Managing access to vulnerability data at scale
Abstract:
Systems and methods are disclosed for managing access to vulnerability data in large scale operations, such as by synchronizing access to vulnerability data for active developers who have recently modified source code. For example, source vulnerability scanner (SVS) access may be granted to source code developers identified in a source control management system (SCM) as having made modifications within some recent timeframe, and may further revoke access for stale user accounts. This efficiently implements the information security principle of least privilege, and may easily scale to operations involving hundreds or thousands of active developers and asset owners, and tens of thousands of network assets − and even larger operations.
Information query
Patent Agency Ranking
0/0