Configuring and organizing server security information
First Claim
1. A system that facilitates organizing server security-related information into a format readily usable by a user developing a server, the system comprising a computer having a processor and memory storing:
- a server security schema configuration component that facilitates identification of expertise related to the server security-related information and that provides organizational information;
a server security schema component that is a pattern-based information model that groups the server security-related information and the expertise related to the server security-related information into a structure, the server security schema component comprising;
a plurality of server security-related categories associated with the server that are customized to a particular server type of the server, the plurality of server security-related categories identifying areas where security issues exist for the particular server type of the server,a plurality of vulnerability components, wherein each of the plurality of server security-related categories has at least one vulnerability component associated with it, the plurality of vulnerability components describing weaknesses that make attacks possible for the associated security-related category,a plurality of threat/attack components, wherein each of the plurality of vulnerability components has at least one threat/attack component associated with it, each of the plurality of threat/attack components referring to at least a threat or an attack, the threat describing an undesired event or a potential occurrence that may harm or compromise an asset, the attack describing an action taken that utilizes one or more vulnerabilities to realize a threat, anda plurality of countermeasure components, wherein each of the plurality of threat/attack components has at least one countermeasure component associated with it, the plurality of countermeasure components describing safeguards that address attacks or mitigate risks;
wherein the structure of the server security schema component is based on the organizational information and associations; and
wherein the security schema component, plurality of server security-related categories, plurality of vulnerability components, plurality of threat/attack components, and plurality of countermeasure components are used in developing a server of the particular server type.
2 Assignments
0 Petitions
Accused Products
Abstract
A server security schema that can incorporate server security-related expertise into an information model is provided. The novel server security schema component can be applied to an application server, a web server and/or a database server to converge knowledge into securing the server by identifying categories, vulnerabilities, threats, attacks and countermeasures. The novel schema can create a common framework that converges knowledge with respect to any server type. More particularly, the novel server security schema can address server categories including a share, a service, an account, an audit and log, a file and directory, a registry, a protocol, a port, and a patch and update category.
-
Citations
20 Claims
-
1. A system that facilitates organizing server security-related information into a format readily usable by a user developing a server, the system comprising a computer having a processor and memory storing:
-
a server security schema configuration component that facilitates identification of expertise related to the server security-related information and that provides organizational information; a server security schema component that is a pattern-based information model that groups the server security-related information and the expertise related to the server security-related information into a structure, the server security schema component comprising; a plurality of server security-related categories associated with the server that are customized to a particular server type of the server, the plurality of server security-related categories identifying areas where security issues exist for the particular server type of the server, a plurality of vulnerability components, wherein each of the plurality of server security-related categories has at least one vulnerability component associated with it, the plurality of vulnerability components describing weaknesses that make attacks possible for the associated security-related category, a plurality of threat/attack components, wherein each of the plurality of vulnerability components has at least one threat/attack component associated with it, each of the plurality of threat/attack components referring to at least a threat or an attack, the threat describing an undesired event or a potential occurrence that may harm or compromise an asset, the attack describing an action taken that utilizes one or more vulnerabilities to realize a threat, and a plurality of countermeasure components, wherein each of the plurality of threat/attack components has at least one countermeasure component associated with it, the plurality of countermeasure components describing safeguards that address attacks or mitigate risks; wherein the structure of the server security schema component is based on the organizational information and associations; and wherein the security schema component, plurality of server security-related categories, plurality of vulnerability components, plurality of threat/attack components, and plurality of countermeasure components are used in developing a server of the particular server type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method implemented within a computing system that includes a processor and memory storing instructions which, when executed by the processor, implement the method of organizing expertise and server security-related information into a format readily usable by a user developing a server, the method comprising:
-
identifying a plurality of server security-related categories associated with the server that are customized to a particular server type of the server, the plurality of server security-related categories identifying areas where security issues exist for the particular server type of the server; identifying a plurality of vulnerability components, each of the plurality of vulnerability components describing weaknesses that make attacks possible for a corresponding at least one of the plurality of server security-related categories; associating each of the plurality of vulnerability components with the corresponding at least one of the plurality of server security-related categories; identifying a plurality of threat/attack components, each of the plurality of threat/attack components referring to at least a threat or an attack, the threat describing an undesired event or a potential occurrence that may harm or compromise an asset, the attack describing an action taken that utilizes one or more vulnerabilities to realize a threat; associating each of the plurality of threat/attack components with at least one of the plurality of vulnerability components; identifying a plurality of countermeasure components, the plurality of countermeasure components describing safeguards that address attacks or mitigate risks; associating each of the plurality of countermeasure components with at least one of the plurality of threat/risk components; providing organizational information; and grouping the expertise, the security related information, the plurality of server-security related categories, the plurality of vulnerability components, the plurality of threat/attack components, and the plurality of countermeasure components into a pattern-based information model in a structure, the structure being dictated by the organizational information and associations, and which is usable in developing a server of the particular server type. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification