Method of assuring enterprise security standards compliance
First Claim
1. A method for determining a security posture of an enterprise, comprising:
- responsive to an occurrence of an event in an enterprise environment, populating a first database with critical operations and mapping data;
populating a second database with historical data associated with the critical operations;
populating a third database with access control data associated with the critical operations;
generating a security compliance view of the enterprise based on a comparison of data in the first database, second database, and third database against similar security data elements from company or external policies; and
generating a security posture view by comparing the security compliance view against threat data in a fourth database.
5 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer instructions for providing a current and complete security compliance view of an enterprise system. The present invention provides the ability to gain a real-time security posture and security compliance view of an enterprise and to assess the risk impact of known threats and attacks to continued business operations at various levels is provided. Responsive to a change to an enterprise environment, a request, or an external threat, an administrator loads or updates at least one of a Critical Application Operations database, a Historical database, an Access Control database, a Connectivity database, and a Threat database. Based on a comparison of information in the databases against similar security data elements from company or external policies, the administrator may generate a Security Compliance view of the enterprise. A Security Posture view may also be generated by comparing the Security Compliance view against data in the Threat database.
142 Citations
27 Claims
-
1. A method for determining a security posture of an enterprise, comprising:
-
responsive to an occurrence of an event in an enterprise environment, populating a first database with critical operations and mapping data;
populating a second database with historical data associated with the critical operations;
populating a third database with access control data associated with the critical operations;
generating a security compliance view of the enterprise based on a comparison of data in the first database, second database, and third database against similar security data elements from company or external policies; and
generating a security posture view by comparing the security compliance view against threat data in a fourth database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A data processing system for determining a security posture of an enterprise, comprising:
-
first populating means for populating a first database with critical operations and mapping data in response to an occurrence of an event in an enterprise environment;
second populating means for populating a second database with historical data associated with the critical operations;
third populating means for populating a third database with access control data associated with the critical operations;
first generating means for generating a security compliance view of the enterprise based on a comparison of data in the first database, second database, and third database against similar security data elements from company or external policies; and
second generating means for generating a security posture view by comparing the security compliance view against threat data in a fourth database. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product in a computer readable medium for determining a security posture of an enterprise, comprising:
-
first instructions for populating a first database with critical operations and mapping data in response to an occurrence of an event in an enterprise environment;
second instructions for populating a second database with historical data associated with the critical operations;
third instructions for populating a third database with access control data associated with the critical operations;
fourth instructions for generating a security compliance view of the enterprise based on a comparison of data in the first database, second database, and third database against similar security data elements from company or external policies; and
fifth instructions for generating a security posture view by comparing the security compliance view against threat data in a fourth database. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification