APPLICATION SECURITY ASSESSMENT
First Claim
Patent Images
1. A system for application security assessment, the system comprising:
- one or more processors; and
a non-transitory computer readable medium storing a plurality of instructions, which when executed, cause the one or more processors to;
identify a first security configuration and a second security configuration associated with an application;
calculate a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting;
cause a security report associated with the application to be generated, the security report including the security score; and
cause the security report to be outputted.
2 Assignments
0 Petitions
Accused Products
Abstract
Application security assessment is described. A system identifies a first security configuration and a second security configuration associated with an application. The system calculates a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting. The system generates a security report associated with the application that includes the security score and outputs the security report.
-
Citations
20 Claims
-
1. A system for application security assessment, the system comprising:
-
one or more processors; and a non-transitory computer readable medium storing a plurality of instructions, which when executed, cause the one or more processors to; identify a first security configuration and a second security configuration associated with an application; calculate a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting; cause a security report associated with the application to be generated, the security report including the security score; and cause the security report to be outputted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising computer-readable program code to be executed by one or more processors when retrieved from a non-transitory computer-readable medium, the program code including instructions to:
-
identify a first security configuration and a second security configuration associated with an application; calculate a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting; cause a security report associated with the application to be generated, the security report including the security score; and cause the security report to be outputted. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
identifying, by a computing system, a first security configuration and a second security configuration associated with an application; calculating, by the computing system, a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting; causing, by the computing system, a security report associated with the application to be generated, the security report including the security score; and causing, by the computing system, the security report to be outputted. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification