Systems And Methods For Implementing Modular Computer System Security Solutions
First Claim
1. An apparatus, comprising:
- a control chain generation module implemented in a memory or a processing device, the control chain generation module configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset, the security guideline control including requirements to satisfy a security guideline associated with the security guideline control,the control chain generation module configured to receive, from an asset database, an indication of a hardware asset in a network, the indication of the hardware asset including attributes of the hardware asset, the control chain generation module configured to select, based on the requirements to satisfy the security guideline and the attributes of the hardware asset, a security implementation control from a plurality of implementation controls and to be associated with the hardware asset,the control chain generation module configured to select, based on the security implementation control and the requirements to satisfy the security guideline, a control assessor to monitor the compliance of the hardware asset with the security guideline, the control chain generation module configured to define a control chain including the security guideline control, the security implementation control, and the control assessor,the control chain generation module configured to send an instruction to apply the control chain to the hardware asset such that the security implementation control is implemented at the hardware asset to improve a security function of the hardware asset and the control assessor monitors the hardware asset for compliance with the security guideline.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset. The control chain generation module is configured to select, based on requirements to satisfy the security guideline and attributes of the hardware asset, a security implementation control. The control chain generation module is configured to select a control assessor to monitor the compliance of the hardware asset with the security guideline and is configured to define a control chain including the security guideline control, the security implementation control, and the control assessor. The control chain generation module is configured to send an instruction to apply the control chain to the hardware asset such that the control assessor monitors the hardware asset for compliance with the security guideline.
30 Citations
27 Claims
-
1. An apparatus, comprising:
-
a control chain generation module implemented in a memory or a processing device, the control chain generation module configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset, the security guideline control including requirements to satisfy a security guideline associated with the security guideline control, the control chain generation module configured to receive, from an asset database, an indication of a hardware asset in a network, the indication of the hardware asset including attributes of the hardware asset, the control chain generation module configured to select, based on the requirements to satisfy the security guideline and the attributes of the hardware asset, a security implementation control from a plurality of implementation controls and to be associated with the hardware asset, the control chain generation module configured to select, based on the security implementation control and the requirements to satisfy the security guideline, a control assessor to monitor the compliance of the hardware asset with the security guideline, the control chain generation module configured to define a control chain including the security guideline control, the security implementation control, and the control assessor, the control chain generation module configured to send an instruction to apply the control chain to the hardware asset such that the security implementation control is implemented at the hardware asset to improve a security function of the hardware asset and the control assessor monitors the hardware asset for compliance with the security guideline. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, from a control database, a guideline control to be implemented with respect to an asset, the guideline control including requirements to satisfy a guideline associated with the guideline control; receive, from an asset database, an indication of the asset, the indication of the asset including attributes of the asset; select, based on the requirements to satisfy the guideline and the attributes of the asset, an implementation control from a plurality of implementation controls and to be associated with the asset; select, based on the implementation control and the requirements to satisfy the guideline, a control assessor to monitor the compliance of the asset with the guideline; define a control chain including the guideline control, the implementation control, and the control assessor; and send an instruction to apply the control chain to the asset such that the implementation control is implemented with respect to the asset and the control assessor monitors the asset for compliance with the guideline. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus, comprising:
-
a translation module implemented in a memory or a processing device, the translation module configured to receive an indication of a guideline, the translation module configured to translate the indication of the guideline into a guideline control; an implementation control module configured to receive, from a first user, an implementation control used to satisfy the guideline, the implementation control module configured to associate the implementation control with the guideline control; an assessor control module configured to receive, from a second user, an assessor control used to monitor an asset'"'"'s compliance with the guideline, the assessor control module configured to associate the assessor control with the implementation control and the guideline control to define a control chain; and a distribution module configured to receive, from a third user, a request for a solution associated with the guideline, the distribution module configured to provide the control chain to the third user such that the third user can implement the control chain. - View Dependent Claims (22, 23)
-
-
24. A method, comprising:
-
receiving from a user interface a selection of a representation of an asset in the user interface and corresponding to an asset; retrieving from a database an asset hierarchy associated with the asset and including at least one sub-asset associated with the asset; displaying a representation of the at least one sub-asset associated with the asset in the user interface, the representation of the at least one sub-asset is displayed in an orbit surrounding the representation of the asset; retrieving from the database attribute data associated with the at least one sub-asset, the attribute data including a health evaluation score of the at least one sub-asset; and provide a representation of the attribute data associated with the at least one sub-asset in proximity to the representation of the asset in the user interface. - View Dependent Claims (25, 26, 27)
-
Specification