OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT
Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Nedbal, Manuel Rajanna, Suresh Ahluwalia, Manoj Sreedhar, Rajiv Lubeck, Mark Raymond Kale, Ojas Milind Cheng, Yuk Suen Nool, Gary Ahuja, Ratinder Paul Singh Adler, David Dvir Gaitonde, Jitendra |
description | Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2021126948A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2021126948A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2021126948A13</originalsourceid><addsrcrecordid>eNrjZLDzDwjx9PWM8vRzV3BUCHZ1Dg3yDIlUcPb3c_N0Dw1yDPH091PwdwPK-bmGhPsHebu6KLj6hXkG-fv5uvqF8DCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjQ0MjM0sTC0dDY-JUAQAyAit4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><source>esp@cenet</source><creator>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</creator><creatorcontrib>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</creatorcontrib><description>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210429&DB=EPODOC&CC=US&NR=2021126948A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210429&DB=EPODOC&CC=US&NR=2021126948A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Nedbal, Manuel</creatorcontrib><creatorcontrib>Rajanna, Suresh</creatorcontrib><creatorcontrib>Ahluwalia, Manoj</creatorcontrib><creatorcontrib>Sreedhar, Rajiv</creatorcontrib><creatorcontrib>Lubeck, Mark Raymond</creatorcontrib><creatorcontrib>Kale, Ojas Milind</creatorcontrib><creatorcontrib>Cheng, Yuk Suen</creatorcontrib><creatorcontrib>Nool, Gary</creatorcontrib><creatorcontrib>Ahuja, Ratinder Paul Singh</creatorcontrib><creatorcontrib>Adler, David Dvir</creatorcontrib><creatorcontrib>Gaitonde, Jitendra</creatorcontrib><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><description>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDzDwjx9PWM8vRzV3BUCHZ1Dg3yDIlUcPb3c_N0Dw1yDPH091PwdwPK-bmGhPsHebu6KLj6hXkG-fv5uvqF8DCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjQ0MjM0sTC0dDY-JUAQAyAit4</recordid><startdate>20210429</startdate><enddate>20210429</enddate><creator>Nedbal, Manuel</creator><creator>Rajanna, Suresh</creator><creator>Ahluwalia, Manoj</creator><creator>Sreedhar, Rajiv</creator><creator>Lubeck, Mark Raymond</creator><creator>Kale, Ojas Milind</creator><creator>Cheng, Yuk Suen</creator><creator>Nool, Gary</creator><creator>Ahuja, Ratinder Paul Singh</creator><creator>Adler, David Dvir</creator><creator>Gaitonde, Jitendra</creator><scope>EVB</scope></search><sort><creationdate>20210429</creationdate><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><author>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2021126948A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Nedbal, Manuel</creatorcontrib><creatorcontrib>Rajanna, Suresh</creatorcontrib><creatorcontrib>Ahluwalia, Manoj</creatorcontrib><creatorcontrib>Sreedhar, Rajiv</creatorcontrib><creatorcontrib>Lubeck, Mark Raymond</creatorcontrib><creatorcontrib>Kale, Ojas Milind</creatorcontrib><creatorcontrib>Cheng, Yuk Suen</creatorcontrib><creatorcontrib>Nool, Gary</creatorcontrib><creatorcontrib>Ahuja, Ratinder Paul Singh</creatorcontrib><creatorcontrib>Adler, David Dvir</creatorcontrib><creatorcontrib>Gaitonde, Jitendra</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nedbal, Manuel</au><au>Rajanna, Suresh</au><au>Ahluwalia, Manoj</au><au>Sreedhar, Rajiv</au><au>Lubeck, Mark Raymond</au><au>Kale, Ojas Milind</au><au>Cheng, Yuk Suen</au><au>Nool, Gary</au><au>Ahuja, Ratinder Paul Singh</au><au>Adler, David Dvir</au><au>Gaitonde, Jitendra</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><date>2021-04-29</date><risdate>2021</risdate><abstract>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2021126948A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T01%3A35%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Nedbal,%20Manuel&rft.date=2021-04-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2021126948A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |