Buecker et al., 2010 - Google Patents
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event ManagerBuecker et al., 2010
View HTML- Document ID
- 9731590116441953975
- Author
- Buecker A
- Amado J
- Druker D
- Lorenz C
- Muehlenbrock F
- Tan R
- et al.
- Publication year
External Links
Snippet
To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of …
- 238000010606 normalization 0 abstract description 47
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107835982B (en) | Method and apparatus for managing security in a computer network | |
Kent et al. | Guide to Computer Security Log Management:. | |
US20070180490A1 (en) | System and method for policy management | |
US20060191007A1 (en) | Security force automation | |
Badger et al. | US government cloud computing technology roadmap | |
Martseniuk et al. | Automated Conformity Verification Concept for Cloud Security | |
Buecker et al. | IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager | |
US11895121B1 (en) | Efficient identification and remediation of excessive privileges of identity and access management roles and policies | |
Sahin | Cloud ERP security: guidelines for evaluation | |
Buecker et al. | Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security | |
Buecker et al. | IBM security solutions architecture for network, server and endpoint | |
Kent et al. | Sp 800-92. guide to computer security log management | |
Stone et al. | IT Asset Management | |
Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
WO2004104793A2 (en) | System and method for entreprise security monitoring and configuration management | |
Karlzén | An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis | |
Copeland et al. | Cloud Defense Strategies with Azure Sentinel | |
Haber et al. | Privileged Access Management (PAM) | |
US11822916B2 (en) | Correlation engine for detecting security vulnerabilities in continuous integration/continuous delivery pipelines | |
Parvanov et al. | Threat modelling and vulnerability assessment for IoT solutions: a case study | |
Pöhn et al. | Towards Improving Identity and Access Management with the IdMSecMan Process Framework | |
AlNaaji | Automating unauthorized access attempts detection and handling using robotic process automation | |
Udayakumar | Design and Deploy an Identify Solution | |
Pidlubnyi | Increasing Security and reducing risks running services in a potential containerized environment while meeting regulatory standards | |
Τσάβος | Risk assessment and risk management in a cloud based company |