Browse Prior Art Database

Method and apparatus for optimised creation of business security policy for rapid implementation of such policy on security compliance tool

IP.com Disclosure Number: IPCOM000238918D
Publication Date: 2014-Sep-25
Document File: 5 page(s) / 90K

Publishing Venue

The IP.com Prior Art Database

Abstract

Our Idea Provide a user interface that steps clients through an easy way of creating Business Security Policy in plain English especially when clients are considering multiple Security Tools. Dashboard Overview of constraints from multiple Security Tools is provided in a form of a Gap report and Shortlisted chosen Security tool provides a optimised Security Policy for the clients based on the Gap report.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 55% of the total text.

Page 01 of 5

Method and apparatus for optimised creation of business security policy for rapid implementation of such policy on security compliance tool

Patent Title: Method and apparatus for optimized creation of business security policy for rapid implementation of such policy on security compliance tool

CLAIM

 It will provide a mechanism to produce optimised business security policy for the clients based on technical constraints of Security Tools under consideration.

 There will be no misinterpretations of security policy translations from plain English to technical speak.

 Will provide plain English descriptions as well as technical information for each check.


1. Detail and Advantages

Our Idea Provide a user interface that steps clients through an easy way of creating Business Security Policy in plain English especially when clients are considering multiple Security Tools.

Dashboard Overview of constraints from multiple Security Tools is provided in a form of a Gap report and Shortlisted chosen Security tool provides a optimised Security Policy for the clients based on the Gap report.

1



Page 02 of 5

Figure 1 Dashboard of Gap Overview from multiple Security Tools

2



Page 03 of 5

Figure 2 Dashboard Overall Coverage Matrix for multiple Security Tools


2. Architecture

High level overview

1. Dashboard Overview of Gap/constraints from multiple Security Tools in a form of a Gap report and Overall coverage report. 2. Shortlisted chosen Security tool based on above Gap report to achieve optimised Security Policy for the clients.

3. Vendor will have a preference to decide on a particular Tool based on the below facts/costs

a. Overall Coverage Weightage for each SHC tool.

b. Human Resource Ratio availability for each tool in each Geography

c. Turnaround time for completing Policy based on resource and skills in any region.

     4. Have pre-packaged security checks sorted into standard categories typically found in a security policy with plain English descriptions associated for these queries.


5. Common Format Security Policy that can collect current baseline values for a new Prospective customer who does not have a

3



Page 04 of 5

policy set. This will allow to have a Shared Security Model to ensure Shared Se...