METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENT
First Claim
Patent Images
1. A method comprising:
- identifying a request to place a workload in a hypervisor-based host;
identifying a security level of the workload;
identifying a security level of a storage device associated with the hypervisor-based host;
granting the request to place the workload in the hypervisor-based host if the security level of the workload corresponds to the security level of the storage device; and
denying the request to place the workload in the hypervisor-based host if the security level of the workload does not correspond to the security level of the storage device.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer system identifies a request to place a workload in a hypervisor-based host. The computer system identifies a security level of the workload. The computer system identifies a security level of a storage device associated with the hypervisor-based host. If the security level of the workload corresponds to the security level of the storage device, the computer system grants the request to place the workload in the hypervisor-based host. If the security level of the workload does not correspond to the security level of the storage device, the computer system denies the request to place the workload in the hypervisor-based host.
55 Citations
20 Claims
-
1. A method comprising:
-
identifying a request to place a workload in a hypervisor-based host; identifying a security level of the workload; identifying a security level of a storage device associated with the hypervisor-based host; granting the request to place the workload in the hypervisor-based host if the security level of the workload corresponds to the security level of the storage device; and denying the request to place the workload in the hypervisor-based host if the security level of the workload does not correspond to the security level of the storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory; and a processing device coupled with the memory to; identify a request to place a workload in a hypervisor-based host; identify a security level of the workload; identify a security level of a storage device associated with the hypervisor-based host; grant the request to place the workload in the hypervisor-based host if the security level of the workload corresponds to the security level of the storage device; and deny the request to place the workload in the hypervisor-based host if the security level of the workload does not correspond to the security level of the storage device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform a method comprising:
-
identifying a request to place a workload in a hypervisor-based host; identifying a security level of the workload; identifying a security level of a storage device associated with the hypervisor-based host; granting the request to place the workload in the hypervisor-based host if the security level of the workload corresponds to the security level of the storage device; and denying the request to place the workload in the hypervisor-based host if the security level of the workload does not correspond to to the security level of the storage device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification