Dynamic optimizing scanner for identity and access management (IAM) compliance verification
An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulne...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
10.04.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts. |
---|---|
AbstractList | An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts. |
Author | Robke Jeffrey Tobias Palmieri David Walsh Harter John Leslie |
Author_xml | – fullname: Harter John Leslie – fullname: Palmieri David Walsh – fullname: Robke Jeffrey Tobias |
BookMark | eNqNyrsOwjAMQNEMMPD6B48wMFAqpI48BQMTMDFUlutUlhonSiKk8vUw8AFMdzh3bAbqlUfmeegVnRD4kMXJW7SFRKjKEayPIA1rltwDagNIxCmBQ8WW3RdgftleF0DehU5QieHFUawQZvE6NUOLXeLZrxMDp-N9f15y8DWngMTKuX7cqqosis1qV6z_WD4qYjzG |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US9942261B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US9942261B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 16:50:48 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US9942261B23 |
Notes | Application Number: US201715464746 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180410&DB=EPODOC&CC=US&NR=9942261B2 |
ParticipantIDs | epo_espacenet_US9942261B2 |
PublicationCentury | 2000 |
PublicationDate | 20180410 |
PublicationDateYYYYMMDD | 2018-04-10 |
PublicationDate_xml | – month: 04 year: 2018 text: 20180410 day: 10 |
PublicationDecade | 2010 |
PublicationYear | 2018 |
RelatedCompanies | International Business Machines Corporation |
RelatedCompanies_xml | – name: International Business Machines Corporation |
Score | 3.138149 |
Snippet | An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Dynamic optimizing scanner for identity and access management (IAM) compliance verification |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180410&DB=EPODOC&locale=&CC=US&NR=9942261B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5Kfd40KtYXe5Cgh2BqtklzCEJeFKEPbCsFDyWbbCCHJqWJiP56Z7dp9aLXDSzZmXwzu9nvmwG4pSJPG-gB9HCqUW4mGosNpnVoxJLU5rFpCb1zf2D2pvR51pk1INtoYWSd0A9ZHBERFSPeKxmvlz8_sXzJrSwfWIZDxVM4cXy1Ph23RTUdXfVdJxgN_aGnep4zHauDF8e2hWS07WK03sFdtCXAELy6QpSy_J1RwiPYHeFkeXUMDZ4rcOBtGq8psN-v77sV2JMEzbjEwRqE5Qm8-esu8qRAuC-yL0w-pEQL5XxFcAtKsrX29pNEeUIi2RCRLLYsF3KHh_d7sqaSC5cT_JgFX0iu-hRIGEy8nobvO9_aZj4db1dmnEEzL3J-DsSmUYQRMO3qBqdRmjLLYnrcpfzR7sYGZy1o_TnNxT_PLuFQGFncprT1K2hWq3d-jUm5YjfSnN9-a5Mp |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT4NAEJ409VFvihrrcw-G6IFIZQvlQEwKbVD7iqWmiQfC0iXhUNoUjNFf7-z2oRe9LsmGneGb2WW_bwbgmoo8baAH0MOJRrk50VhsMK1OIzZJbB6bltA7d3umP6JP4_q4BOlaCyPrhH7I4oiIqBjxXsh4Pf_5ieVJbmV-x1Icmj20A8dTV6fjmqimo6te02kN-l7fVV3XGQ3V3otj20IyWmtitN7CHbYlwNB6bQpRyvx3Rmnvw_YAJ8uKAyjxTIGKu268psBud3XfrcCOJGjGOQ6uQJgfwpu37CJPZgj3afqFyYfkaKGMLwhuQUm61N5-kiibkEg2RCTTDcuF3ODh_ZYsqeTC5QQ_ZsEXkqs-AtJuBa6v4fuGG9uEo-FmZcYxlLNZxk-A2DSKMAImDd3gNEoSZllMjxuU39uN2OCsCtU_pzn959kVVPyg2wk7j73nM9gTBhc3KzX9HMrF4p1fYIIu2KU07TeSFZYc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Dynamic+optimizing+scanner+for+identity+and+access+management+%28IAM%29+compliance+verification&rft.inventor=Harter+John+Leslie&rft.inventor=Palmieri+David+Walsh&rft.inventor=Robke+Jeffrey+Tobias&rft.date=2018-04-10&rft.externalDBID=B2&rft.externalDocID=US9942261B2 |