×

Techniques for cloud security monitoring and threat intelligence

  • US 9,692,789 B2
  • Filed: 10/24/2014
  • Issued: 06/27/2017
  • Est. Priority Date: 12/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A cloud security system for monitoring and controlling security of accounts for cloud applications, the cloud security system comprising:

  • memory storing;

    an analytics application;

    a seeder application; and

    an analytics repository database; and

    a processor;

    wherein the processor is configured by the analytics application to;

    generate a threat model using at least a first portion of stored activity data in the analytics repository database, wherein the stored activity data is associated with a tenant account of a service provider system, and wherein the threat model correlates one or more activities for a plurality of cloud applications based on profile information of a user, the user being associated with the tenant account for each of the plurality of cloud applications; and

    identify, based on the threat model, a threat using a second portion of the stored activity data in the analytics repository database; and

    wherein the processor is further configured by the seeder application to;

    select a security policy to implement in response to the identified threat;

    identify one or more cloud security controls in at least one remotely hosted cloud application server system of the service provider system to modify in accordance with the selected security policy, wherein the one or more cloud security controls configure access to a cloud application provided by the service provider system to the tenant account;

    establish a secure connection to the at least one remotely hosted cloud application server system using login credentials associated with the tenant account for accessing the cloud application; and

    send one or more instructions to the at least one remotely hosted cloud application server system, the one or more instructions causing the at least one remotely hosted cloud application server system to set the identified one or more cloud security controls with respect to the tenant account in accordance with the selected security policy, wherein the access to the cloud application by the tenant account is modified based on the identified one or more cloud security controls that are set in accordance with the selected security policy.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×