Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
First Claim
1. A system for ensuring an application conforms with security and regulatory controls prior to deployment comprising:
- at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for ensuring an application conforms with security and regulatory controls prior to deployment, the process for ensuring an application conforms with security and regulatory controls prior to deployment including;
defining one or more virtual asset security policies to be applied to the creation and instantiation of virtual assets to be used in a cloud computing environment;
generating virtual asset security compliance data representing instructions for ensuring compliance with the one or more virtual asset security policies;
applying the generated virtual asset security data to a virtual asset template configured to determine one or more operational parameters of a virtual asset during instantiation of that virtual asset;
instantiating, using the generated virtual asset security data of the virtual asset template, at least one virtual asset complying with the virtual asset security policies;
defining one or more application deployment security policies associated with the deployment and operational coupling and interconnectivity of virtual assets used to implement an application in the cloud computing environment, the application deployment security policies including at least an application deployment security policy requiring that all virtual assets used to implement an application are deployed within a network container that isolates them from other applications;
generating application deployment security compliance data representing instructions for ensuring compliance with the one or more application deployment security policies, the generated application deployment security compliance data representing codified machine readable instructions and data for scanning and otherwise ensuring implementation of the application deployment security policies;
providing the generated application deployment security compliance data to the virtual asset; and
implementing and deploying, using at least one virtual asset including the virtual asset, an application that complies with the one or more application deployment security policies.
1 Assignment
0 Petitions
Accused Products
Abstract
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
168 Citations
18 Claims
-
1. A system for ensuring an application conforms with security and regulatory controls prior to deployment comprising:
-
at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for ensuring an application conforms with security and regulatory controls prior to deployment, the process for ensuring an application conforms with security and regulatory controls prior to deployment including; defining one or more virtual asset security policies to be applied to the creation and instantiation of virtual assets to be used in a cloud computing environment; generating virtual asset security compliance data representing instructions for ensuring compliance with the one or more virtual asset security policies; applying the generated virtual asset security data to a virtual asset template configured to determine one or more operational parameters of a virtual asset during instantiation of that virtual asset; instantiating, using the generated virtual asset security data of the virtual asset template, at least one virtual asset complying with the virtual asset security policies; defining one or more application deployment security policies associated with the deployment and operational coupling and interconnectivity of virtual assets used to implement an application in the cloud computing environment, the application deployment security policies including at least an application deployment security policy requiring that all virtual assets used to implement an application are deployed within a network container that isolates them from other applications; generating application deployment security compliance data representing instructions for ensuring compliance with the one or more application deployment security policies, the generated application deployment security compliance data representing codified machine readable instructions and data for scanning and otherwise ensuring implementation of the application deployment security policies; providing the generated application deployment security compliance data to the virtual asset; and implementing and deploying, using at least one virtual asset including the virtual asset, an application that complies with the one or more application deployment security policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for ensuring an application conforms with security and regulatory controls prior to deployment comprising:
-
an application; a cloud computing environment in which at least part of the application is deployed; a data store including virtual asset security compliance data representing instructions for implementing one or more virtual asset security policies and/or ensuring compliance with the one or more virtual asset security policies; a data store including application deployment security compliance data representing codified machine readable instructions for scanning and otherwise ensuring implementation one or more application deployment security policies and/or ensuring compliance with the one or more application deployment security policies, the application deployment security policies including at least an application deployment security policy requiring that all virtual assets used to implement an application are deployed within a network container that isolates them from other applications; at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for ensuring an application conforms with security and regulatory controls prior to deployment, the process for ensuring an application conforms with security and regulatory controls prior to deployment including; applying the generated virtual asset security data to a virtual asset template configured to determine one or more operational parameters of a virtual asset during instantiation of that virtual asset; instantiating, using the generated virtual asset security data of the virtual asset template, at least one virtual asset complying with the virtual asset security policies; providing the generated application deployment security compliance data to the virtual asset; and implementing and deploying, using at least one virtual asset including the instantiated virtual asset, an application that complies with the one or more application deployment security policies. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification