COLLABORATIVE RULES BASED SECURITY
First Claim
1. A cloud computing security system, comprising:
- an access manager module including a first client profile and a second client profile, wherein the first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and wherein the second client profile has a second set of rules enabling access to a second set of cloud computing system resources; and
a security logic module in communication with the access manager module, wherein the security logic module is configured to;
receive an access request for access to one of the first and second sets of cloud computing system resources; and
responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud computing security system. An access manager module includes first and second client profiles. The first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and the second client profile has a second set of rules enabling access to a second set of cloud computing system resources. A security logic module is in communication with the access manager module. The security logic module is configured to receive an access request for access to one of the first and second sets of cloud computing system resources. Responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, the security logic module is configured to provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources.
36 Citations
20 Claims
-
1. A cloud computing security system, comprising:
-
an access manager module including a first client profile and a second client profile, wherein the first client profile has a first set of rules enabling access to a first set of cloud computing system resources, and wherein the second client profile has a second set of rules enabling access to a second set of cloud computing system resources; and a security logic module in communication with the access manager module, wherein the security logic module is configured to; receive an access request for access to one of the first and second sets of cloud computing system resources; and responsive to determining that the access request complies with at least one of the first set of rules and the second set of rules, provide an access grant that grants access to at least one of the first and second sets of cloud computing system resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for implementing cloud computing system security, the method implemented by a processor, the method comprising:
-
evaluating an access request to at least one cloud computing system resource against a set of rules associated with a requestor to determine compliance of the access request with the set of rules; and granting access to the at least one cloud computing system resource to the requestor in response to a determination of compliance. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A cloud computing apparatus, comprising:
-
a security logic module; an access manager module in communication with the security logic module, wherein the access manager module is configured to receive an access request from a client device for access to at least one cloud computing system resource; a request validator module operatively coupled to the access manager module and configured to determine whether the access request is a valid request and whether a requestor associated with the client device is a valid candidate for utilization of the security logic module; the access manager module including a plurality of client profiles, each profile in the plurality of client profiles having a set of rules defining granular access to the at least one cloud computing system resource by the client device, wherein an access grant is provided upon determination of request compliance with the set of rules; and an association definition module configured to establish a model network resource association compliant with the access grant.
-
Specification