Enforcing alignment of approved changes and deployed changes in the software change life-cycle
First Claim
1. A method to be executed by a processor, comprising:
- intercepting a host content change request indicating a change to a persistent object on a host computer;
determining whether the change is authorized, as indicated by a set of change authorization policies;
allowing the change to take effect when the change is authorized;
blocking the change from taking effect when the change is not authorized;
logging information about the host content change request;
obtaining a log representing a set of host content change requests;
comparing the log to a set of approved change orders for any one or more of a plurality of persistent objects on the host computer;
identifying at least one correlation between the set of host content change requests and the set of approved change orders; and
providing user-readable data representing the at least one correlation,wherein the set of change authorization policies is configurable to define whether the persistent object can be changed.
11 Assignments
0 Petitions
Accused Products
Abstract
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host. In an enforcement mode, the change requests are logged and additionally compared against authorized change policies and a determination is made whether to allow the change to take effect or to block the changes, thereby enforcing the authorized change policies on the host. Tracking and enforcement can be done in real-time. In either mode and at any time, the logged changes can be reconciled against a set of approved change orders in order to identify classes of changes, including changes that were deployed but not approved and changes that were approved but not deployed.
-
Citations
34 Claims
-
1. A method to be executed by a processor, comprising:
-
intercepting a host content change request indicating a change to a persistent object on a host computer; determining whether the change is authorized, as indicated by a set of change authorization policies; allowing the change to take effect when the change is authorized; blocking the change from taking effect when the change is not authorized; logging information about the host content change request; obtaining a log representing a set of host content change requests; comparing the log to a set of approved change orders for any one or more of a plurality of persistent objects on the host computer; identifying at least one correlation between the set of host content change requests and the set of approved change orders; and providing user-readable data representing the at least one correlation, wherein the set of change authorization policies is configurable to define whether the persistent object can be changed. - View Dependent Claims (2, 3, 4, 5, 33, 34)
-
-
6. Logic encoded in one or more non-transitory computer readable media having computer-executable instructions and when executed by a processor is operable to perform operations comprising:
-
intercepting a host content change request indicating a change to a persistent object on a host; determining whether the change is authorized, as indicated by a set of change authorization policies; allowing the change to take effect when the change is authorized; blocking the change from taking effect when the change is not authorized; logging information about the host content change request; obtaining a log representing a set of host content change requests; comparing the log to a set of approved change orders for any one or more of a plurality of persistent objects on the host; identifying at least one correlation between the set of host content change requests and the set of approved change orders; and providing user-readable data representing the at least one correlation, wherein the set of change authorization policies is configurable to define whether the persistent object can be changed. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A host, comprising:
-
a memory element for storing a set of change authorization policies; and a processor operable to execute instructions associated with a management module, including; intercepting a host content change request indicating a change to a persistent object on the host; determining whether the change is authorized, as indicated by the set of change authorization policies; allowing the change to take effect when the change is authorized; and blocking the change from taking effect when the change is not authorized logging information about the host content change request; obtaining a log representing a set of host content change requests; comparing the log to a set of approved change orders for any one or more of a plurality of persistent objects on the host; identifying at least one correlation between the set of host content change requests and the set of approved change orders; and providing user-readable data representing the at least one correlation, wherein the set of change authorization policies is configurable to define whether the persistent object can be changed. - View Dependent Claims (12, 13, 14)
-
-
15. A method to be executed by a processor, comprising:
-
intercepting a host content change request indicating a change to a persistent object on a host computer; determining whether the change is authorized, as indicated by a set of change authorization policies; allowing the change to take effect when the change is authorized; logging information about the host content change request; obtaining a log representing a set of change requests for at least one persistent object of a plurality of persistent objects on the host computer; comparing the log to a set of approved change orders for any one or more of the plurality of persistent objects; identifying one or more discrepancies between the set of change requests and the set of approved change orders; and providing user-readable data representing the one or more discrepancies. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. Logic encoded in one or more non-transitory computer readable media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
intercepting a host content change request indicating a change to a persistent object on a host; determining whether the change is authorized, as indicated by a set of change authorization policies; allowing the change to take effect when the change is authorized; logging information about the host content change request; obtaining a log representing a set of change requests for at least one persistent object of a plurality of persistent objects on a host; comparing the log to a set of approved change orders for any one or more of the plurality of persistent objects; identifying one or more discrepancies between the set of change requests and the set of approved change orders; and providing user-readable data representing the one or more discrepancies. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A host, comprising:
-
a memory element configured to store a log representing a set of change requests for at least one persistent object of a plurality of persistent objects on a host; and a processor operable to execute instructions associated with a reconciliation module, including; intercepting a host content change request indicating a change to a persistent object on a host; determining whether the change is authorized, as indicated by a set of change authorization policies; allowing the change to take effect when the change is authorized; logging information about the host content change request; obtaining the log representing the set of change requests; comparing the log to a set of approved change orders for any one or more of the plurality of persistent objects; identifying one or more discrepancies between the set of change requests and the set of approved change orders; and providing user-readable data representing the one or more identified discrepancies. - View Dependent Claims (29, 30, 31, 32)
-
Specification