Managing workflows upon a security incident
First Claim
1. A method of managing service level agreements (SLAs) for security incidents in a computing environment, the method comprising:
- identifying a rule set for a security incident of the security incidents based on enrichment information obtained for the security incident, wherein the rule set is associated with one or more action recommendations to be taken against the security incident;
identifying a default SLA for the security incident based on the rule set, wherein the default SLA comprises a default hierarchy of administrators for the security incident and a default set of one or more time periods for administrator security actions;
obtaining environmental characteristics related to the security incident, wherein the environmental characteristics comprise at least a criticality rating of an asset associated with the security incident;
determining a modified SLA for the security incident based on the environmental characteristics, wherein the modified SLA comprises a second hierarchy of administrators for the security incident and a second set of one or more time periods for administrator security actions;
providing the one or more security actions to administrators based on the modified SLA; and
obtaining input from at least one administrator, wherein the input comprises;
an action selection of the one or more security actions;
orfeedback regarding the one or more action recommendations, wherein the feedback comprises modifying the one or more action recommendations, removing an action recommendation from the one or more action recommendations, or deferring action selection to another administrator.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one example, an advisement system identifies a rule set for a security incident based on enrichment information obtained for the security incident, wherein the rule set is associated with action recommendations to be taken against the incident. The advisement system further identifies a default SLA for the security incident based on the rule set, and obtains environmental characteristics related to the security incident. Based on the environmental characteristics, the advisement system determines a modified SLA for the security incident.
-
Citations
15 Claims
-
1. A method of managing service level agreements (SLAs) for security incidents in a computing environment, the method comprising:
-
identifying a rule set for a security incident of the security incidents based on enrichment information obtained for the security incident, wherein the rule set is associated with one or more action recommendations to be taken against the security incident; identifying a default SLA for the security incident based on the rule set, wherein the default SLA comprises a default hierarchy of administrators for the security incident and a default set of one or more time periods for administrator security actions; obtaining environmental characteristics related to the security incident, wherein the environmental characteristics comprise at least a criticality rating of an asset associated with the security incident; determining a modified SLA for the security incident based on the environmental characteristics, wherein the modified SLA comprises a second hierarchy of administrators for the security incident and a second set of one or more time periods for administrator security actions; providing the one or more security actions to administrators based on the modified SLA; and obtaining input from at least one administrator, wherein the input comprises; an action selection of the one or more security actions;
orfeedback regarding the one or more action recommendations, wherein the feedback comprises modifying the one or more action recommendations, removing an action recommendation from the one or more action recommendations, or deferring action selection to another administrator. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus to manage service level agreements (SLAs) for security incidents in a computing environment, the apparatus comprising:
-
one or more non-transitory computer readable media; and processing instructions stored on the one or more computer readable media that, when executed by a processing system, direct the processing system to; identify a rule set for a security incident of the security incidents based on enrichment information obtained for the security incident, wherein the rule set is associated with one or more action recommendations to be taken against the security incident; identify a default SLA for the security incident based on the rule set, wherein the default SLA comprises a default hierarchy of administrators for the security incident and a default set of one or more time periods for administrator security actions; obtain environmental characteristics related to the security incident, wherein the environmental characteristics comprise at least a criticality rating of an asset associated with the security incident; determine a modified SLA for the security incident based on the environmental characteristics, wherein the modified SLA comprises a second hierarchy of administrators for the security incident and a second set of one or more time periods for administrator security actions; provide the one or more security actions to administrators based on the modified SLA; and obtain input from at least one administrator, wherein the input comprises; an action selection of the one or more security actions;
orfeedback regarding the one or more action recommendations, wherein the feedback comprises modifying the one or more action recommendations, removing an action recommendation from the one or more action recommendations, or deferring action selection to another administrator. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An advisement system to manage service level agreements (SLAs) for security incidents in a computing environment with a plurality of assets, the advisement system comprising:
-
one or more non-transitory computer readable media; a processing system operatively coupled to the one or more non-transitory computer readable media; and processing instructions stored on the one or more computer readable media that, when executed by a processing system, direct the processing system to; identify a rule set for a security incident of the security incidents based on enrichment information obtained for the security incident, wherein the rule set is associated with one or more action recommendations to be taken against the security incident; identify a default SLA for the security incident based on the rule set, wherein the default SLA comprises a default hierarchy of administrators for the security incident and a default set of one or more time periods for administrator security actions; obtain environmental characteristics related to the security incident, wherein the environmental characteristics comprise at least a criticality rating of an asset associated with the security incident; determine a modified SLA for the security incident based on the environmental characteristics, wherein the modified SLA comprises a second hierarchy of administrators for the security incident and a second set of one or more time periods for administrator security actions; provide the one or more security actions to administrators based on the modified SLA; and obtain input from at least one administrator, wherein the input comprises; an action selection of the one or more security actions;
orfeedback regarding the one or more action recommendations, wherein the feedback comprises modifying the one or more action recommendations, removing an action recommendation from the one or more action recommendations, or deferring action selection to another administrator. - View Dependent Claims (12, 13, 14, 15)
-
Specification