×

Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance

  • US 20140359695A1
  • Filed: 08/19/2013
  • Published: 12/04/2014
  • Est. Priority Date: 05/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for managing a security policy having multiple policy items, the apparatus comprising:

  • a memory; and

    at least one processor device, coupled to the memory, operative to;

    (a) map permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items;

    (b) identify at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy;

    (c) identify at least one of the policy items mapped in step (a) that increases operational risk;

    (d) verify that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and

    (e) identify optimizations of the security policy based on output from one or more of steps (a)-(d).

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×