×

Security countermeasure management platform

  • US 8,800,045 B2
  • Filed: 02/11/2012
  • Issued: 08/05/2014
  • Est. Priority Date: 02/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. Apparatus for use in association with a computing environment, comprising:

  • a hardware processor;

    computer memory holding computer program instructions executed by the processor to perform the following operations;

    receiving information security risk data from one or more sources in each of two or more distinct risk categories, each risk category associated with a distinct type, the information security risk data from at least a source in a first risk category being distinct from and uncorrelated to the information security risk data from a source in a second risk category;

    augmenting the received information security risk data from each source in each of two or more distinct risk categories with other data to generate an aggregate risk entity, the other data being one of;

    information security standards data, and risk impact attribute data;

    processing the aggregate risk entity against a vulnerability-to-countermeasure knowledge base that includes countermeasure attribute data to discover, with respect to the aggregate risk entity, a set of countermeasures applicable to potentially address a security exposure as represented in the aggregate risk entity, the countermeasure attribute data including a current configuration of at least one countermeasure; and

    with respect to a particular security exposure represented in the aggregate risk entity, presenting information regarding the countermeasures that have been discovered, the information identifying (i) an expected cost of implementing the countermeasure, wherein the expected cost of implementing the countermeasure is based at least in part on a time spent to identify a security exposure and enact a configuration change, (ii) an expected effectiveness of implementing the countermeasure, (iii) an indication of whether the countermeasure is available in the computing environment, and (iv) a recommended change to at least one current configuration of at least one of the set of countermeasures, the information being further available for presentation as an ordered listing to enable definition of a layered, multi-countermeasure response to the security exposure.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×