COMPLIANCE VIOLATION DETECTION

Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to iden...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SOL ALISSON, AKSIONKIN MICHAEL, ASIPOV BORIS, GUHA SAIKAT, BARADI RITHESH, SHETH LEENA JAIN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to identify one or more data schemas from file data of a grouping. One or more policy rules that apply tocontent of the data schema may be determined. At least one file of the file data may be scanned to determine compliance with the one or more policy rules. A report of compliance with the one or more policy rules may be generated based on a result of a file scan. Other examples are also described. 本公开的非限制性示例描述用于针对策略遵从性而扫描数据的系统和方法。在个示例中,网络数据被评价以生成个或多个分组。分组可以基于网络数据的文件类型。数据标识规则被应用以标识来自分组的文件数据的种或多种数据架构。应用到数据架构的内容的个或多个策略规则可以被确定。文件数据的至少个文件可以被扫描以确定与个或多个策略规则的遵从性。与个或多个策略规则的遵从性的报告可以基于文件扫描的结果而生成。其他示例也被描述。