Multiple-path remediation
First Claim
1. A system, comprising:
- a database associating a plurality of device vulnerabilities to which computing devices can be subject, each having a vulnerability identifier, with a plurality of remediation techniques that remediate the plurality of device vulnerabilities;
such that each of the device vulnerabilities is associated with at least one remediation technique;
the remediation techniques are each selected from the type group consisting of patches, policy settings, and configuration options; and
a first one of the device vulnerabilities is associated with at least two remediation techniques;
a query signal comprising the vulnerability identifier for the first one of the device vulnerabilities; and
a response signal, automatically generated in response to the query signal, that describes the at least two remediation techniques.
0 Assignments
0 Petitions
Accused Products
Abstract
A security information management system is described, wherein a database of potential vulnerabilities is maintained, along with data describing remediation techniques (patches, policy settings, and configuration options) available to protect against them. At least one vulnerability is associated in the database with multiple available remediation techniques. In one embodiment, the system presents a user with the list of remediation techniques available to protect against a known vulnerability, accepts the user'"'"'s selection from the list, and executes the selected technique. In other embodiments, the system uses a predetermined prioritization schedule to automatically select among the available remediation techniques, then automatically executes the selected technique.
57 Citations
3 Claims
-
1. A system, comprising:
-
a database associating a plurality of device vulnerabilities to which computing devices can be subject, each having a vulnerability identifier, with a plurality of remediation techniques that remediate the plurality of device vulnerabilities;
such that each of the device vulnerabilities is associated with at least one remediation technique;
the remediation techniques are each selected from the type group consisting of patches, policy settings, and configuration options; and
a first one of the device vulnerabilities is associated with at least two remediation techniques;
a query signal comprising the vulnerability identifier for the first one of the device vulnerabilities; and
a response signal, automatically generated in response to the query signal, that describes the at least two remediation techniques. - View Dependent Claims (2, 3)
-
Specification