International Business Machines Corporation
Automated security architecture formulation and deployment

Last updated:

Abstract:

Formulating a security architecture for an information system is provided. A description of a target environment of the information system is received. The description includes a network zone architecture. A description of one or more security requirements for the information system is received. One or more reference architectures for the information system are selected from a plurality of reference architectures based on the description of the one or more security requirements for the information system. One or more selected reference architectures are adapted to the target environment for the information system.

Status:
Grant
Type:

Utility

Filling date:

29 Aug 2019

Issue date:

10 Aug 2021