OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT

Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Nedbal, Manuel, Rajanna, Suresh, Ahluwalia, Manoj, Sreedhar, Rajiv, Lubeck, Mark Raymond, Kale, Ojas Milind, Cheng, Yuk Suen, Nool, Gary, Ahuja, Ratinder Paul Singh, Adler, David Dvir, Gaitonde, Jitendra
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Nedbal, Manuel
Rajanna, Suresh
Ahluwalia, Manoj
Sreedhar, Rajiv
Lubeck, Mark Raymond
Kale, Ojas Milind
Cheng, Yuk Suen
Nool, Gary
Ahuja, Ratinder Paul Singh
Adler, David Dvir
Gaitonde, Jitendra
description Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2021126948A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2021126948A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2021126948A13</originalsourceid><addsrcrecordid>eNrjZLDzDwjx9PWM8vRzV3BUCHZ1Dg3yDIlUcPb3c_N0Dw1yDPH091PwdwPK-bmGhPsHebu6KLj6hXkG-fv5uvqF8DCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjQ0MjM0sTC0dDY-JUAQAyAit4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><source>esp@cenet</source><creator>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</creator><creatorcontrib>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</creatorcontrib><description>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210429&amp;DB=EPODOC&amp;CC=US&amp;NR=2021126948A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210429&amp;DB=EPODOC&amp;CC=US&amp;NR=2021126948A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Nedbal, Manuel</creatorcontrib><creatorcontrib>Rajanna, Suresh</creatorcontrib><creatorcontrib>Ahluwalia, Manoj</creatorcontrib><creatorcontrib>Sreedhar, Rajiv</creatorcontrib><creatorcontrib>Lubeck, Mark Raymond</creatorcontrib><creatorcontrib>Kale, Ojas Milind</creatorcontrib><creatorcontrib>Cheng, Yuk Suen</creatorcontrib><creatorcontrib>Nool, Gary</creatorcontrib><creatorcontrib>Ahuja, Ratinder Paul Singh</creatorcontrib><creatorcontrib>Adler, David Dvir</creatorcontrib><creatorcontrib>Gaitonde, Jitendra</creatorcontrib><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><description>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDzDwjx9PWM8vRzV3BUCHZ1Dg3yDIlUcPb3c_N0Dw1yDPH091PwdwPK-bmGhPsHebu6KLj6hXkG-fv5uvqF8DCwpiXmFKfyQmluBmU31xBnD93Ugvz41OKCxOTUvNSS-NBgIwMjQ0MjM0sTC0dDY-JUAQAyAit4</recordid><startdate>20210429</startdate><enddate>20210429</enddate><creator>Nedbal, Manuel</creator><creator>Rajanna, Suresh</creator><creator>Ahluwalia, Manoj</creator><creator>Sreedhar, Rajiv</creator><creator>Lubeck, Mark Raymond</creator><creator>Kale, Ojas Milind</creator><creator>Cheng, Yuk Suen</creator><creator>Nool, Gary</creator><creator>Ahuja, Ratinder Paul Singh</creator><creator>Adler, David Dvir</creator><creator>Gaitonde, Jitendra</creator><scope>EVB</scope></search><sort><creationdate>20210429</creationdate><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><author>Nedbal, Manuel ; Rajanna, Suresh ; Ahluwalia, Manoj ; Sreedhar, Rajiv ; Lubeck, Mark Raymond ; Kale, Ojas Milind ; Cheng, Yuk Suen ; Nool, Gary ; Ahuja, Ratinder Paul Singh ; Adler, David Dvir ; Gaitonde, Jitendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2021126948A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Nedbal, Manuel</creatorcontrib><creatorcontrib>Rajanna, Suresh</creatorcontrib><creatorcontrib>Ahluwalia, Manoj</creatorcontrib><creatorcontrib>Sreedhar, Rajiv</creatorcontrib><creatorcontrib>Lubeck, Mark Raymond</creatorcontrib><creatorcontrib>Kale, Ojas Milind</creatorcontrib><creatorcontrib>Cheng, Yuk Suen</creatorcontrib><creatorcontrib>Nool, Gary</creatorcontrib><creatorcontrib>Ahuja, Ratinder Paul Singh</creatorcontrib><creatorcontrib>Adler, David Dvir</creatorcontrib><creatorcontrib>Gaitonde, Jitendra</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nedbal, Manuel</au><au>Rajanna, Suresh</au><au>Ahluwalia, Manoj</au><au>Sreedhar, Rajiv</au><au>Lubeck, Mark Raymond</au><au>Kale, Ojas Milind</au><au>Cheng, Yuk Suen</au><au>Nool, Gary</au><au>Ahuja, Ratinder Paul Singh</au><au>Adler, David Dvir</au><au>Gaitonde, Jitendra</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT</title><date>2021-04-29</date><risdate>2021</risdate><abstract>Systems, methods, and apparatuses enable one or more security microservices to optimize a security configuration of a networked environment by applying security policies to resource groups passively to determine whether network sets, resource groups, or security policies should be modified, prior to active enforcement. When security policies are applied passively, security actions that are performed in response to a violation of security policy do not impact network traffic. The one or more security microservices evaluate the results of the passive application of security policies to determine whether there is at least one recommended modification to network sets, resource groups, or security policies. When there is at least one recommended modification, the modification is applied. When there are no recommended modifications or the recommended modifications have been performed, the one or more security microservices initiate active enforcement of at least a subset of the security policies on the network traffic.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2021126948A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title OPTIMIZING A SECURITY CONFIGURATION OF A NETWORKED ENVIRONMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T01%3A35%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Nedbal,%20Manuel&rft.date=2021-04-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2021126948A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true