MANAGING SECURITY FEATURES OF CONTAINER ENVIRONMENTS

    公开(公告)号:US20250139250A1

    公开(公告)日:2025-05-01

    申请号:US18429564

    申请日:2024-02-01

    Abstract: A process includes determining, by a recommendation engine, a security risk profile for a container environment. The container environment includes a plurality of pods that are to be deployed on an infrastructure that includes a plurality of nodes. Determining the security risk profile includes determining an infrastructure context characterizing the infrastructure and determining a workload context characterizing a workload associated with the container environment. The process includes determining, by the recommendation engine, a recommendation of a security policy for the container environment based on the security risk profile. The security policy includes a security control. The process includes deploying an agent to the infrastructure to manage compliance of the container environment with the security control.

    Using trusted platform module (TPM) emulator engines to measure firmware images

    公开(公告)号:US11455396B2

    公开(公告)日:2022-09-27

    申请号:US15593546

    申请日:2017-05-12

    Abstract: Examples disclosed herein relate to performing an action based on a pre-boot measurement of a firmware image. In an example, at a firmware component in a system, a measurement of a firmware image may be determined prior to booting of the system, beginning from a hardware root of trust boot block, by a Trusted Platform Module (TPM) emulator engine that emulates a hardware-based TPM. A pre-determined measurement of the firmware image may be retrieved from a storage location within the system. The measurement of the firmware image may be compared with the pre-determined measurement of the firmware image prior to booting of the system. In response to a determination that the measurement of the firmware image is different from the pre-determined measurement of the firmware image, performing an action.

    INFORMATION TECHNOLOGY STACK SECURITY CONTROL CONFIGURATION

    公开(公告)号:US20210336992A1

    公开(公告)日:2021-10-28

    申请号:US16860262

    申请日:2020-04-28

    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.

    Authenticated access to manageability hardware components

    公开(公告)号:US10360370B2

    公开(公告)日:2019-07-23

    申请号:US15592528

    申请日:2017-05-11

    Abstract: Examples include an authenticated access to manageability hardware components in a computing device. Some examples enumerate manageability hardware components connected to an operative system kernel of the computing device, the manageability hardware components comprising a bus configuration space and the bus configuration space comprising memory map registers. Some examples include encoding an address stored in the memory map registers of each of the manageability hardware components to produce encoded address to control unauthorized accesses and locks the bus configuration space of each manageability hardware component by setting a read-only attribute to the bus configuration space. Some examples reprogram, in response to a request for access of an authenticated OS component to a manageability hardware component, the memory map register of the requested manageability hardware component with an accessible address to provide the authenticated OS component with access to the manageability hardware component.

    Vulnerability scanning
    8.
    发明授权

    公开(公告)号:US11803646B2

    公开(公告)日:2023-10-31

    申请号:US17237381

    申请日:2021-04-22

    Inventor: Suhas Shivanna

    CPC classification number: G06F21/577 G06F2221/034

    Abstract: Aspects of vulnerability scanning are disclosed. In one example, configuration and context information of a first device for which vulnerability scanning is to be performed is obtained. The configuration information includes telemetry data of the first device. A second device is provisioned based on the configuration information to create a cloned first device. The vulnerability scanning is performed on the cloned first device based on the context information to obtain a scan report.

    Information technology stack security control configuration

    公开(公告)号:US11601473B2

    公开(公告)日:2023-03-07

    申请号:US16860262

    申请日:2020-04-28

    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.

    APPLICATION-SPECIFIC POLICIES FOR FAILOVER FROM AN EDGE SITE TO A CLOUD

    公开(公告)号:US20210248047A1

    公开(公告)日:2021-08-12

    申请号:US16786853

    申请日:2020-02-10

    Abstract: Example implementations relate to application-specific policies for failing over from an edge site to a cloud. When an application becomes operational within an edge site, a discovery phase is performed by a local disaster recovery (DR) agent. I/O associated with a workload of the application is monitored. An I/O rate for data replication that satisfies latency characteristics of the application is predicted based on the incoming I/O. Based on results of tests against multiple clouds indicative of their respective RTO/RPO values, information regarding a selected cloud to serve as a secondary system is stored in an application-specific policy. The application-specific policy is transferred to a remote DR agent running in the selected cloud. Responsive to a failover event, infrastructure within a virtualized environment of the selected cloud is enabled to support a failover workload for the application based on the application-specific policy.

Patent Agency Ranking