International Business Machines Corporation
Security evaluation for computing workload relocation

Last updated:

Abstract:

A security incident is detected at a first location; a risk of the security incident is evaluated. A first security scores is generated for the first location. A set of security scores are generated for a set of alternative locations; the set of security scores excludes the first security score. A second security score within the set of security scores is determined to be the best security score among a plurality of security scores; the plurality of security scores comprises the set of security scores and the first security score. A workload associated with the first location is migrated to a second location, where the second location is associated with the second security score.

Status:
Grant
Type:

Utility

Filling date:

11 Sep 2019

Issue date:

5 Apr 2022