System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G06F-021/62
출원번호
US-0156051
(2016-05-16)
등록번호
US-9832201
(2017-11-28)
발명자
/ 주소
Yu, Sounil
Sloane, Brandon Matthew
출원인 / 주소
Bank of America Corporation
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
0인용 특허 :
37
초록▼
Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from
Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from unauthorized external access; electronically receive information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource; electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource; and apply the control template to the internal resource.
대표청구항▼
1. A system for generation and implementation of threat vector templates and implementing controls for securing technology resources, the system comprising: at least one non-transitory storage device;at least one processor; andinstruction code stored in said storage device, said instruction code bei
1. A system for generation and implementation of threat vector templates and implementing controls for securing technology resources, the system comprising: at least one non-transitory storage device;at least one processor; andinstruction code stored in said storage device, said instruction code being executable by the at least one processor and configured to cause said at least one processor to:electronically receive an analysis request associated with an internal resource from a user device associated with a user;determine that an internal resource in a network requires protection from unauthorized external access;electronically receive information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;apply the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine that the exposure score associated with at least one of the one or more threat vectors is greater than a predetermined threshold;determine one or more additional controls configured for detecting the access to the internal resource, wherein the one or more controls are stored in a controls library;initiate, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls recommended to the user for incorporation;electronically receive, via the established communication link, a user selection of at least one of the one or more additional controls recommended to the user; andincorporate the one or more additional controls selected by the user, wherein incorporating the one or more additional controls lowers the exposure score to below the predetermined threshold. 2. The system of claim 1, wherein the instruction code is further configured to cause the at least one processor to: determine the one or more types of access associated with each of the one or more threat vectors, wherein the one or more types of access indicate one or more ways in which the internal resource can be accessed via each of the one or more threat vectors. 3. The system of claim 1, wherein the one or more controls are configured to be regulated to monitor access to the internal resource via at least one of the one or more threat vectors, reducing the exposure score associated with each of the one or more threat vectors. 4. The system of claim 1, wherein the instruction code is further configured to cause the at least one processor to: determine a cost associated with the incorporation of each of the one or more additional controls;determine that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls;wherein the recommendation interface is initiated based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls. 5. A computerized method for generation and implementation of threat vector templates and implementing controls for securing technology resources, the method comprising: electronically receiving, using a computing device processor, an analysis request associated with an internal resource from a user device associated with a user;determining, using a computing device processor, that an internal resource in a network requires protection from unauthorized external access;electronically receiving, using a computing device processor, information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;determining, using a computing device processor, one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;electronically retrieving, using a computing device processor, from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;applying, using a computing device processor, the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;determining, using a computing device processor, a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;determining, using a computing device processor, a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;determining, using a computing device processor, a strength associated with each of the one or more controls associated with each of the one or more threat vectors;determining, using a computing device processor, an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;determining, using a computing device processor, that the exposure score associated with at least one of the one or more threat vectors is greater than a predetermined threshold;determining, using a computing device processor, one or more additional controls configured for detecting the access to the internal resource, wherein the one or more controls are stored in a controls library;initiating, using a computing device processor, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls recommended to the user for incorporation;electronically receiving, using a computing device processor, via the established communication link, a user selection of at least one of the one or more additional controls recommended to the user; andincorporating, using a computing device processor, the one or more additional controls selected by the user, wherein incorporating the one or more additional controls lowers the exposure score to below the predetermined threshold. 6. The method of claim 5, wherein the method further comprises determining the one or more types of access associated with each of the one or more threat vectors, wherein the one or more types of access indicate one or more ways in which the internal resource can be accessed via each of the one or more threat vectors. 7. The method of claim 5, wherein the one or more controls are configured to be regulated to monitor access to the internal resource via at least one of the one or more threat vectors, reducing the exposure score associated with each of the one or more threat vectors. 8. The method of claim 5, wherein the method further comprises: determining a cost associated with the incorporation of each of the one or more additional controls;determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls;wherein the recommendation interface is initiated based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, initiating, via the established communicable link. 9. A computer program product for generation and implementation of threat vector templates and implementing controls for securing technology resources, the computer program product embodied on a non-transitory computer-readable medium comprising code causing a first apparatus to: electronically receive an analysis request associated with an internal resource from a user device associated with a user;determine that an internal resource in a network requires protection from unauthorized external access;electronically receive information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;apply the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine that the exposure score associated with at least one of the one or more threat vectors is greater than a predetermined threshold;determine one or more additional controls configured for detecting the access to the internal resource, wherein the one or more controls are stored in a controls library;initiate, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls recommended to the user for incorporation;electronically receive, via the established communication link, a user selection of at least one of the one or more additional controls recommended to the user; andincorporate the one or more additional controls selected by the user, wherein incorporating the one or more additional controls lowers the exposure score to below the predetermined threshold. 10. The computer program product of claim 9, wherein the first apparatus is further configured to: determine the one or more types of access associated with each of the one or more threat vectors, wherein the one or more types of access indicate one or more ways in which the internal resource can be accessed via each of the one or more threat vectors. 11. A computerized method for generation and implementation of threat vector templates and implementing controls for securing technology resources, the method comprising: electronically receiving, using a computing device processor, an analysis request associated with an internal resource from a user device associated with a user;determining, using a computing device processor, that an internal resource in a network requires protection from unauthorized external access;electronically receive information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;determining, using a computing device processor, one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;electronically retrieving, using a computing device processor, from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;applying, using a computing device processor, the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;determining, using a computing device processor, a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;determining, using a computing device processor, a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors; determining, using a computing device processor, a strength associated with each of the one or more controls associated with each of the one or more threat vectors;determining, using a computing device processor, an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;determining, using a computing device processor, one or more additional controls;determining, using a computing device processor, a cost associated with the incorporation of each of the one or more additional controls;determining, using a computing device processor, that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; andbased on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporating, using a computing device processor, the one or more additional controls. 12. The method of claim 11, wherein the method further comprises: based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, initiating, using a computing device processor, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls; andelectronically receiving, using a computing device processor, via the established communication link, a user selection of at least one of the one or more additional controls;wherein the one or more additional controls are incorporated in response to the user selection. 13. The method of claim 11, wherein the method further comprises automatically incorporating, using a computing device processor, the one or more additional controls based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls. 14. The method of claim 11, wherein the method further comprises determining, using a computing device processor, the one or more types of access associated with each of the one or more threat vectors, wherein the one or more types of access indicate one or more ways in which the internal resource can be accessed via each of the one or more threat vectors. 15. The method of claim 11, wherein the one or more controls are configured to be regulated to monitor access to the internal resource via at least one of the one or more threat vectors, reducing the exposure score associated with each of the one or more threat vectors. 16. A system for generation and implementation of threat vector templates and implementing controls for securing technology resources, the system comprising: at least one non-transitory storage device;at least one processor; andinstruction code stored in said storage device, said instruction code being executable by the at least one processor and configured to cause said at least one processor to:electronically receive an analysis request associated with an internal resource from a user device associated with a user;determine that an internal resource in a network requires protection from unauthorized external access;electronically receive information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;apply the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;determine one or more additional controls;determine a cost associated with the incorporation of each of the one or more additional controls;determine that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; andbased on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporate the one or more additional controls. 17. The system of claim 16, wherein the instruction code is further configured to cause the at least one processor to: based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, initiate, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls; andelectronically receive, via the established communication link, a user selection of at least one of the one or more additional controls;wherein the one or more additional controls are incorporated in response to the user selection. 18. The system of claim 16, wherein the instruction code is further configured to cause the at least one processor to automatically incorporate the one or more additional controls based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls. 19. The system of claim 16, wherein the instruction code is further configured to cause the at least one processor to determine the one or more types of access associated with each of the one or more threat vectors, wherein the one or more types of access indicate one or more ways in which the internal resource can be accessed via each of the one or more threat vectors. 20. The system of claim 16, wherein the one or more controls are configured to be regulated to monitor access to the internal resource via at least one of the one or more threat vectors, reducing the exposure score associated with each of the one or more threat vectors.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (37)
Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
Johnson Eric A. (Longmont CO) Liss Michael D. (Nederland CO) Jensen Flemming B. (Sandy UT), Apparatus and method for detecting fraudulent telecommunication activity.
Thomson, Allan; Coleman, Christopher D., Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface.
Robert Daniel Maher, III ; Aswinkumar Vishanji Rana ; Milton Andre Lie ; Kevin William Brandon ; Mark Warden Hervin ; Corey Alan Garrow, Content processor.
Pinney Wood, Christopher Paul; Helmsen, John Joseph; Thomson, Allan; Coleman, Christopher D., Cyber threat monitor and control apparatuses, methods and systems.
Hrabik,Michael; Guilfoyle,Jeffrey; Mac Beaver,Edward, Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures.
Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
Bendinelli,Samuel; Herrick,Michael; Keane,John; Macey,Christopher; Tuomenoksa,Mark; Francus,Jerold; Harwood,Jonathan; Shimamoto,Brion; Ferraro,Joseph, Methods and system for providing network services using at least one processor interfacing a base network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.