×

Prioritizing asset remediations

  • US 8,495,747 B1
  • Filed: 03/31/2010
  • Issued: 07/23/2013
  • Est. Priority Date: 03/31/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method performed by a data processing apparatus, comprising:

  • using at least one processor device to generate a risk metric for an asset and a threat, wherein the risk metric is an estimate of a risk that the threat will affect the asset;

    generating a remediation availability metric for the asset and the threat, wherein the remediation availability metric is based, at least in part, on whether a remediation for the threat is available and not applied to the asset, wherein the remediation reduces the risk that the threat will affect the asset when applied to the asset; and

    determining a remediation prioritization metric for the asset and the threat according to the risk metric and the remediation availability metric, wherein the remediation prioritization metric specifies a priority of applying the remediation to the asset;

    wherein generating the risk metric for the asset and the threat comprises;

    receiving threat definition data for the threat and vulnerability detection data and countermeasure detection data for the asset, wherein the threat definition data identifies one or more countermeasures that reduce a risk that the threat will affect an asset, the vulnerability detection data identifies threats to which the asset is vulnerable, and the countermeasure detection data identifies one or more countermeasures protecting the asset;

    analyzing the vulnerability detection data to determine whether the asset is vulnerable to the threat;

    determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat; and

    determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×