least one vulnerability present on the host device.
0 Assignments
0 Petitions
Accused Products
Abstract
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.
-
Citations
15 Claims
-
1. A host device comprising:
-
at least one processor; at least one memory device; a network interface device; a sensor program held in the at least one memory device and executable by the at least one processor to; assess a current state of the host device; send information representative of the current state of the host device to a server via the network interface device; receive, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including; instructions executable by the processor though the sensor program, the instructions including at least one remediation for at least one vulnerability of the host device and a plurality of T_ID fields, wherein the content of a T_ID field denotes an identification (ID) of a technology species (T) present in the host device; and for each of the T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT); and implement the at least one remediation upon the host device through execution of the instructions of the received remediation information to mitigates the at least one vulnerability present on the host device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
assessing a current state of a host device; sending information representative of the current state of the host device to a server via a network interface device; receiving, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including; instructions executable by a processor of the host device though a sensor program implementing the method, the instructions including at least one remediation for at least one vulnerability of the host device and a plurality of T_ID fields, wherein the content of a T_ID field denotes an identification (ID) of a technology species (T) present in the host device; and for each of the T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT); and implementing the at least one remediation upon the host device through execution of the instruction of the received remediation information to mitigate the at least one vulnerability present on the host device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A machine-readable storage medium, with instructions stored thereon, which when executed by at least one processor, causes a machine to perform a method comprising:
-
assessing a current state of a host device; sending information representative of the current state of the host device to a server via a network interface device; receiving, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including; instructions executable by a processor of the host device though a sensor program implementing the method, the instructions including at least one remediation for at least one vulnerability of the host device and a plurality of T_ID fields, wherein the content of a T_ID field denotes an identification (ID) of a technology species (T) present in the host device; and for each of the T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT); and implementing the at least one remediation upon the host device through execution of the instruction of the received remediation information to mitigate the at least one vulnerability present on the host device. - View Dependent Claims (12, 13, 14, 15)
-
Specification