×

SECURITY POLICY MANAGEMENT

  • US 20160217286A1
  • Filed: 01/27/2015
  • Published: 07/28/2016
  • Est. Priority Date: 01/27/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a computing system, the method comprising:

  • with a computing system, receiving an application and a security policy corresponding to the application, the security policy for use with a security enforcement mechanism;

    with the computing system, receiving a data structure associated with the application and the security policy, wherein the data structure associates a logged denial by the security enforcement mechanism with a rule of the security policy, wherein the data structure further associates the logged denial with a test for the rule, the test to determine if the rule prevents the denial;

    with the computing system, applying the test using a temporary security policy, the temporary security policy having the rule removed; and

    with the computing system, in response to determining that the applying does not result in a denial corresponding to the logged denial, flagging the data structure.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×