Systems And Methods For Implementing Modular Computer System Security Solutions

In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset. The control chain generation module is configured to select, based on requirements to satis...

Full description

Saved in:
Bibliographic Details
Main Authors RONEY GREGORY D, MARSH JACOB J
Format Patent
LanguageEnglish
Published 16.04.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset. The control chain generation module is configured to select, based on requirements to satisfy the security guideline and attributes of the hardware asset, a security implementation control. The control chain generation module is configured to select a control assessor to monitor the compliance of the hardware asset with the security guideline and is configured to define a control chain including the security guideline control, the security implementation control, and the control assessor. The control chain generation module is configured to send an instruction to apply the control chain to the hardware asset such that the control assessor monitors the hardware asset for compliance with the security guideline.
Bibliography:Application Number: US201414511866