SECURE POLICY AUDIT IN SHARED ENFORCEMENT ENVIRONMENT
A method and system are provided that, in turn, provide a secure policy audit in a shared enforcement environment. The method includes providing an auditing component in a software defined network. The method further includes receiving, by the auditing component, a first auditing event from a first...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
20.04.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A method and system are provided that, in turn, provide a secure policy audit in a shared enforcement environment. The method includes providing an auditing component in a software defined network. The method further includes receiving, by the auditing component, a first auditing event from a first component in the software defined network and a related auditing event from a second component in the software defined network. The method also includes analyzing, by the auditing component, the first auditing event and the related auditing event against an enforcement of an access policy criteria for the software defined network. The access policy criteria requires auditing events from at least two enforcement points in the software defined network. The first and second component form the at least two enforcement points. The method additionally includes determining, by the auditing component, one of a compliance and a non-compliance with the access policy criteria. |
---|---|
Bibliography: | Application Number: US201514884232 |