INDIVIDUALIZED AUDIT LOG ACCESS CONTROL FOR VIRTUAL MACHINES
First Claim
1. A method of operating a computing system to control access to audit logging resources by virtual machines, the method comprising:
- in an authorization system, receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines;
in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data; and
in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.
2 Assignments
0 Petitions
Accused Products
Abstract
To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system is provided. The method includes receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines. The method also includes, in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data. The method also includes, in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.
-
Citations
20 Claims
-
1. A method of operating a computing system to control access to audit logging resources by virtual machines, the method comprising:
-
in an authorization system, receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines; in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data; and in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer apparatus to operate a computing system to control access to audit logging resources by virtual machines, the apparatus comprising:
-
software instructions configured, when executed by one or more computing systems, to direct the one or more computing systems to; in an authorization system, receive requests for audit credentials from virtual machines, and responsively provide individualized audit credentials to the virtual machines based at least on identities of the virtual machines; in the audit system, authorize storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data; in the authorization system, selectively de-authorize one or more of the virtual machines and report information regarding the de-authorized one or more of the virtual machines to the one or more audit systems; and at least one non-transitory computer-readable storage medium storing the software instructions. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification