×

System for supervising the security of an architecture

  • US 9,380,075 B2
  • Filed: 03/26/2013
  • Issued: 06/28/2016
  • Est. Priority Date: 03/29/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for supervising security of an architecture, the method comprising:

  • reception of a security event by a first security controller of a first cloud, said first cloud belonging to a plurality of interconnected clouds of the architecture, wherein each cloud of the plurality comprises a plurality of resources and a security supervisor, the plurality of resources forming a plurality of resource groups in the cloud that are respectively associated with a security domain, wherein each security domain comprises a security controller that supervises the resources of the security domain, and a plurality of physical machines comprise resources of the plurality of interconnected clouds, wherein the respective security supervisors of the interconnected clouds comprise a set of security rules forming a security policy, and wherein said security event originates from a first of the resources associated with a first of the security domains,sending said security event to the security supervisor of the first cloud,sending a security order by the security supervisor of the first cloud to at least a second security controller of the first cloud in reaction to the security event, and sending the security order by the second security controller to a second resource supervised by the second security controller,sending, by the security supervisor of the first cloud, information relating to the security event to the other security supervisors of the other interconnected clouds of the plurality of interconnected cloudsnegotiation of a second security order between the security supervisor of the first cloud and the other security supervisors, the negotiation being based on information relating to the security event and on the respective security policies of the other security supervisors, andsending by one of the other security supervisors of the second security order to at least a third resource, the third resource being included in a cloud of the plurality of interconnected clouds, different from the first cloud.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×