发明名称 Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
摘要 Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
申请公布号 US9374389(B2) 申请公布日期 2016.06.21
申请号 US201414261621 申请日期 2014.04.25
申请人 Intuit Inc. 发明人 Bishop Thomas;Weaver Brett;Price Christian;Godinez Javier;Brinkley Capen;Lietz M. Shannon;Cabrera Luis Felipe
分类号 H04L29/06 主分类号 H04L29/06
代理机构 Hawley Troxell Ennis & Hawley LLP 代理人 Hawley Troxell Ennis & Hawley LLP ;McKay Philip
主权项 1. A system for ensuring an application conforms with security and regulatory controls prior to deployment comprising: at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for ensuring an application conforms with security and regulatory controls prior to deployment, the process for ensuring an application conforms with security and regulatory controls prior to deployment including: defining one or more virtual asset security policies to be applied to the creation and instantiation of virtual assets to be used in a cloud computing environment; generating virtual asset security compliance data representing instructions for ensuring compliance with the one or more virtual asset security policies; applying the generated virtual asset security data to a virtual asset template configured to determine one or more operational parameters of a virtual asset during instantiation of that virtual asset; instantiating, using the generated virtual asset security data of the virtual asset template, at least one virtual asset complying with the virtual asset security policies; defining one or more application deployment security policies associated with the deployment and operational coupling and interconnectivity of virtual assets used to implement an application in the cloud computing environment, the application deployment security policies including at least an application deployment security policy requiring that all virtual assets used to implement an application are deployed within a network container that isolates them from other applications; generating application deployment security compliance data representing instructions for ensuring compliance with the one or more application deployment security policies, the generated application deployment security compliance data representing codified machine readable instructions and data for scanning and otherwise ensuring implementation of the application deployment security policies; providing the generated application deployment security compliance data to the virtual asset; and implementing and deploying, using at least one virtual asset including the virtual asset, an application that complies with the one or more application deployment security policies.
地址 Mountain View CA US