主权项 |
1. A computer-implemented method of replacing software components executing in a runtime environment with corresponding known-good software components without regard to whether the software components executing in the runtime environment have been compromised or potentially compromised, the method being implemented by a computer system that includes one or more physical processors programmed with one or more computer program instructions which, when executed, perform the method, the method comprising:
determining, by the computer system, without regard to whether a first instance of a software component executing in the runtime environment has been compromised or potentially compromised, that at least the first instance of the software component should be replaced based on one or more replacement intervals; obtaining, by the computer system, at least a second instance of the software component from a component repository that is separate from the runtime environment; replacing, by the computer system, the first instance of the software component with the second instance of the software component based on the determination that the first instance of the software component should be replaced such that the second instance of the software component is to be used instead of the first instance of the software component; determining, by the computer system, without regard to whether the second instance of the software component has been compromised or potentially compromised, that at least the second instance of the software component should be replaced based on the one or more replacement intervals; obtaining, by the computer system, at least a third instance of the software component from the component repository; and replacing, by the computer system, the second instance of the software component with the third instance of the software component based on the determination that the second instance of the software component should be replaced such that the third instance of the software component is to be used instead of the second instance of the software component, wherein the first instance of the software component, the second instance of the software component, and the third instance of the software component are not varied with respect to one another. |