Individualized audit log access control for virtual machines
First Claim
1. A method of controlling access to audit logging resources by an instantiated virtual machine from among a plurality of instantiated virtual machines in a virtual computing environment, the method comprising:
- the instantiated virtual machine receiving a user token;
the instantiated virtual machine sending a request for individualized audit credentials from an authorization system, wherein the request is based on the user token and an identity, wherein the identity identifies the instantiated virtual machine; and
the instantiated virtual machine receiving the individualized audit credentials from the authorization system based at least on the user token and the identity, the individualized audit credentials enabling authorized storage of first audit data in an audit system, wherein the first audit data pertains to the instantiated virtual machine, and the authorized storage is authorized by the audit system;
the instantiated virtual machine actively operating, with the individualized audit credentials, through a first time period;
wherein when the instantiated virtual machine experiences, after the first time period, an event selected from failing verification based on the identity or having the individualized audit credentials revoked, the event is effective to cause de-authorization of the instantiated virtual machine and reporting of information regarding the de-authorized instantiated virtual machine to the audit system, and wherein the de-authorization of the instantiated virtual machine comprises determining when the instantiated virtual machine has been de-instantiated, and responsively allowing for de-authorization of the individualized audit credentials of the de-authorized de-instantiated instantiated virtual machine.
2 Assignments
0 Petitions
Accused Products
Abstract
To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system is provided. The method includes receiving requests for audit credentials from virtual machines, and responsively providing individualized audit credentials to the virtual machines based at least on identities of the virtual machines. The method also includes, in the audit system, authorizing storage of audit data transferred by the virtual machines based at least on the individualized audit credentials accompanying the audit data. The method also includes, in the authorization system, selectively de-authorizing one or more of the virtual machines and reporting information regarding the de-authorized one or more of the virtual machines to the one or more audit systems.
-
Citations
22 Claims
-
1. A method of controlling access to audit logging resources by an instantiated virtual machine from among a plurality of instantiated virtual machines in a virtual computing environment, the method comprising:
-
the instantiated virtual machine receiving a user token; the instantiated virtual machine sending a request for individualized audit credentials from an authorization system, wherein the request is based on the user token and an identity, wherein the identity identifies the instantiated virtual machine; and the instantiated virtual machine receiving the individualized audit credentials from the authorization system based at least on the user token and the identity, the individualized audit credentials enabling authorized storage of first audit data in an audit system, wherein the first audit data pertains to the instantiated virtual machine, and the authorized storage is authorized by the audit system; the instantiated virtual machine actively operating, with the individualized audit credentials, through a first time period; wherein when the instantiated virtual machine experiences, after the first time period, an event selected from failing verification based on the identity or having the individualized audit credentials revoked, the event is effective to cause de-authorization of the instantiated virtual machine and reporting of information regarding the de-authorized instantiated virtual machine to the audit system, and wherein the de-authorization of the instantiated virtual machine comprises determining when the instantiated virtual machine has been de-instantiated, and responsively allowing for de-authorization of the individualized audit credentials of the de-authorized de-instantiated instantiated virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing system configured to control access to audit logging resources by virtual machines, the computing system comprising software instructions stored on at least one non-transitory computer-readable storage medium, wherein the software instructions are configured, when executed by one or more processors, to enable the computing system to:
-
receive a request from an instantiated virtual machine from among a plurality of instantiated virtual machines for audit credentials, wherein the request is based on at least a user token and an identity from the instantiated virtual machine; provide, in response to the request, individualized audit credentials to the instantiated virtual machine based at least on the user token and the identity; authorize storage of audit data transferred by the instantiated virtual machine over a first period of time based at least on the individualized audit credentials; and de-authorize the instantiated virtual machine, after the first period of time, and report information regarding de-authorization of the instantiated virtual machine, responsive to at least one of the following; failed verification of the instantiated virtual machine based on the identity, or revocation of the individualized audit credentials; and wherein the de-authorization of the instantiated virtual machine comprises determining when the instantiated virtual machine has been de-instantiated, and responsively allowing for de-authorization of the individualized audit credentials of the de-authorized de-instantiated instantiated virtual machine. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for controlling access to audit logging resources by a plurality of virtual machines, the method comprising:
-
receiving a request from an instantiated virtual machine for audit credentials, wherein the request is based on at least a user token and an identity received from the instantiated virtual machine; providing, in response to the request, individualized audit credentials to the instantiated virtual machine based at least on the user token and the identity; authorizing storage of audit data, in an audit system, transferred by the instantiated virtual machine based at least on the individualized audit credentials; and de-authorizing the instantiated virtual machine and reporting information regarding de-authorization of the instantiated virtual machine, responsive to at least one of the following; failed verification of the instantiated virtual machine based on the identity, or revocation of the individualized audit credentials; and wherein the de-authorization of the instantiated virtual machine comprises determining when the instantiated virtual machine has been de-instantiated, and responsively allowing for de-authorization of the individualized audit credentials of the de-authorized de-instantiated instantiated virtual machine. - View Dependent Claims (19, 20, 21, 22)
-
Specification