LIMITING EXPOSURE TO COMPLIANCE AND RISK IN A CLOUD ENVIRONMENT
1 Assignment
0 Petitions
Accused Products
Abstract
Minimizing data security risks may be provided. A number and type of confidential data in a computing environment may be determined to generate a metric for the type of confidential data in the computing environment. The metric of the type of confidential data may be compared to a predetermined metric for the type. Responsive to determining the metric for the type of confidential data exceeding a predetermined metric for the type, an action may be performed to prevent more entries of the type of confidential data in the computing environment.
40 Citations
20 Claims
-
1-6. -6. (canceled)
-
7. A computer readable storage medium storing a program of instructions executable by a machine to perform a method of minimizing data security risks, the method comprising:
-
determining a number and type of confidential data in a computing environment to generate a metric for the type of confidential data in the computing environment; comparing the metric of the type of confidential data to a predetermined metric for the type; and responsive to determining the metric for the type of confidential data exceeding a predetermined metric for the type, performing an action to prevent more entries of the type of confidential data in the computing environment. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for minimizing data security risks, comprising:
-
one or more computing units running in a computing environment; and a processor coupled to the one or more computing units, the processor operable to determine a number and type of confidential data in the computing environment to generate a metric for the type of confidential data in the computing environment, the processor further operable to compare the metric of the type of confidential data to a predetermined metric for the type, and responsive to determining the metric for the type of confidential data exceeding a predetermined metric for the type, the processor further operable to perform an action to prevent more entries of the type of confidential data in the computing environment. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification