Application-based security rights in cloud environments
First Claim
1. A method to improve a cloud computing environment by enabling enforcement of security service requirements for a cloud application, comprising:
- deploying a secure application zone for the cloud application, the secure application zone configuring a set of security resources in an automated manner in response to receipt of a specification of a security assurance level, the security assurance level specifying one or more general security requirements in a manner that does not expose at least some specific tooling requirements necessary to implement the security assurance level security requirement;
receiving from the cloud application one of;
a set of security service requirements specified by the cloud application, and a changed set of security service requirements specified by the cloud application;
evaluating the security service requirements received against one of;
the set of security resources configured in the secure application zone, and a changed set of security resources configured in the secure application zone; and
responsive to a determination that the set of security resources configured in the secure application zone do not meet the security service requirements specified by the cloud application, receiving from the cloud application a request to take a given action that provides an assurance that the security service requirements specified by the cloud application are satisfied, wherein the given action is a remediation action that attempts to meet the security service requirements specified by the cloud application, the remediation action being one of;
requesting upgrade or reconfiguration of the set of security resources configured in the secure application zone, requesting transfer of the cloud application to another specific cloud security environment, and requesting transfer of the cloud application to another cloud platform.
2 Assignments
0 Petitions
Accused Products
Abstract
This disclosure provides the ability for a cloud application to specify its security requirements, the ability to have those requirements evaluated, e.g., against a specific cloud deployment environment, and the ability to enable the application to control a cloud-based security assurance service to provision additional security technology in the cloud to support deployment (or re-deployment elsewhere) of the application if the environment does not have the necessary topology and security resources deployed. To this end, the application queries the service by passing a set of application-based security rights. If the security capabilities provided by the security assurance service are sufficient or better than the application'"'"'s security rights, the application functions normally. If, however, the security environment established by the security assurance service is insufficient for the application, the application is afforded one or more remediation options, e.g., issuing a request to upgrade the security environment, or the like.
52 Citations
15 Claims
-
1. A method to improve a cloud computing environment by enabling enforcement of security service requirements for a cloud application, comprising:
-
deploying a secure application zone for the cloud application, the secure application zone configuring a set of security resources in an automated manner in response to receipt of a specification of a security assurance level, the security assurance level specifying one or more general security requirements in a manner that does not expose at least some specific tooling requirements necessary to implement the security assurance level security requirement; receiving from the cloud application one of;
a set of security service requirements specified by the cloud application, and a changed set of security service requirements specified by the cloud application;evaluating the security service requirements received against one of;
the set of security resources configured in the secure application zone, and a changed set of security resources configured in the secure application zone; andresponsive to a determination that the set of security resources configured in the secure application zone do not meet the security service requirements specified by the cloud application, receiving from the cloud application a request to take a given action that provides an assurance that the security service requirements specified by the cloud application are satisfied, wherein the given action is a remediation action that attempts to meet the security service requirements specified by the cloud application, the remediation action being one of;
requesting upgrade or reconfiguration of the set of security resources configured in the secure application zone, requesting transfer of the cloud application to another specific cloud security environment, and requesting transfer of the cloud application to another cloud platform. - View Dependent Claims (2, 3, 4, 5)
-
-
6. Apparatus, comprising:
-
a processor; computer memory holding computer program instructions executed by the processor to improve a cloud computing environment by enabling enforcement of security service requirements for a cloud application, the computer program instructions comprising program code operative to; deploy a secure application zone for the cloud application, the secure application zone configuring a set of security resources in an automated manner in response to receipt of a specification of a security assurance level, the security assurance level specifying one or more general security requirements in a manner that does not expose at least some specific tooling requirements necessary to implement the security assurance level security requirement; receive from the cloud application one of;
a set of security service requirements specified by the cloud application, and a changed set of security service requirements specified by the cloud application;evaluate the security service requirements received against one of;
the set of security resources configured in the secure application zone, and a changed set of security resources configured in the secure application zone; andresponsive to a determination that the set of security resources configured in the secure application zone do not meet the security service requirements specified by the cloud application, receiving from the cloud application a request to take a given action that provides an assurance that the security service requirements specified by the cloud application are satisfied, wherein the given action is a remediation action that attempts to meet the security service requirements specified by the cloud application, the remediation action being one of;
requesting upgrade or reconfiguration of the set of security resources configured in the secure application zone, requesting transfer of the cloud application to another specific cloud security environment, and requesting transfer of the cloud application to another cloud platform. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product in a non-transitory computer readable medium for use in a data processing system, the computer program product holding computer program instructions executed by the data processing system to improve a cloud computing environment by enabling enforcement of security service requirements for a cloud application, the computer program instructions comprising program code operative to:
-
deploy a secure application zone for the cloud application, the secure application zone configuring a set of security resources in an automated manner in response to receipt of a specification of a security assurance level, the security assurance level specifying one or more general security requirements in a manner that does not expose at least some specific tooling requirements necessary to implement the security assurance level security requirement; receive from the cloud application one of;
a set of security service requirements specified by the cloud application, and a changed set of security service requirements specified by the cloud application;evaluate the security service requirements received against one of;
the set of security resources configured in the secure application zone, and a changed set of security resources configured in the secure application zone; andresponsive to a determination that the set of security resources configured in the secure application zone do not meet the security service requirements specified by the cloud application, receiving from the cloud application a request to take a given action that provides an assurance that the security service requirements specified by the cloud application are satisfied, wherein the given action is a remediation action that attempts to meet the security service requirements specified by the cloud application, the remediation action being one of;
requesting upgrade or reconfiguration of the set of security resources configured in the secure application zone, requesting transfer of the cloud application to another specific cloud security environment, and requesting transfer of the cloud application to another cloud platform. - View Dependent Claims (12, 13, 14, 15)
-
Specification