Method and system for secure delivery of information to computing environments
First Claim
1. A computing system implemented method for protecting and repairing a current virtual asset from damage by potential security threats, comprising:
- monitoring the current virtual asset for the potential security threats with a virtual asset agent running within the current virtual asset to identify the potential security threats that risk compromising virtual asset data to unauthorized computing systems;
determining a severity of the potential security threats that are identified by the virtual asset agent for having gained access into the current virtual asset, the determined severity being at least partly based on a content of the virtual asset data;
responsive to determining that the determined severity is greater than a predetermined threshold, replacing the current virtual asset with a newly created virtual asset, the newly created virtual asset executing a new virtual asset agent with substantially similar functionality to the current virtual asset agent, decommissioning the current virtual asset, and receiving, with the new virtual asset, secrets that are associated with the current virtual asset; and
responsive to determining that the determined severity is less than the predetermined threshold, requesting and installing a software update from an asset management computing system.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
301 Citations
32 Claims
-
1. A computing system implemented method for protecting and repairing a current virtual asset from damage by potential security threats, comprising:
-
monitoring the current virtual asset for the potential security threats with a virtual asset agent running within the current virtual asset to identify the potential security threats that risk compromising virtual asset data to unauthorized computing systems; determining a severity of the potential security threats that are identified by the virtual asset agent for having gained access into the current virtual asset, the determined severity being at least partly based on a content of the virtual asset data; responsive to determining that the determined severity is greater than a predetermined threshold, replacing the current virtual asset with a newly created virtual asset, the newly created virtual asset executing a new virtual asset agent with substantially similar functionality to the current virtual asset agent, decommissioning the current virtual asset, and receiving, with the new virtual asset, secrets that are associated with the current virtual asset; and responsive to determining that the determined severity is less than the predetermined threshold, requesting and installing a software update from an asset management computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing system implemented method for protecting and repairing a first virtual asset from damage by potential security threats, comprising:
-
a virtual asset agent executing within the first virtual asset and configured to monitor the first virtual asset for the potential security threats and repair the first virtual asset from any damage suffered by the virtual asset from any of the potential security threats; monitoring the first virtual asset, with an asset management computing system external to the first virtual asset, to determine whether the first virtual asset includes security updates for the potential security threats; upon determining that the first virtual asset does not include one or more security updates for the potential security threats, updating the first virtual asset by transmitting the one or more of the security updates to the first virtual asset over a first communication channel from the asset management computing system, and installing the one or more transmitted updates within the first virtual asset, the first communication channel being different than a second communication channel that is used by the asset management computing system to transmit and receive information over an external network; receiving notification from the virtual asset agent that the virtual asset agent created a second virtual asset in response to the virtual asset agent detecting intrusion by one or more of the potential security threats into the first virtual asset; and transmitting secrets associated with the first virtual asset to the second virtual asset using the first communication channel to enable to second virtual asset to continue operations of the first virtual asset. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for protecting and repairing a current virtual asset from damage by potential security threats, the system comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which, when executed by the at least one processors, perform; monitoring the current virtual asset for the potential security threats with a current virtual asset agent running within the current virtual asset to identify the potential security threats that risk compromising virtual asset data to unauthorized computing systems; determining a severity of the potential security threats that are identified by the current virtual asset agent for having gained access into the current virtual asset, the determined severity being at least partly based on a content of the virtual asset data; responsive to determining that the determined severity is greater than a predetermined threshold, replacing the current virtual asset with a newly created virtual asset, the newly created virtual asset executing a new virtual asset agent with substantially similar functionality to the current virtual asset agent, decommissioning the current virtual asset, and receiving, with the new virtual asset, secrets that are associated with the current virtual asset; and responsive to determining that the determined severity is less than the predetermined threshold, requesting and installing a software update from an asset management computing system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for protecting and repairing a first virtual asset from damage by potential security threats, comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by the at least one processors, perform; monitoring the first virtual asset, with an asset management computing system external to the virtual asset, to determine whether the first virtual asset includes security updates for the potential security threats, wherein the first virtual asset includes a virtual asset agent configured to monitor the first virtual asset for the potential security threats and repair the first virtual asset from the damage by the potential security threats; upon determining that the first virtual asset does not include one or more security updates for the potential security threats, updating the first virtual asset by transmitting the one or more of the security updates to the first virtual asset over a first communication channel from the asset management computing system, and installing the one or more transmitted updates within the first virtual asset, the first communication channel being different than a second communication channel that is used by the asset management computing system to transmit and receive information over an external network; receiving notification from the virtual asset agent that the virtual asset agent created a second virtual asset in response to the virtual asset agent detecting intrusion by one or more of the potential security threats into the first virtual asset; and transmitting secrets associated with the first virtual asset to the second virtual asset using the first communication channel to enable to second virtual asset to continue operations of the first virtual asset. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
Specification