FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH
First Claim
1. A method for creating a data snapshot and executing file system protection-specific commands to protect data and limit access of the snapshotted data upon suspicion of a potential security breach, the method comprising:
- in response to identifying a potential breach to a file system, immediately;
generating a read-only snapshot of at least one file set of data that is stored on a storage volume of the file system; and
invoking at least one file system protection command that restricts access to the snapshot of the at least one file set of data.
8 Assignments
0 Petitions
Accused Products
Abstract
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
-
Citations
20 Claims
-
1. A method for creating a data snapshot and executing file system protection-specific commands to protect data and limit access of the snapshotted data upon suspicion of a potential security breach, the method comprising:
in response to identifying a potential breach to a file system, immediately; generating a read-only snapshot of at least one file set of data that is stored on a storage volume of the file system; and invoking at least one file system protection command that restricts access to the snapshot of the at least one file set of data. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
2. The method of claim 2, wherein the steps of generating the read-only snapshot of at least one file set of data stored on the storage volume of the file system, and invoking the at least one file system protection command that restricts access to the snapshot of the at least one file set of data, further comprises:
-
opening an administrative shell for the file-system immediately in response to the identifying the potential breach to the file system; executing an administrative shell snapshot command that invokes the creation of the generated snapshot of the file system; and executing an administrative shell file system protection-specific command that limits access of the data of the snapshot of the at least one file set of data to an administrator, or to a super user that has a higher level of security access than a user of the file system.
-
-
9. A system, comprising:
-
a processing unit in communication with a computer readable memory and a tangible computer-readable storage medium; wherein the processing unit, when executing program instructions comprising at least one file system protection command and stored on the tangible computer-readable storage medium via the computer readable memory, in response to identifying a potential breach to a file system, immediately; generates a read-only snapshot of at least one file set of data that is stored on a storage volume of the file system; and restricts access to the snapshot of the at least one file set of data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for generating a data snapshot and protecting the data snapshot upon a potential, suspected breach of a file system, the computer program product comprising:
-
a computer readable tangible storage medium having computer readable program code embodied therewith, the computer readable program code comprising instructions comprising at least one file system protection command that, when executed by a computer processing unit, cause the computer processing unit to, in response to identifying a potential breach to a file system, immediately; generate a read-only snapshot of at least one file set of data that is stored on a storage volume of the file system; and restrict access to the snapshot of the at least one file set of data. - View Dependent Claims (17, 18, 19, 20)
-
Specification