SECURE POLICY AUDIT IN SHARED ENFORCEMENT ENVIRONMENT

A method and system are provided that, in turn, provide a secure policy audit in a shared enforcement environment. The method includes providing an auditing component in a software defined network. The method further includes receiving, by the auditing component, a first auditing event from a first...

Full description

Saved in:
Bibliographic Details
Main Authors Williams Ronald B, Lee Cheng-Ta
Format Patent
LanguageEnglish
Published 20.04.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method and system are provided that, in turn, provide a secure policy audit in a shared enforcement environment. The method includes providing an auditing component in a software defined network. The method further includes receiving, by the auditing component, a first auditing event from a first component in the software defined network and a related auditing event from a second component in the software defined network. The method also includes analyzing, by the auditing component, the first auditing event and the related auditing event against an enforcement of an access policy criteria for the software defined network. The access policy criteria requires auditing events from at least two enforcement points in the software defined network. The first and second component form the at least two enforcement points. The method additionally includes determining, by the auditing component, one of a compliance and a non-compliance with the access policy criteria.
Bibliography:Application Number: US201514884232