Providing context-based visibility of cloud resources in a multi-tenant environment
First Claim
1. An apparatus, comprising:
- one or more processors in a multi-tenant cloud computing infrastructure;
computer memory holding computer program instructions executed by the one or more processors to perform resource security and compliance monitoring in the cloud computing infrastructure, the cloud computing infrastructure comprising a set of network-accessible computing machines and software executed by the one or more processors, the computer program instructions performing following operations;
for a given tenant, deriving a security context from cloud resource meta-data and user-specific input data, the user-specific input data being security requirements for the given tenant in the cloud computing infrastructure;
encapsulating the cloud resource meta-data and the user-specific input data into a data structure;
processing the data structure into a data string that securely and uniquely represents the security context for the given tenant;
propagating the data string for the given tenant into machine-based logs generated by one or more cloud resource automation services that monitor the cloud computing infrastructure;
associating the data string to activities associated with one or more secure resources as the activities are monitored by the one or more cloud resource automation services to provide context-based visibility for the resource security and compliance monitoring in the cloud computing infrastructure by the one or more cloud resource automation services; and
responsive to a request associated with the resource security and compliance monitoring, correlating information from the machine-based logs and that includes the data string to generate a security context-specific response, the security context-specific response associated with a tenant-specific compliance view.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant'"'"'s security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.
29 Citations
14 Claims
-
1. An apparatus, comprising:
-
one or more processors in a multi-tenant cloud computing infrastructure; computer memory holding computer program instructions executed by the one or more processors to perform resource security and compliance monitoring in the cloud computing infrastructure, the cloud computing infrastructure comprising a set of network-accessible computing machines and software executed by the one or more processors, the computer program instructions performing following operations; for a given tenant, deriving a security context from cloud resource meta-data and user-specific input data, the user-specific input data being security requirements for the given tenant in the cloud computing infrastructure; encapsulating the cloud resource meta-data and the user-specific input data into a data structure; processing the data structure into a data string that securely and uniquely represents the security context for the given tenant; propagating the data string for the given tenant into machine-based logs generated by one or more cloud resource automation services that monitor the cloud computing infrastructure; associating the data string to activities associated with one or more secure resources as the activities are monitored by the one or more cloud resource automation services to provide context-based visibility for the resource security and compliance monitoring in the cloud computing infrastructure by the one or more cloud resource automation services; and responsive to a request associated with the resource security and compliance monitoring, correlating information from the machine-based logs and that includes the data string to generate a security context-specific response, the security context-specific response associated with a tenant-specific compliance view. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product in a non-transitory computer readable medium for use in a data processing system to perform resource security and compliance monitoring in a multi-tenant cloud computing infrastructure, the cloud computing infrastructure comprising a set of network-accessible computing machines and software executed by one or more processors in the cloud computing infrastructure, the computer program product holding computer program instructions which, when executed by the one or more processors in the cloud computing infrastructure, perform operations comprising:
-
for a given tenant, deriving a security context from cloud resource meta-data and user-specific input data, the user-specific input data being security requirements for the given tenant in the cloud computing infrastructure; encapsulating the cloud resource meta-data and the user-specific input data into a data structure; processing the data structure into a data string that securely and uniquely represents the security context for the given tenant; propagating the data string for the given tenant into machine-based logs generated by one or more cloud resource automation services that monitor the cloud computing infrastructure; associating the data string to activities associated with one or more secure resources as the activities are monitored by the one or more cloud resource automation services to provide context-based visibility for the resource security and compliance monitoring in the cloud computing infrastructure by the one or more cloud resource automation services; and responsive to a request associated with the resource security and compliance monitoring, correlating information from the machine-based logs and that includes the data string to generate a security context-specific response, the security context-specific response associated with a tenant-specific compliance view. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification