Automatisierte Verwaltung von vertraulichen Daten in Cloud-Umgebungen

    公开(公告)号:DE112015004500B4

    公开(公告)日:2021-06-02

    申请号:DE112015004500

    申请日:2015-10-23

    Applicant: IBM

    Abstract: Verfahren (100) zum Speichern von Daten in einer gemeinsam genutzten vernetzten Umgebung, wobei die gemeinsam genutzte vernetzte Umgebung (610) eine Sicherheitsschicht (612) zwischen einem gemeinsam genutzten vernetzten Speicher und einer Zugriffsschnittstelle eines gemeinsam genutzten vernetzten Speichers (602) aufweist, wobei das Verfahren (100) aufweist- physisches Trennen (102) des gemeinsam genutzten vernetzten Speichers mit der Sicherheitsschicht (612) von einem Schlüsseltresorsystem (604),- Empfangen (104) einer Speicheranforderung zusammen mit Daten, die in dem gemeinsam genutzten vernetzten Speicher gespeichert werden sollen, und zusammen mit einer Vertraulichkeitseinstufung, wobei die Speicheranforderung zusammen mit Daten und der Vertraulichkeitseinstufung über die Zugriffsschnittstelle des gemeinsam genutzten vernetzte Speichers (602) von der Sicherheitsschicht (612) empfangen wird,- Verschlüsseln (106) der zu speichernden Daten und der Vertraulichkeitseinstufung auf Anforderung der Sicherheitsschicht (612) durch das Schlüsseltresorsystem (604) in einem Datencontainer (608, 904),- Kategorisieren (108) des gemeinsam genutzten vernetzten Speichers in Cloud-Zonen, wobei jeder Cloud-Zone eine Vertrauensebene zugewiesen ist;- Speichern (110) des Datencontainers (608, 904) in einer der Cloud-Zonen des gemeinsam genutzten vernetzten Speichers, sodass die Vertrauensebene von der einen der Cloud-Zonen der Vertraulichkeitseinstufung entspricht; und- Validieren durch das Schlüsseltresorsystem (604), dass die Speicheranforderung mit konfigurierbaren Richtlinien konform ist durch- Validieren, dass die Sicherheitsschicht (612) für eine Datenübertragung vertrauenswürdig ist, und dass ein Übertragungskanal zwischen der Sicherheitsschicht (612) und dem Schlüsseltresorsystem (604) durch eine Verschlüsselung auf Zertifikatsgrundlage geschützt ist, und- im Fall einer positiven Validierung, Erstellen eines Übertragungstickets, das die Autorisierung aufweist, Anfordern von Informationen über den Speicher-Anforderer und von Metadaten über die zu speichernden Daten, einer Signatur der Sicherheitsschicht (612) und einer Ablaufzeit für die Speicheranforderung, und Signieren des Übertragungstickets, bevor das Übertragungsticket an die Sicherheitsschicht (612) zurückgesendet wird.

    DETECTING SENSITIVE DATA EXPOSURE VIA LOGGING

    公开(公告)号:CA3137249A1

    公开(公告)日:2020-10-22

    申请号:CA3137249

    申请日:2020-03-23

    Applicant: IBM

    Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns is provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain thereby, identifying a specific cyber-attack chain and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats.

    Method and system for providing additional information to a visual interface element of a graphical user interface

    公开(公告)号:GB2498832B

    公开(公告)日:2014-03-05

    申请号:GB201221375

    申请日:2012-11-28

    Applicant: IBM

    Inventor: SEUL MATTHIAS

    Abstract: A mechanism provides additional information to a visual interface element of a graphical user interface in an operating system environment. To display the additional information to the visual interface element on the information container layer, a background service process determines for each of the visual interface elements of the graphical user interface whether at least one configured context is assigned; collecting information across all applications from at least one information or status source related to the at least one assigned context; generating and placing a corresponding information container on the information container layer to be visible at a relative position to the corresponding visual interface element of the graphical user interface on the display area.

    Correlation of session activities to a browser window in a client-server environment

    公开(公告)号:GB2506624A

    公开(公告)日:2014-04-09

    申请号:GB201217734

    申请日:2012-10-04

    Applicant: IBM

    Abstract: An improved method for correlation of session activities to a browser window (120) in a client-server environment (1) comprises: Implementing correlation means (52) to intercept and manipulate data traffic between client (100) and server (15, 25) and to submit requests (162) to said server (15, 25) and to submit responses (170, 174) to said client (100); tracking and monitoring all incoming client requests (160, 164) and server responses (172); looking for a session identifier (56) and identifying corresponding marker locations containing said session identifier (56); wherein in case an incoming browser request (160, 164) is missing said session identifier (56) at at least one predefined main marker location said incoming client request (160, 164) is intercepted and a correlation response (170) attached with a session identifier (56) is send to a requesting client (100) for repeating said client request (160, 164) including said session identifier (56) at predefined marker locations and using said session identifier (56) for all subsequent requests (160, 164) originated by said client (100); and wherein in case all predefined main marker locations are containing said session identifier (56), all session identifiers (56) are removed and details of said client request (160, 164) are recorded and associated with said session identifier (56), and said client request (160) is marked with a specific marker containing said session identifier (56) and submitted as marked request (162) to said server (15, 25).

    Detecting sensitive data exposure via logging

    公开(公告)号:IL286611D0

    公开(公告)日:2021-10-31

    申请号:IL28661121

    申请日:2021-09-22

    Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns may be provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain—thereby, identifying a specific cyber-attack chain—and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats to information technology systems.

    DETECTING SENSITIVE DATA EXPOSURE VIA LOGGING

    公开(公告)号:SG11202109795WA

    公开(公告)日:2021-10-28

    申请号:SG11202109795W

    申请日:2020-03-23

    Applicant: IBM

    Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns may be provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain—thereby, identifying a specific cyber-attack chain—and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats to information technology systems.

    Dynamisches, skript-fähiges Routing

    公开(公告)号:DE102017218904A1

    公开(公告)日:2018-05-03

    申请号:DE102017218904

    申请日:2017-10-24

    Applicant: IBM

    Abstract: Ausführungsformen beziehen sich auf eine Senderseite einer Netzwerkdatenübertragung, die von einem Sender über einen Netzwerkpfad an ein Ziel gesendet wird, wobei die Senderseite bestimmte Bedingungen und Aktionen in Form eines Skripts ausdrückt und das Skript in Netzwerkpaketen codiert, so dass Routing-Entscheidungen getroffen werden können. Routing-Einheiten entlang des Netzwerkpfads sind mit einer Ausführungsumgebung und einer Anwendungsprogrammschnittstelle (Application Program Interface, API) ausgestattet, damit das Skript ausgeführt werden und in den Routing-Prozess eingreifen (d.h. mit der Routing-Einheit „reden“) kann. Hier bereitgestellte Ausführungsformen können so realisiert werden, dass sie mit anderen, bestehenden Routing-Protokollen gemeinsam vorhanden sind, oder sie können andere, bestehende Routing-Protokolle vollständig ersetzen.

    Automatisierte Verwaltung von vertraulichen Daten in Cloud-Umgebungen

    公开(公告)号:DE112015004500T5

    公开(公告)日:2017-08-10

    申请号:DE112015004500

    申请日:2015-10-23

    Applicant: IBM

    Abstract: Ein Verfahren zum Speichern von Daten in einer Cloud-Umgebung kann bereitgestellt werden. Die Cloud-Umgebung weist eine Sicherheitsschicht auf. Das Verfahren weist ein physisches Trennen des Cloud-Speichers von einem Schlüsseltresorsystem und ein Empfangen einer Speicheranforderung zusammen mit einer Vertraulichkeitseinstufung auf, wobei die Speicheranforderung zusammen mit Daten und der Vertraulichkeitseinstufung über die Zugriffsschnittstelle des Cloud-Speichers von der Sicherheitsschicht empfangen wird. Das Verfahren weist ferner ein Verschlüsseln der zu speichernden Daten und der Vertraulichkeitseinstufung auf Anforderung der Sicherheitsschicht durch das Schlüsseltresorsystem in einem Datencontainer auf, ein Kategorisieren des Cloud-Speichers in Cloud-Zonen, wobei jeder Cloud-Zone eine Vertrauensebene zugewiesen wird; und ein Speichern des Datencontainers in einer der Cloud-Zonen des Cloud-Speichers, sodass die Vertrauensebene von der einen der Cloud-Zonen der Vertraulichkeitseinstufung entspricht.

    Transparent encryption/decryption gateway for cloud storage services

    公开(公告)号:GB2509709A

    公开(公告)日:2014-07-16

    申请号:GB201300316

    申请日:2013-01-09

    Applicant: IBM

    Abstract: Secure data storage 405 in a distributed (e.g. cloud) computing system 400 by a client 401 of the distributed computing system, the method comprising in a gateway device 403 of the distributed computing system intercepting a data file from a data stream during transmission of the stream in the system; evaluating the intercepted data file for determining the communication protocol used for the stream data transmission; evaluating the intercepted data file based on the communication protocol for determining the destination and the source of the data file; if the destination is the storage (405): selecting a set of analysis algorithms from a plurality of predetermined analysis algorithms, wherein each analysis algorithm of the set of the analysis algorithms is associated with a predefined weight; analyzing the intercepted data file using each of the analysis algorithms of the selected set of analysis algorithms for determining if the intercepted data file comprises sensitive data, thereby determining a respective set of results; associating to each result of the set of results a number indicating that the data file comprises or not sensitive data; calculating a weighted sum of the numbers indicating that the data file comprises sensitive data using the predefined weights; comparing the weighted sum with a predetermined sensitivity threshold value; in response to determination that the weighted sum is higher than a sensitivity threshold, creating a data container and encrypting the payload content of the data file in a manner so as to maintain the original payload size, possibly using augmentation/reduction/compression and/or padding if necessary; storing the key used to encrypt the data file; and transmitting the encrypted payload rather than the original data file to the storage. If the destination is the client and the source of the stream is the storage the gateway decrypts the data file using a stored encryption key and transmits the data file to the client once authorized.

    Method and system for providing additional information to a visual interface element of a graphical user interface.

    公开(公告)号:GB2498832A

    公开(公告)日:2013-07-31

    申请号:GB201221375

    申请日:2012-11-28

    Applicant: IBM

    Inventor: SEUL MATTHIAS

    Abstract: Disclosed is a method of providing additional information to a visual interface element of a graphical user interface in an operating system environment. An information container layer 20 is implemented running across all applications on top of a display area, a context 150, 160, 170 defining a predefined state of the operating system environment is configured and assigned to a visual interface element based on collected information or status information in the operating system environment. The context is considered active, if the operating system environment is in the predefined state, otherwise the context is considered inactive. To display the additional information to the visual interface element on the information container layer a background service process 100 is started that, determines for each of the visual interface elements of the graphical user interface if a configured context is assigned, if a configured context is assigned, collect and store information across all applications from the information or status source 120, 130, 140 related to the assigned context, evaluating the collected information to determine a state of the at least one assigned context, generating and placing a corresponding information container 22 on the information container layer in a way, that it is visible at a relative position to the corresponding visual interface element of the graphical user interface on the display area, if the state of the assigned context changes or remains for a certain amount of time.

Patent Agency Ranking