Model based systems management in virtualized and non-virtualized environments
First Claim
1. A computer-implemented systems management system, comprising:
- a security component configured to access security policies included in security models, wherein the security models define security requirements for one or more computers that comprise logical services and provide, at least, mappings for the logical services according to a classification of workloads to provide a secured virtualized environment;
a management component configured to associate functional models to the security models to assign the one or more security models to an appropriate function of a service of the logical services and to submit calls to the security component to obtain the security policies, and apply the security policies from one or more of the security models to the service over a lifecycle of the service; and
a microprocessor configured to execute computer-executable instructions associated with at least one of the security component or the management component.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that provides model-based systems management in virtualized and non-virtualized environments. A security component provides security models which define security requirements for services. A management component applies one or more of the security models during the lifecycle of virtual machines and services. The lifecycle can include initial deployment, expansion, moving servers, monitoring, and reporting. The architecture creates a formal description model of how a virtual machine or a service (composition of multiple virtual machines) is secured. The security requirements information can also be fed back to the general management system which uses this information in its own activities such as to guide the placement of workloads on servers can be security related.
-
Citations
22 Claims
-
1. A computer-implemented systems management system, comprising:
-
a security component configured to access security policies included in security models, wherein the security models define security requirements for one or more computers that comprise logical services and provide, at least, mappings for the logical services according to a classification of workloads to provide a secured virtualized environment; a management component configured to associate functional models to the security models to assign the one or more security models to an appropriate function of a service of the logical services and to submit calls to the security component to obtain the security policies, and apply the security policies from one or more of the security models to the service over a lifecycle of the service; and a microprocessor configured to execute computer-executable instructions associated with at least one of the security component or the management component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented systems management system, comprising:
-
a security component configured to access security policies included in security models, wherein the security models define security requirements for services and provide, at least, mappings for the services according to a classification of workloads to provide a secured virtualized environment; a management component configured to associate functional models to the security models to assign the one or more security models to an appropriate function of a service of the logical services and to submit calls to the security component to obtain the security policies, and apply the security policies from one or more of the security models to a service over a lifecycle of the service; and a microprocessor configured to execute computer-executable instructions associated with at least one of the security component or the management component. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-implemented systems management method, performed by a computer system executing machine-readable instructions, the method comprising acts of:
-
accessing security policies included in security models, wherein the security models define security requirements for services and provides, at least, mappings for the services according to a classification of workloads to provide a secured virtualized environment; receiving calls from a management system component for managing services in the virtualized environment according to functional service models; associating the functional service models to the security models including security policies with the functional service models to assign the one or more security models to an appropriate function of a service of the logical services; applying the security policies from the security models to the services through a lifecycle of the services to secure the computing environment; and configuring a network environment according to one of the security models. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification