首页>
外国专利>
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
展开▼
机译:用于将权限使用与安全策略进行协调以优化策略和监视持续合规性的技术
展开▼
页面导航
摘要
著录项
相似文献
摘要
In one aspect, a method for managing a security policy having multiple policy items includes the steps of: (a) mapping permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items; (b) identifying at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy; (c) identifying at least one of the policy items mapped in step (a) that increases operational risk; (d) verifying that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and (e) identifying optimizations of the security policy based on output from one or more of steps (a)-(d).
展开▼