Enforcing alignment of approved changes and deployed changes in the software change life-cycle
First Claim
1. One or more non-transitory computer readable media having computer-executable instructions and when executed by at least one processor, cause the at least one processor to:
- receive, on a host computer, a host content change request indicating a change for a persistent object within the host computer;
determine, by the host computer, whether the change is authorized based on one or more change authorization policies;
allow the host content change request to proceed based on the change being determined to be authorized;
determine information associated with the host content change request is to be added to a set of change log information based, at least in part, on one or more criteria of a filter applied to the host content change request, the set of change log information aggregated from a plurality of computers; and
provide the information to be added to the set of change log information.
9 Assignments
0 Petitions
Accused Products
Abstract
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host. In an enforcement mode, the change requests are logged and additionally compared against authorized change policies and a determination is made whether to allow the change to take effect or to block the changes, thereby enforcing the authorized change policies on the host. Tracking and enforcement can be done in real-time. In either mode and at any time, the logged changes can be reconciled against a set of approved change orders in order to identify classes of changes, including changes that were deployed but not approved and changes that were approved but not deployed.
408 Citations
20 Claims
-
1. One or more non-transitory computer readable media having computer-executable instructions and when executed by at least one processor, cause the at least one processor to:
-
receive, on a host computer, a host content change request indicating a change for a persistent object within the host computer; determine, by the host computer, whether the change is authorized based on one or more change authorization policies; allow the host content change request to proceed based on the change being determined to be authorized; determine information associated with the host content change request is to be added to a set of change log information based, at least in part, on one or more criteria of a filter applied to the host content change request, the set of change log information aggregated from a plurality of computers; and provide the information to be added to the set of change log information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus, comprising:
-
a memory element for storing a set of change authorization policies; and a processor to execute an agent module on the apparatus to; receive, on a host computer, a host content change request indicating a change for a persistent object within the host computer; determine, by the host computer, whether the change is authorized based on one or more change authorization policies; allow the host content change request to proceed based on the change being determined to be authorized; determine information associated with the host content change request is to be added to a set of change log information based, at least in part, on one or more criteria of a filter applied to the host content change request, the set of change log information aggregated from a plurality of computers; and provide the information to be added to the set of change log information. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method to be executed by a processor, comprising:
-
receiving, on a host computer, a host content change request indicating a change for a persistent object within the host computer; determining, by the host computer, whether the change is authorized based on one or more change authorization policies; allowing the host content change request to proceed based on the change being determined to be authorized; determining information associated with the host content change request is to be added to a set of change log information based, at least in part, on one or more criteria of a filter applied to the host content change request, the set of change log information aggregated from a plurality of computers; and providing the information to be added to the set of change log information.
-
Specification