APPARATUS AND METHOD FOR PROVIDING A FLUID SECURITY LAYER
First Claim
1. An apparatus, comprising:
- a processor and a memory communicatively connected to the processor, the processor configured to;
select a location for a security rule based on a policy associated with the security rule;
determine whether to migrate the security rule to the location selected for the security rule; and
initiate migration of the security rule to the location selected for the security rule based on a determination to migrate the security rule to the location selected for the security rule.
6 Assignments
0 Petitions
Accused Products
Abstract
A security management capability enables migration of individual security rules between storage/application locations. The migration of a security rule may include selection of a location at which the security rule is to be applied and migration of the security rule to the selected location at which the security rule is to be applied. The selection of the location at which the security rule is to be applied may be performed based on security rule policies and/or security rule location selection information. The security rule is migrated from a current location (e.g., a location at which the security rule is currently applied, a management system, or the like) to the selected location at which the security rule is to be applied. In this manner, a fluid security layer may be provided. The fluid security layer may be optimized for one or more of security level, performance, cost, or the like.
-
Citations
21 Claims
-
1. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to; select a location for a security rule based on a policy associated with the security rule; determine whether to migrate the security rule to the location selected for the security rule; and initiate migration of the security rule to the location selected for the security rule based on a determination to migrate the security rule to the location selected for the security rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19)
-
12. (canceled)
-
20. A method, comprising:
using a processor and a memory for; selecting a location for a security rule based on a policy associated with the security rule; determining whether to migrate the security rule to the location selected for the security rule; and initiating migration of the security rule to the location selected for the security rule based on a determination to migrate the security rule to the location selected for the security rule.
-
21. A non-transitory computer-readable storage medium storing instructions which, when executed by a computer, cause the computer to perform a method, the method comprising:
-
selecting a location for a security rule based on a policy associated with the security rule; determining whether to migrate the security rule to the location selected for the security rule; and initiating migration of the security rule to the location selected for the security rule based on a determination to migrate the security rule to the location selected for the security rule.
-
Specification