METHOD AND APPARATUS FOR CREATING AN INFORMATION SECURITY POLICY BASED ON A PRE-CONFIGURED TEMPLATE
First Claim
Patent Images
1. A method comprising:
- identifying, by a computer system, a policy template that includes information for creation of one or more policies for preventing use-restricted content from being sent over a network;
identifying, by the computer system, source data having a tabular structure, the source data including a plurality of data elements having the use-restricted content; and
creating, by the computer system, a policy based on the identified policy template and the source data, wherein the policy is used for preventing presence of the plurality of data elements in one or more messages sent over the network, the plurality of data elements having the use-restricted content and being from the tabular structure of the identified source data.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is identified. Further, one of multiple policy templates is used to automatically create a policy for detecting information from any one or more rows within the tabular structure of the source data.
-
Citations
22 Claims
-
1. A method comprising:
-
identifying, by a computer system, a policy template that includes information for creation of one or more policies for preventing use-restricted content from being sent over a network; identifying, by the computer system, source data having a tabular structure, the source data including a plurality of data elements having the use-restricted content; and creating, by the computer system, a policy based on the identified policy template and the source data, wherein the policy is used for preventing presence of the plurality of data elements in one or more messages sent over the network, the plurality of data elements having the use-restricted content and being from the tabular structure of the identified source data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a data store to store a policy template that includes information for creation of one or more policies for preventing use-restricted content from being sent over a network; a memory to store instructions for a policy specifier; and a processor, coupled to the memory, to execute the instructions for the policy specifier, wherein the processer is configured to; identify source data having a tabular structure, the source data including a plurality of data elements having the use-restricted content; and create a policy based on the identified policy template and the source data, wherein the policy is used for preventing presence of the plurality of data elements in one or more messages sent over the network, the plurality of data elements having the use-restricted content and being from the tabular structure of the identified source data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium having instructions that, when executed by a processor, cause the processor to perform a method comprising:
-
identifying, by a computer system, a policy template that includes information for creation of one or more policies for preventing use-restricted content from being sent over a network; identifying, by the computer system, source data having a tabular structure, the source data including a plurality of data elements having the use-restricted content; and creating, by the computer system, a policy based on the identified policy template and the source data, wherein the policy is used for preventing presence of the plurality of data elements in one or more messages sent over the network, the plurality of data elements having the use-restricted content and being from the tabular structure of the identified source data. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification