Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Configuration, generation method and device of cloud environment audit log and/or security event

A security event and cloud environment technology, applied to the configuration and generation of audit logs and/or security events in the cloud environment, can solve problems such as the inability to effectively and timely discover and correct security problems, and the inability to continuously monitor the security of information assets, to achieve The effect of enhancing trust, improving confidence and trust, and ensuring safety

Active Publication Date: 2018-03-23
ZTE CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in the current cloud computing multi-tenant environment, tenants lack an effective method to obtain audit logs and security events related to the security of tenant information assets in the cloud that meet tenant security requirements, resulting in tenants being unable to effectively monitor the information deployed in the cloud. The security of assets is continuously monitored, and it is impossible to effectively and timely discover and correct existing security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration, generation method and device of cloud environment audit log and/or security event
  • Configuration, generation method and device of cloud environment audit log and/or security event
  • Configuration, generation method and device of cloud environment audit log and/or security event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This embodiment describes how to configure audit logs and / or security events in a multi-tenant cloud environment, specifically:

[0068] The cloud tenant configures the audit logs and / or security events of the cloud tenant that the cloud computing service provider (CSP) needs to provide in the Service Level Agreement (Service Level Agreement, SLA for short).

[0069] In addition to cloud tenants, other entities that need to be configured can also configure related requirements in SlA.

[0070] Tenants' information assets in the cloud are of different types. Figure 4 Some types of information assets are listed in , including: user name, group name, virtual machine, file, folder, directory, IP address, application, database, data table, data record, data object, email address, inbox, sent folders, contacts, audit logs, security events.

[0071] The aforementioned audit logs include one or more of the following: operating system audit logs, database audit logs, applicat...

Embodiment 2

[0081] This embodiment illustrates a method for generating audit logs and / or security events in a multi-tenant cloud environment.

[0082] Take audit logs and security events as examples. The complete life cycle of audit logs and security events includes three stages: audit log generation and security event generation, audit log and security event storage and use (that is, acquisition), and audit log and security event destruction. In a multi-tenant cloud environment, tenants expect the CSP to generate and process tenant audit logs and security events according to their individual requirements. Figure 8It shows that cloud tenants can specify the requirements of each stage of the audit log and security event life cycle by configuring the SLA. The requirements of tenants include several aspects: the scope of audit logs and security events, that is, those audit logs and security events that tenants want to obtain; the content of audit logs and security events, that is, the info...

Embodiment 3

[0097] This embodiment introduces the device that realizes the method of embodiment 2, such as Figure 10 As shown, including the SLA module and the generation module, where:

[0098] The SLA module: configure the audit logs and / or security events of the cloud tenants that the CSP needs to provide in the SLA;

[0099] The generation module: the CSP generates audit logs and / or security events of cloud tenants according to the configuration in the SLA.

[0100] The source of the audit log, the source of the security event, and the scope and content involved in the audit log or security event refer to the description in Embodiment 1, which will not be repeated in this example.

[0101] If the SLA is also configured with: privacy protection information; then the generation module is also used to generate audit logs or security events of other cloud tenants when the cloud tenants need to implement privacy protection information assets in the cloud, Omit or anonymize the informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for configuring and generating audit logs and / or security events in a cloud environment. In a multi-tenant cloud computing environment, cloud tenants are provided with audit logs and related information assets in the cloud that meet their needs. and / or security incidents. The generation method includes: configuring the audit log and / or security event of the cloud tenant that the cloud computing service provider (CSP) needs to provide in the service level agreement (SLA); the CSP generates the cloud tenant according to the configuration in the SLA audit logs and / or security events. The generating device includes an SLA module and a generating module. Adopting the method and device of the present invention helps to improve the confidence and trust of cloud tenants in the CSP, and satisfies the differentiated requirements of different tenants.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for configuring and generating audit logs and / or security events in a cloud environment. Background technique [0002] Cloud computing (Cloud Computing) is an innovative consumption and delivery model of information technology and business services. The core is that hardware and software are resources and packaged as services, which users can access and use on demand through the network. Its five core features are On-demand self-service, Broadnetwork access, Resource pooling, Rapid scalability, Measurable service ( Measured service). [0003] According to the types of services provided by cloud computing, the National Institute of Standards and Technology (NIST) divides cloud computing into "Infrastructure as a Service" (Infrastructure as a Service, referred to as IaaS) and "Platform as a Service". (Platform as a Service, referred to as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 张瑞山林兆骥周苏静
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products