WORKSPACE INSTANTIATION USING CONTINUOUS VULNERABILITY INTELLIGENCE FEEDBACK LOOPS

An Information Technology Decision Maker (ITDM) defines a user workspace to be received and orchestrated by a workspace orchestration Information Handling System (IHS) on a host IHS. The orchestration IHS also receives specifications of the host, scans the user workspace definition for vulnerabiliti...

Full description

Saved in:
Bibliographic Details
Main Author Kolodziej, Jason
Format Patent
LanguageEnglish
Published 25.07.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An Information Technology Decision Maker (ITDM) defines a user workspace to be received and orchestrated by a workspace orchestration Information Handling System (IHS) on a host IHS. The orchestration IHS also receives specifications of the host, scans the user workspace definition for vulnerabilities, analyzes the vulnerabilities, and generates (an) attack parameter(s) and/or (a) pattern(s) of threat(s) to the user workspace. The orchestration IHS defines a model workspace definition that includes baseline protection for workload deployment against the attack parameter(s) and/or pattern(s) of threat(s), for orchestration, with the host, on the host. The same or another orchestration IHS (local to the host IHS) traces drift in the workload on the host, generates further attack parameter(s) and/or further pattern(s) of threat(s) from the drift. The same or other orchestration IHS adjusts the model workspace definition to include protection against the further attack parameter(s) and/or further pattern(s) of threat(s), for orchestration.
Bibliography:Application Number: US202318157508