DYNAMIC INHERITANCE OF SECURITY POLICIES ACROSS DIFFERENT VIRTUAL SECURITY ZONES
A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zon...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zone associated with a second user. In response to a determination that the first user has a need for the first security policy included in the second virtual security zone, a determination is made as to whether the first user is authorized to at least temporarily inherit the first security policy from the second virtual security zone. The method further includes causing the first security policy to be inherited by the first virtual security zone from the second virtual security zone in response to a determination that the first user is authorized to at least temporarily inherit the first security policy. |
---|