Method and system for providing security aware applications
First Claim
1. A system for providing security aware applications comprising:
- at least one processor; and
at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including;
instantiating, using a virtual asset creation template, a virtual asset used to implement an application, wherein the virtual asset is a virtual machine;
defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the defined trigger events at least including a change in a user ID associated with a user of the application, and/or an asset;
defining at least one responsive action to be associated with each of the one or more trigger events, wherein one of the one or more defined responsive actions includes disabling one or more communications channels of the virtual asset, until one or more required actions have taken place;
generating data representing instructions for monitoring and detecting the one or more trigger events;
generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events;
providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset;
providing, to the virtual asset, at least part of the data representing instructions for implementing the one or more responsive actions;
detecting, by the virtual asset, using the data representing instructions for monitoring and detecting the one or more trigger events in an asset, a trigger event involving the virtual asset; and
automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event.
0 Assignments
0 Petitions
Accused Products
Abstract
Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more trigger events are used by the asset to detect a trigger event. The instructions for implementing the at least one responsive action associated with each of the one or more trigger events is then used to automatically implement the at least one responsive action associated with the detected trigger event.
232 Citations
44 Claims
-
1. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; instantiating, using a virtual asset creation template, a virtual asset used to implement an application, wherein the virtual asset is a virtual machine; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the defined trigger events at least including a change in a user ID associated with a user of the application, and/or an asset; defining at least one responsive action to be associated with each of the one or more trigger events, wherein one of the one or more defined responsive actions includes disabling one or more communications channels of the virtual asset, until one or more required actions have taken place; generating data representing instructions for monitoring and detecting the one or more trigger events; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset; providing, to the virtual asset, at least part of the data representing instructions for implementing the one or more responsive actions; detecting, by the virtual asset, using the data representing instructions for monitoring and detecting the one or more trigger events in an asset, a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing security aware applications comprising:
-
an application implemented by at least one virtual asset instantiated from a virtual asset creation template; a production environment implementing the application; data for monitoring and detecting one or more trigger events in the virtual asset, the trigger events at least including a change in a user ID associated with a user of the virtual asset; data representing instructions for implementing at least one responsive action associated with each of the one or more trigger events upon detection of the one or more trigger events in the virtual asset, wherein at least one responsive action associated with at least one trigger event includes disabling one or more communications channels associated with the virtual asset, until one or more required actions have taken place; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; providing, to the at least one virtual asset, at least part of the data for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data for monitoring and detecting the one or more trigger events, a trigger event involving the at least one asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events, the at least one responsive action associated with the detected trigger event. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; instantiating, using a virtual asset creation template, a virtual asset used to implement an application; defining one or more operational parameters associated with the virtual asset used to implement the application, the defined one or more operational parameters at least including a communications channel configuration associated with the virtual asset; obtaining baseline values for the one or more operational parameters associated with assets used to implement the application; defining a trigger deviation value for each of the one or more operational parameters associated with assets used to implement the application; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters associated with the virtual asset used to implement the application, the defined trigger events at least including a change in a user ID associated with a user of the virtual asset; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset used to implement the application; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events, a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for providing security aware applications comprising:
-
defining one or more operational parameters associated with a virtual asset, wherein one of the one or more defined operational parameters includes a communications channel configuration associated with the virtual asset; obtaining baseline values for the one or more operational parameters; defining a trigger deviation value for each of the one or more operational parameters; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters, the defined trigger events at least including a change in a user ID associated with a user of the virtual asset; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events, a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; instantiating, using a virtual asset creation template, a virtual asset used to implement an application; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the defined trigger events at least including a change in a user ID associated with a user of the virtual asset; defining at least one responsive action to be associated with each of the one or more trigger events, wherein one of the defined at least one responsive actions includes permanently disabling one or more communications channels of the virtual asset; generating data representing instructions for monitoring and detecting the one or more trigger events; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset; providing, to the virtual asset, at least part of the data representing instructions for implementing the one or more responsive actions; detecting, by the virtual asset, using the data representing instructions for monitoring and detecting the one or more trigger events in an asset to detect a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event.
-
-
40. A system for providing security aware applications comprising:
-
an application; a production environment implementing the application; data for monitoring and detecting one or more trigger events in the virtual asset, the trigger events at least including a change in a user ID associated with a user of the virtual asset; data representing instructions for implementing at least one responsive action associated with each of the one or more trigger events upon detection of the one or more trigger events in the virtual asset, wherein at least one responsive action associated with at least one trigger event includes permanently disabling one or more communications channels associated with the virtual asset; at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; providing, to the at least one virtual asset, at least part of the data for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data for monitoring and detecting the one or more trigger events, a trigger event involving the at least one asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events, the at least one responsive action associated with the detected trigger event.
-
-
41. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; instantiating, using a virtual asset creation template, a virtual asset used to implement an application; defining one or more operational parameters associated with the virtual asset, the defined one or more operational parameters at least including a periodic event associated with the virtual asset; obtaining baseline values for the one or more operational parameters associated with the virtual asset; defining a trigger deviation value for each of the one or more operational parameters; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters, the defined trigger events at least including a change in a user ID associated with a user of the virtual asset; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for implementing the one or more responsive actions; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events to detect a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event.
-
-
42. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; defining one or more operational parameters associated with a virtual asset used to implement an application, wherein the virtual asset is a virtual machine; obtaining baseline values for the one or more operational parameters associated with the virtual asset; defining a trigger deviation value for each of the one or more operational parameters associated with the virtual asset; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters, the defined trigger events at least including a change in a user ID associated with a user of the virtual asset; defining at least one responsive action to be associated with each of the one or more trigger events, wherein the defined at least one responsive actions includes blocking a portion of communications traffic associated with the virtual asset, until one or more required actions have taken place; generating data representing instructions for monitoring and detecting the one or more trigger events; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events, a trigger event involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action, the at least one responsive action associated with the detected trigger event.
-
-
43. A system for providing security aware applications comprising:
-
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for providing security aware applications, the process for providing security aware applications including; defining one or more operational parameters associated with a virtual asset used to implement an application; obtaining baseline values for the one or more operational parameters associated with the virtual asset; defining a trigger deviation value for each of the one or more operational parameters associated with the virtual asset; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters, the defined trigger events at least including a change in a user ID associated with a user of the application, and/or an asset; defining at least one responsive action to be associated with each of the one or more trigger events, wherein the defined at least one responsive actions includes permanently disabling one or more communications channels associated with the virtual asset; generating data representing instructions for monitoring and detecting the one or more trigger events in the virtual asset; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events involving the virtual asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events, the at least one responsive action associated with the detected trigger event.
-
-
44. A method for providing security aware applications comprising:
-
defining one or more operational parameters associated with a virtual asset used to implement an application, wherein one of the one or more operational parameters includes a deployment pattern associated with the virtual asset used to implement the application; obtaining baseline values for the one or more operational parameters associated with the virtual asset; defining a trigger deviation value for each of the one or more operational parameters associated with the virtual asset; defining one or more trigger events that when detected in the virtual asset require at least one responsive action, the trigger events including the occurrence of a trigger deviation value for any of the one or more operational parameters, the defined trigger events at least including a change in a user ID associated with a user of the application, and/or an asset; defining at least one responsive action to be associated with each of the one or more trigger events; generating data representing instructions for monitoring and detecting the one or more trigger events; generating data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for monitoring and detecting the one or more trigger events; providing, to the virtual asset, at least part of the data representing instructions for implementing the one or more responsive actions; detecting, by the virtual asset, using the at least part of the data representing instructions for monitoring and detecting the one or more trigger events, a trigger event involving the at least one asset; and automatically implementing, by the virtual asset, using the data representing instructions for implementing the at least one responsive action associated with each of the one or more trigger events, the at least one responsive action associated with the detected trigger event.
-
Specification