Automated security classification and propagation of virtualized and physical virtual machines
First Claim
1. A computer-implemented systems management system having a physical storage media, comprising:
- a management component that accesses one or more security policies selected from a respective plurality of security models and applies the security policies to appropriate functions of a service and associated virtual machines with appropriate functions over a service lifecycle, wherein the plurality of security model are created with the one or more security policies that define security requirements for one or more computers that comprise the service;
a propagation component that obtains and forwards security classifications associated with model characteristics and workload to the management component for inclusion in the security requirements that provide, at least, resource mappings for the service according to a security classification of the workload, for utilization in applying the one or more security policies for security of the one or more computers during the service lifecycle, which includes initial deployment, expansion, moving of servers, monitoring, and reporting; and
a microprocessor that executes computer-executable instructions associated with at least one of the management component or the propagation component.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically propagates security classifications throughout the lifecycle of the service, which can include initial deployment, expansion, moving servers, monitoring, and reporting, for example, and further include classification propagation from the workload (computer), classification propagation in the model, classification propagation according to the lineage of the storage location (e.g., virtual hard drive), status propagation in the model and classification based on data stored in the machine.
-
Citations
20 Claims
-
1. A computer-implemented systems management system having a physical storage media, comprising:
-
a management component that accesses one or more security policies selected from a respective plurality of security models and applies the security policies to appropriate functions of a service and associated virtual machines with appropriate functions over a service lifecycle, wherein the plurality of security model are created with the one or more security policies that define security requirements for one or more computers that comprise the service; a propagation component that obtains and forwards security classifications associated with model characteristics and workload to the management component for inclusion in the security requirements that provide, at least, resource mappings for the service according to a security classification of the workload, for utilization in applying the one or more security policies for security of the one or more computers during the service lifecycle, which includes initial deployment, expansion, moving of servers, monitoring, and reporting; and a microprocessor that executes computer-executable instructions associated with at least one of the management component or the propagation component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented system management method performed by a computer system executing machine-readable instructions, the method, comprising acts of:
-
accessing one or more security policies selected from a respective plurality of security models, wherein the plurality of security model are created with the one or more security policies; defining security requirements from the security policies selected from the plurality of security models to apply to appropriate functions of a service and associated virtual machines provided by one or more computers over a service lifecycle; obtaining and propagating security classifications associated with model characteristics and workload information of the service for inclusion in the security requirements that provide, at least, resource mappings for the service according to a security classification of the workload; applying the one or more security policies for security of the one or more computers during the service lifecycle, which includes initial deployment, expansion, moving of servers, monitoring, and reporting; and configuring a hardware processor to perform the acts of accessing, defining, obtaining, and applying. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer-implemented system management method, performed by a computer system executing machine-readable instructions, the method comprising acts of:
-
accessing one or more security policies selected from a respective plurality of security models, wherein the plurality of security model are created with the one or more security policies; defining security requirements the security policies selected from the plurality of security models to apply to appropriate functions of a service provided by one or more virtual machines over a service lifecycle; propagating security classifications associated with model characteristics and workload to the management component for inclusion in the security requirements that provide, at least, resource mappings for the service according to a security classification of the workload; applying the propagated information for inclusion in the security requirements to secure the service over a lifecycle of the service, which includes initial deployment, expansion, moving servers, monitoring, and reporting; and configuring a hardware processor to perform at least one of the acts of accessing, defining, propagating, or applying. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification