×

Automated security policy enforcement and auditing

  • US 9,071,644 B2
  • Filed: 12/06/2012
  • Issued: 06/30/2015
  • Est. Priority Date: 12/06/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of managing a connection to or from a device, the method comprising the steps of:

  • a computer identifying connections of the device;

    based on the connections, the computer determining and classifying the device based on security zones to which the device is or has been connected, a quality of service requirement for one or more applications within the device, or a level of information technology service management (ITSM) for the device;

    the computer determining that an existing or proposed connection is inconsistent with the classification of the device, and subsequently, the computer receiving a confirmation of the existing or proposed connection from a user, the confirmation permitting the existing or proposed connection to remain unchanged, without a modification of the existing or proposed connection and without a modification of a policy that specifies the classification of the device, even though the existing or proposed connection is inconsistent with the classification, and the computer displaying an indication or sending a notification that the existing or proposed connection is inconsistent with the classification of the device;

    the computer determining one or more other devices have one or more classifications that match the classification of the device;

    the computer determining respective one or more other existing or proposed connections of the one or more other devices are inconsistent with the one or more classifications;

    the computer receiving one or more other confirmations of the one or more other existing or proposed connections;

    the computer determining a count of the confirmation and the one or more other confirmations and determining the count is greater than a threshold number of confirmations;

    subsequent to the step of determining the count, the computer classifying another device based on security zones to which the other device is or has been connected, a quality of service requirement for one or more applications within the other device, or a level of ITSM for the other device;

    the computer determining another existing or proposed connection of the other device is inconsistent with the classification of the other device; and

    based on the count being greater than the threshold number of confirmations, the computer permitting another existing or proposed connection of the other device to remain unchanged, without requiring a confirmation of the other existing or proposed connection, without a modification of the other existing or proposed connection and without a modification of a policy that specifies the classification of the other device, even though the other existing or proposed connection is inconsistent with the classification.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×