Method and system for improving security and reliability in a networked application environment
First Claim
1. A computer-implemented method for managing a distributed computing architecture, the method comprising:
- discovering, via a processor, a first security certificate stored within at least one memory element included in the distributed computing architecture that includes a first identifying label and an expiration date by accessing one or more network addresses that are associated with an elastic load balancing system configured to distribute network traffic related to a software application across multiple instances of the software application;
comparing the first security certificate with a plurality of security certificates that resides within a storage repository;
determining that the first security certificate corresponds to a second security certificate that resides within the storage repository;
deleting the second security certificate from the storage repository; and
storing the first security certificate within the storage repository.
1 Assignment
0 Petitions
Accused Products
Abstract
A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database. The security application scans a distributed computing architecture for the existence of security certificates, places newly discovered security certificates in a database, and deletes outdated security certificates. Advantageously, security and reliability are improved in a distributed computing architecture.
-
Citations
8 Claims
-
1. A computer-implemented method for managing a distributed computing architecture, the method comprising:
-
discovering, via a processor, a first security certificate stored within at least one memory element included in the distributed computing architecture that includes a first identifying label and an expiration date by accessing one or more network addresses that are associated with an elastic load balancing system configured to distribute network traffic related to a software application across multiple instances of the software application; comparing the first security certificate with a plurality of security certificates that resides within a storage repository; determining that the first security certificate corresponds to a second security certificate that resides within the storage repository; deleting the second security certificate from the storage repository; and storing the first security certificate within the storage repository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification