Method for the automatic setting and updating of a security policy
First Claim
1. A method for the automatic update of a security policy enforced by at least one security package within a computerized system, comprising the steps of:
- a. Providing within the computerized system at least one trusted source, each capable of issuing a security report detailing at least one of;
network protocol and its related attributes, application protocol and its related attributes application paths, application action, application action attributes, and application action flow, or security flaws within the computerized system;
b. Periodically operating each of said at least one trusted source in order to issue a respective security report;
c. Importing each respective security report into a security correcting unit, and forming one consolidated file comprising the details from each respective security report;
d. Importing into said security correcting unit one or more attributes files of said at least one security package;
e. Separately comparing the content of said consolidated file with the content of each of the imported attributes files, and updating each attributes file with security information included within said consolidated file;
f. Separately exporting said updated attributes files and effecting each of them as the active attributes file or files of the corresponding security package;
g. Using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore; and
h. Importing into said security correcting unit a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and said security correcting unit updating one or more relevant attribute files using the content of said second type report, thereby effecting an updated security policy.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for creating and/or updating a security policy within a computerized system protected by at least one security package, comprising: (a) Providing at least one trusted source within the system, capable of issuing a report detailing the structure and/or attributes of the system and/or security flaws within the system; (b) Periodically operating said at least one trusted source in order to periodically issue said report; (c) Importing each trusted source report into a security correcting unit, and forming one consolidated file containing the details from all said reports; (d) Importing into said security correcting unit the attributes files of all the security packages; (e) Separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with the security information included within said consolidated file, information which is missing from the said attributes file, and is relevant to said attributes file; and (f) Separately exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy.
-
Citations
15 Claims
-
1. A method for the automatic update of a security policy enforced by at least one security package within a computerized system, comprising the steps of:
-
a. Providing within the computerized system at least one trusted source, each capable of issuing a security report detailing at least one of;
network protocol and its related attributes, application protocol and its related attributes application paths, application action, application action attributes, and application action flow, or security flaws within the computerized system;b. Periodically operating each of said at least one trusted source in order to issue a respective security report; c. Importing each respective security report into a security correcting unit, and forming one consolidated file comprising the details from each respective security report; d. Importing into said security correcting unit one or more attributes files of said at least one security package; e. Separately comparing the content of said consolidated file with the content of each of the imported attributes files, and updating each attributes file with security information included within said consolidated file; f. Separately exporting said updated attributes files and effecting each of them as the active attributes file or files of the corresponding security package; g. Using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore; and h. Importing into said security correcting unit a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and said security correcting unit updating one or more relevant attribute files using the content of said second type report, thereby effecting an updated security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computerized system for the automatic update of a security policy, the computerized system comprising one or more computers collectively comprising the following components:
-
a. At least one security package enforcing a security policy within a predefined range of responsibility, said policy being defined by a specific, attributes file associated with each of said at least one security package; b. At least one trusted source capable of issuing a security report detailing at least one of;
network protocol and its related attributes, application protocol and its related attributes, application paths, application action, application action attributes, and application action flow or security flaws within the system;c. A security correcting unit for; importing said report from each of said at least one trusted source, and producing a consolidated file including information from each said report; importing a second type report comprising application locations and paths that are defined by said security correcting unit as the only valid locations and paths for accessing an application, and updating one or more relevant attribute files using the content of said second type report, and importing the attributes file from each of said at least one security package, separately comparing the content of said consolidated file with each of the imported attributes files, and updating each attributes file with security information included within said consolidated file, using a predefined set of logical rules to decide which content from said consolidated file to effect and which to ignore, and exporting said updated attributes files and effecting each of them as the active attributes file of the corresponding security package, thereby effecting an updated security policy. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification