×

Method and system for ensuring an application conforms with security and regulatory controls prior to deployment

  • US 9,374,389 B2
  • Filed: 04/25/2014
  • Issued: 06/21/2016
  • Est. Priority Date: 04/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for ensuring an application conforms with security and regulatory controls prior to deployment comprising:

  • at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for ensuring an application conforms with security and regulatory controls prior to deployment, the process for ensuring an application conforms with security and regulatory controls prior to deployment including;

    defining one or more virtual asset security policies to be applied to the creation and instantiation of virtual assets to be used in a cloud computing environment;

    generating virtual asset security compliance data representing instructions for ensuring compliance with the one or more virtual asset security policies;

    applying the generated virtual asset security data to a virtual asset template configured to determine one or more operational parameters of a virtual asset during instantiation of that virtual asset;

    instantiating, using the generated virtual asset security data of the virtual asset template, at least one virtual asset complying with the virtual asset security policies;

    defining one or more application deployment security policies associated with the deployment and operational coupling and interconnectivity of virtual assets used to implement an application in the cloud computing environment, the application deployment security policies including at least an application deployment security policy requiring that all virtual assets used to implement an application are deployed within a network container that isolates them from other applications;

    generating application deployment security compliance data representing instructions for ensuring compliance with the one or more application deployment security policies, the generated application deployment security compliance data representing codified machine readable instructions and data for scanning and otherwise ensuring implementation of the application deployment security policies;

    providing the generated application deployment security compliance data to the virtual asset; and

    implementing and deploying, using at least one virtual asset including the virtual asset, an application that complies with the one or more application deployment security policies.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×