International Business Machines Corporation
Automated security architecture formulation and deployment
Last updated:
Abstract:
Formulating a security architecture for an information system is provided. A description of a target environment of the information system is received. The description includes a network zone architecture. A description of one or more security requirements for the information system is received. One or more reference architectures for the information system are selected from a plurality of reference architectures based on the description of the one or more security requirements for the information system. One or more selected reference architectures are adapted to the target environment for the information system.
Status:
Grant
Type:
Utility
Filling date:
29 Aug 2019
Issue date:
10 Aug 2021