×

Security recommendation engine

  • US 9,386,033 B1
  • Filed: 09/10/2014
  • Issued: 07/05/2016
  • Est. Priority Date: 09/10/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for managing computing resources in a provider network, the method performed by a computing device comprising a processor and memory, the method comprising:

  • allowing, by the computing device, an authorized user to add or modify tagged metadata associated with a selected computing resource associated with a customer of the provider network;

    applying, by the computing device, a revision history, version control, and cryptographic binding scheme to the added or modified tagged metadata;

    receiving, by the computing device, a request for a security and compliance assessment of the selected computing resource based on a configuration for the selected computing resource;

    in response to receiving the request, analyzing, by the computing device, the selected computing resource and the added or modified tagged metadata based on security reference information;

    determining, by the computing device, a recommendation pertaining to security for the selected computing resource based at least in part on the analysis and one or more scoring criteria; and

    applying, by the computing device, the revision history, version control, and cryptographic binding scheme to the recommendation and providing the recommendation as the requested security assessment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×