RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE
First Claim
1. A method for asset-centric management, comprising:
- receiving, at a management system, information that characterizes one or more attributes of one or more assets in communication with a managed network;
loading a criticality rules table that includes a plurality of rules, each rule mapping an individual attribute and/or a group of attributes to a corresponding criticality score, wherein each criticality score is configured to indicate a level of risk in the event that an associated asset is compromised by a third party; and
assigning one or more criticality scores to the one or more assets based on (i) the one or more attributes of one or more assets, and (ii) the criticality rules table.
4 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
13 Citations
28 Claims
-
1. A method for asset-centric management, comprising:
-
receiving, at a management system, information that characterizes one or more attributes of one or more assets in communication with a managed network; loading a criticality rules table that includes a plurality of rules, each rule mapping an individual attribute and/or a group of attributes to a corresponding criticality score, wherein each criticality score is configured to indicate a level of risk in the event that an associated asset is compromised by a third party; and assigning one or more criticality scores to the one or more assets based on (i) the one or more attributes of one or more assets, and (ii) the criticality rules table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for asset-centric management of one or more assets of a managed network, comprising:
-
obtaining, by a management system, a criticality rules table that includes a plurality of rules, each rule mapping an individual attribute and/or a group of attributes to a corresponding criticality score, wherein each criticality score is configured to indicate a level of risk in the event that an associated asset is compromised by a third party; and updating, by the management system, the criticality rules table based upon machine learning and/or feedback from an operator of the managed network, wherein the updating adds one or more rules to the criticality rules table, removes one or more rules to the criticality rules table, and/or modifies one or more of the plurality of rules of the criticality rules table. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A management system for asset-centric management, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; receive information that characterizes one or more attributes of one or more assets in communication with a managed network; load a criticality rules table that includes a plurality of rules, each rule mapping an individual attribute and/or a group of attributes to a corresponding criticality score, wherein each criticality score is configured to indicate a level of risk in the event that an associated asset is compromised by a third party; and assign one or more criticality scores to the one or more assets based on (i) the one or more attributes of one or more assets, and (ii) the criticality rules table.
-
-
28. A management system for asset-centric management of one or more assets of a managed network, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; obtain a criticality rules table that includes a plurality of rules, each rule mapping an individual attribute and/or a group of attributes to a corresponding criticality score, wherein each criticality score is configured to indicate a level of risk in the event that an associated asset is compromised by a third party; and update the criticality rules table based upon machine learning and/or feedback from an operator of the managed network, wherein the updating adds one or more rules to the criticality rules table, removes one or more rules to the criticality rules table, and/or modifies one or more of the plurality of rules of the criticality rules table.
-
Specification