IT infrastructure policy breach investigation interface
First Claim
1. A method of tracking network compliance at a policy compliance server in a network environment, the method comprising:
- discovering network entities in the network environment at the policy compliance server, wherein the network environment comprises a storage area network (SAN) and wherein the network entities comprise storage domain entities selected from a group consisting of storage arrays, hosts, switches, physical links, logical links, and interconnections therebetween, the discovery identifying configuration data applicable to rules of a network policy, the rules for specifying a desired state of a network entity, the state including relations and dependencies on other network entities in the network environment;
receiving notifications at the policy compliance server indicative of network events, the network events modifying a value defining a state of a network entity in the network environment; and
evaluating the received notifications against the rules in the policy to identify a breach of a policy, wherein the breach of the policy comprises a vulnerability indicative of a network environment state not yet deviating from a desired network environment state specified by a rule but having potential to result in a violation, wherein the violation is indicative of a network environment state deviating from a desired network environment state specified by a rule.
10 Assignments
0 Petitions
Accused Products
Abstract
In a large network, it can be difficult to pinpoint and track down the causes of breaches of established policies. A policy compliance server allows traversal of notifications according to breaches, organizes the breaches (vulnerabilities and violation) according to severity and recurrence, and identifies related rules, network entities and configuration changes, which may be related to the breach. An integrated graphical user interface (GUI) provides efficient, timely traversal and analysis of rule breaches across the network to allow quick, efficient identification of the underlying cause or condition of the rule breach. A discoverer gathers configuration data including notifications of changes, alerts, and conditions in the network that are pertinent to the rule breaches. A compliance engine evaluates the configuration data against the rules to identify breaches. Therefore, the compliance engine identifies breaches (rule violations and vulnerabilities) across the network to be addressed for compliance with the policies in effect in the network.
26 Citations
23 Claims
-
1. A method of tracking network compliance at a policy compliance server in a network environment, the method comprising:
-
discovering network entities in the network environment at the policy compliance server, wherein the network environment comprises a storage area network (SAN) and wherein the network entities comprise storage domain entities selected from a group consisting of storage arrays, hosts, switches, physical links, logical links, and interconnections therebetween, the discovery identifying configuration data applicable to rules of a network policy, the rules for specifying a desired state of a network entity, the state including relations and dependencies on other network entities in the network environment; receiving notifications at the policy compliance server indicative of network events, the network events modifying a value defining a state of a network entity in the network environment; and evaluating the received notifications against the rules in the policy to identify a breach of a policy, wherein the breach of the policy comprises a vulnerability indicative of a network environment state not yet deviating from a desired network environment state specified by a rule but having potential to result in a violation, wherein the violation is indicative of a network environment state deviating from a desired network environment state specified by a rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A network policy server in a network environment comprising:
-
a processor; and memory storing computer-executable code that when executed on the processor causes the network policy server to; discover network entities in the network environment, wherein the network environment comprises a storage area network (SAN) and wherein the network entities comprise storage domain entities selected from a group consisting of storage arrays, hosts, switches, physical links, logical links, and interconnections therebetween, the discovery identifying configuration data applicable to rules of a network policy, the rules for specifying a desired state of a network entity, the state including relations and dependencies on other network entities in the network environment, the discoverer further operable to receive notifications indicative of network events, the network events modifying a value defining a state of a network entity in the network environment; and evaluate the received notifications against the rules in the policy to identify a breach of a policy, wherein the breach of the policy comprises a vulnerability indicative of a network environment state not yet deviating from a desired network environment state specified by a rule but having potential to result in a violation, wherein the violation is indicative of a network environment state deviating from a desired network environment state specified by a rule. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A computer program product having a non-transitory computer readable storage medium operable to store computer program logic embodied in computer program code encoded as a set of processor based instructions thereon for tracking network policy compliance in a network environment comprising:
-
computer program code for discovering network entities in the network environment, wherein the network environment comprises a storage area network (SAN) and wherein the network entities comprise storage domain entities selected from a group consisting of storage arrays, hosts, switches, physical links, logical links, and interconnections therebetween, the discovery identifying configuration data applicable to rules of a network policy, the rules for specifying a desired state of a network entity, the state including relations and dependencies on other network entities in the network environment; computer program code for receiving notifications indicative of network events, the network events modifying a value defining a state of a network entity in the network environment; and computer program code for evaluating the received notifications against the rules in the policy to identify a breach of a policy, wherein the breach of the policy comprises a vulnerability indicative of a network environment state not yet deviating from a desired network environment state specified by a rule but having potential to result in a violation, wherein the violation is indicative of a network environment state deviating from a desired network environment state specified by a rule.
-
Specification