DYNAMIC INHERITANCE OF SECURITY POLICIES ACROSS DIFFERENT VIRTUAL SECURITY ZONES

A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zon...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Llamas Virgen, Paul, Jaiswal, Peeyush, Jaiswal, Priyansh
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zone associated with a second user. In response to a determination that the first user has a need for the first security policy included in the second virtual security zone, a determination is made as to whether the first user is authorized to at least temporarily inherit the first security policy from the second virtual security zone. The method further includes causing the first security policy to be inherited by the first virtual security zone from the second virtual security zone in response to a determination that the first user is authorized to at least temporarily inherit the first security policy.