MANAGING COMPUTER SECURITY SERVICES FOR CLOUD COMPUTING PLATFORMS
First Claim
1. A computer-implemented method of managing security services for one or more cloud computing platforms, comprising:
- receiving, by a main controller, a security policy from a client device,the client device being associated with a set of computing applications hosted by one or more independent, private virtual clusters on one or more cloud computing platforms,the main controller residing outside the one or more virtual clusters,each of the one or more virtual clusters to be served by a security gateway system residing within the one or more cloud computing platforms,the security policy indicating how threat intelligence data is to be applied to the set of computing applications with respect to a plurality of application scopes;
receiving application data from the client device,the application data indicating whether a specific computing application of the set of computing applications has one or more application properties of a plurality of application properties,the plurality of application properties corresponding to the plurality of application scopes,the one or more application properties including a functional attribute related to a function of the specific computing application,obtaining a piece of threat intelligence data from a data source;
mapping the piece of threat intelligence data to the plurality of application scopes;
determining to which of the one or more security gateway systems to send the piece of threat intelligence data based on the security policy;
transmitting the piece of threat intelligence data to at least one of the one or more security gateway systems based on the determining.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method of managing security services for one or more cloud computing platforms is disclosed. The method comprises receiving, by a main controller, a security policy from a client device, the client device being associated with a set of computing applications hosted by one or more independent, private virtual clusters on one or more cloud computing platforms, the main controller residing outside the one or more virtual clusters, each of the one or more virtual clusters to be served by a security gateway system residing within the one or more cloud computing platforms, the security policy indicating how threat intelligence data is to be applied to the set of computing applications with respect to a plurality of application scopes; receiving application data from the client device, the application data indicating whether a specific computing application of the set of computing applications has one or more application properties of a plurality of application properties, the plurality of application properties corresponding to the plurality of application scopes, the one or more application properties including a functional attribute related to a function of the specific computing application, obtaining a piece of threat intelligence data from a data source; mapping the piece of threat intelligence data to the plurality of application scopes; determining to which of the one or more security gateway systems to send the piece of threat intelligence data based on the security policy; transmitting the piece of threat intelligence data to at least one of the one or more security gateway systems based on the determining.
-
Citations
22 Claims
-
1. A computer-implemented method of managing security services for one or more cloud computing platforms, comprising:
-
receiving, by a main controller, a security policy from a client device, the client device being associated with a set of computing applications hosted by one or more independent, private virtual clusters on one or more cloud computing platforms, the main controller residing outside the one or more virtual clusters, each of the one or more virtual clusters to be served by a security gateway system residing within the one or more cloud computing platforms, the security policy indicating how threat intelligence data is to be applied to the set of computing applications with respect to a plurality of application scopes; receiving application data from the client device, the application data indicating whether a specific computing application of the set of computing applications has one or more application properties of a plurality of application properties, the plurality of application properties corresponding to the plurality of application scopes, the one or more application properties including a functional attribute related to a function of the specific computing application, obtaining a piece of threat intelligence data from a data source; mapping the piece of threat intelligence data to the plurality of application scopes; determining to which of the one or more security gateway systems to send the piece of threat intelligence data based on the security policy; transmitting the piece of threat intelligence data to at least one of the one or more security gateway systems based on the determining. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for managing security services for one or more cloud computing platforms, comprising:
-
one or more local controllers respectively residing within one or more independent, private virtual clusters on one or more cloud computing platforms; one or more security gateway systems respectively corresponding to the one or more local controllers and residing within the one or more cloud computing platforms; a main controller residing outside the one or more virtual clusters, the one or more virtual clusters being associated with one or more client devices, the one or more virtual clusters hosting a set of computing applications, a specific local controller of the one or more local controllers receiving private data associated with a specific client device of the one or more client devices from the main controller or one or more computing applications of the set of computing applications, the specific local controller residing within a specific virtual cluster of the one or more virtual clusters associated with the specific client device, the one or more computing applications being hosted by the specific virtual cluster, the specific local controller storing the private data in a local storage using a secure approach that achieves data security and integrity, the specific local controller receiving a request for retrieving the private data from a corresponding security gateway system of the one or more security gateway systems, the specific local controller transmitting the private data to the corresponding security gateway system in response to the request using a secure approach that achieves data security and integrity. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable storage media storing sequences of instructions which when executed cause one or more hardware processors to perform a computer-implemented method of managing security services for one or more cloud computing platforms, the method comprising:
-
receiving, by a security gateway system, a digital communication related to one of one or more computing applications hosted by a private virtual cluster on a cloud computing platform, the security gateway system residing within the cloud computing platform, the security gateway system performing network security gateway functions for the one or more computing applications; storing the digital communication in association with a timestamp in a storage device; receiving a piece of threat intelligence data indicating a security threat from a main controller residing outside the virtual cluster; determining whether the piece of threat intelligence data applies to any of the digital communications in the storage device; transmitting an estimate of an extent or timing of past impact of the security threat based on the determining. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification