Cloud Computing Governance, Cyber Security, Risk, and Compliance Business Rules System and Method
First Claim
1. A computer-implemented method comprising:
- a cloud computer system comprising a SaaS level, a PaaS level, and an IaaS level;
the SaaS level further comprised of;
a presentation layer;
a presentation desktop;
an application integration logic; and
application logic;
meta data;
master data;
container objects;
contacts;
workflow and collaboration logic;
visualization logic; and
application and security logic;
the PaaS level further comprised of;
an application programming interface platform with governance business rules and application security logic, collaboration rules and workflow rules as well as business process specific non-technical rules; and
the IaaS level further comprised of;
abstraction and delivery of data based on established rules;
hardware including the operating system and administration rules; and
a facility that includes the physical security rules, cyber security and logical database security rules as well as infrastructure specific technical governance;
execution of tasks and controls for risks;
execution of collaboration and workflow engines to assign and track the progress of risk remediation;
relation of cyber security, compliance and regulatory risks to multiple business rules enabling on-going management of efficiency and risk mitigation;
maintenance and modification of an industry specific repository of business rules and corporate governance control objectives;
collaborative management of the assessment of specific business process control effectiveness at design level as well as operational level aligning it with overall corporate strategic objectives;
display of customizable reporting dashboards with capabilities to report key corporate governance, cyber security and board objectives aligned with right and threats coming in way of these objectives;
providing executive transparence over compliance and risk mitigation of enterprise risks and hurdles across all levels;
provide visibility in day-to-day field operations for all levels of management;
track and monitor global performance, governance, cyber security, risk and compliance initiatives.
0 Assignments
0 Petitions
Accused Products
Abstract
Cloud Computing Governance, Cyber Security, Risk, and Compliance Business Rules System and Method that enable real-time, on-demand, transparent and complete perspective across the risks, threats and opportunities through an enterprise across many operational domains. Cloud platform ensures 24×7 “On Demand” risk-based private and public strategic alignment with regulatory and compliance priorities towards organizational governance objectives. A user can put in place tasks and controls for risks, and use the platform'"'"'s cloud collaboration and workflow engine to track continuous remediation and governance improvements. Relate enterprise security, risks to multiple business rules which can be controls driven or efficiency driven ensuring on-going management of efficiency and risk monitoring. Design, maintain and modify an industry specific repository of business rules and process objectives, and easily manage the assessment and monitoring of specific business process control effectiveness at design, operational level.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
a cloud computer system comprising a SaaS level, a PaaS level, and an IaaS level; the SaaS level further comprised of; a presentation layer; a presentation desktop; an application integration logic; and application logic;
meta data;
master data;
container objects;
contacts;
workflow and collaboration logic;
visualization logic; and
application and security logic;the PaaS level further comprised of; an application programming interface platform with governance business rules and application security logic, collaboration rules and workflow rules as well as business process specific non-technical rules; and the IaaS level further comprised of; abstraction and delivery of data based on established rules; hardware including the operating system and administration rules; and a facility that includes the physical security rules, cyber security and logical database security rules as well as infrastructure specific technical governance; execution of tasks and controls for risks;
execution of collaboration and workflow engines to assign and track the progress of risk remediation;
relation of cyber security, compliance and regulatory risks to multiple business rules enabling on-going management of efficiency and risk mitigation;maintenance and modification of an industry specific repository of business rules and corporate governance control objectives; collaborative management of the assessment of specific business process control effectiveness at design level as well as operational level aligning it with overall corporate strategic objectives; display of customizable reporting dashboards with capabilities to report key corporate governance, cyber security and board objectives aligned with right and threats coming in way of these objectives; providing executive transparence over compliance and risk mitigation of enterprise risks and hurdles across all levels; provide visibility in day-to-day field operations for all levels of management; track and monitor global performance, governance, cyber security, risk and compliance initiatives. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification