Risk-based model for security policy management

a security policy and risk-based technology, applied in the field of information technology (it) systems security policy management, can solve the problems of affecting the environment, affecting the continuity and consistency of the environment, and changing the probability of both positive impact (effectiveness) and negative impact (loss of productivity)

Inactive Publication Date: 2013-02-28
IBM CORP
View PDF6 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]The techniques herein augment a security policy management solution (such as a DLP system) to enable a user to model and visualize how changes in a security policy may impact (positively or negatively) the effectiveness of a policy configuration as well as the risk associated with its deployment. As used herein, a “policy” may ref...

Problems solved by technology

The specific values for attributes in a schema of any security policy can be modified, and such modifications may change the probability of both positive impact (effectiveness at managing risk) and negative impact (unhappy users, loss of productivity) on the environment which the policy is intended to protect.
Nevertheless, security policy management as a technology domain typically does not express policy explicitly in a way that recognizes the original purpose of risk management.
In this regard, most commercial policy management systems do not provide policy versioning; moreover, in those systems that do, p...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk-based model for security policy management
  • Risk-based model for security policy management
  • Risk-based model for security policy management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023]With reference now to the drawings and in particular with reference to FIGS. 1-2, exemplary diagrams of data processing environments are provided in which illustrative embodiments of the disclosure may be implemented. It should be appreciated that FIGS. 1-2 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which aspects or embodiments of the disclosed subject matter may be implemented. Many modifications to the depicted environments may be made without departing from the spirit and scope of the present invention.

[0024]With reference now to the drawings, FIG. 1 depicts a pictorial representation of an exemplary distributed data processing system in which aspects of the illustrative embodiments may be implemented. Distributed data processing system 100 may include a network of computers in which aspects of the illustrative embodiments may be implemented. The distributed data processing system 100 contains at least one ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security policy management solution (such as a Data Loss Prevention (DLP) system) is augmented to enable a user to model and visualize how changes in a security policy may impact (positively or negatively) the effectiveness of a policy configuration as well as the risk associated with its deployment. This technique enables a user (e.g., a security policy administrator) to evolve enterprise information technology (IT) security policies and, in particular, to generate and display “what-if” scenarios by which the user can determine trade-offs between, on the one hand, the effectiveness of a proposed change to a policy, and on the other hand, the risk associated with the proposed change.

Description

BACKGROUND OF THE INVENTION[0001]1. Technical Field[0002]This disclosure relates generally to security policy management for information technology (IT) systems.[0003]2. Background of the Related Art[0004]Information security is the process of providing a set of controls to manage risk with an end goal of demonstrating compliance with a set of regulations. Security policies specify how a set of controls operate and therefore to what extent risk may be capable of being managed. The specific values for attributes in a schema of any security policy can be modified, and such modifications may change the probability of both positive impact (effectiveness at managing risk) and negative impact (unhappy users, loss of productivity) on the environment which the policy is intended to protect.[0005]For example, Data Loss Prevention (DLP) systems are well-known in the prior art and operate generally to identify, monitor use of, and to control user operations on, sensitive information within an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
CPCG06F21/577
Inventor CHOI, CHRISTOPHER Y.READSHAW, NEIL I.
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products