Compliance validation for services based on user selection

ABSTRACT

Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.

BACKGROUND OF THE INVENTION

The present invention relates generally to the field of servicemanagement, and more particularly to validating configuration andcompliance of services.

Information technology (IT) service management (ITSM) is a process whichaligns IT services (e.g., manages services) to businesses and canprovide a focus on the delivery of best services to an end user. Forexample, ITSM can be utilized in a cloud infrastructure to providevarious enterprise IT services to a customer or other types of endusers. ITSM includes activities and services that are performed by anorganization or part of an organization to plan, deliver, operate, andcontrol IT services offered to customers. The activities and servicesare directed by policies and are organized and structured in processesand supporting procedures. For example, some managed services aregoverned by policies that manage validation of configuration andsecurity compliance for the managed services. Security compliance isutilized to ensure that security risks, governance controls, andvulnerabilities are actively managed throughout the lifecycle of themanaged services. Validation processes can be carried out utilizing achecklist that covers various verifications that correspond to a managedservice.

IT infrastructure library (ITIL) is a set of practices for ITSM thatfocuses on aligning IT services with the needs of businesses. ITILdescribes processes, procedures, tasks, and checklists which are notorganization-specific but can be applied by an organization forestablishing integration with the organization's strategy, deliveringvalue, and maintaining a minimum level of competency. ITIL allows theorganization to establish a baseline from which it can plan, implement,and measure. It is used to demonstrate compliance and to measureimprovement.

It is known to validate domain name services (DNS) or otherconfiguration data for multiple network services provided by a commonmulti-tenant application server by U.S. Pat. No. 8,566,449 by Guest etal., which teaches that the validation system suitably receivesconfiguration data from the multi-tenant application server for each ofthe services provided. The validation system also performs a validationquery to a domain name services or other public service on the networkto obtain public data about each service. The publicly-availableinformation is compared to the data received from the multi-tenantapplication server, and any anomalies are reported and/or repaired asappropriate.

SUMMARY

Aspects of the present invention disclose a method, computer programproduct, and system for validation of services. The method includes oneor more processors receiving a request of a service. The method furtherincludes one or more processors parsing the received request of theservice to identify information included in the received request of theservice. The method further includes one or more processors generating achecklist that corresponds to the received request of the service basedon the identified information, wherein the generated checklist includesconfiguration and security checks that are associated with the receivedrequest of the service. The method further includes one or moreprocessors determining a validation result utilizing the generatedchecklist, wherein the validation result indicates whether the requestedservice is deployed on a corresponding endpoint according to theconfiguration and security checks in the generated checklist.

Another aspect of the present invention discloses the method fordetermining the validation result utilizing the generated checklist. Themethod includes one or more processors identifying one or more scriptfunctions that are associated with the requested service and thecorresponding endpoint, wherein the script functions executeconfiguration and security checks associated with a checklist. Themethod further includes one or more processors executing the one or moreidentified script functions on the corresponding endpoint. The methodfurther includes one or more processors determining a validation resultbased on results returned from the executed script functions.

Another aspect of the present invention discloses the method fordetermining the validation result utilizing the generated checklist. Themethod includes one or more processors identifying one or morevalidation plug-ins that are associated with the requested service. Themethod further includes one or more processors executing the one or moreidentified validation plug-ins. The method further includes one or moreprocessors determining a validation result based on results returnedfrom the executed validation plug-ins.

An additional aspect of the present invention discloses the method forgenerating a checklist that corresponds to the received request of theservice based on the identified information. The method includes one ormore processors identifying one or more checklist questions stored in adatabase that are associated with the identified information included inthe received request of the service. The method further includes one ormore processors generating a checklist that includes the one or moreidentified checklist questions.

An additional aspect of the present invention discloses the method forreceiving the request of the service. The method includes one or moreprocessors receiving a selection of one or more services via one or moreuser interface portals, wherein each service is respectively associatedwith configuration parameters and security parameters.

In another aspect of the present invention the method further includesone or more processors storing results of the configuration and securitychecks included in the generated checklist.

Another aspect of the present invention discloses the method fordetermining the validation result utilizing the generated checklist. Themethod includes one or more processors identifying one or more scriptfunctions that are associated with the requested service and thecorresponding endpoint, wherein the script functions executeconfiguration and security checks associated with a checklist. Themethod further includes one or more processors creating one or morescript functions based on parameters of the corresponding endpoint andthe one or more identified script functions. The method further includesone or more processors executing the one or more created scriptfunctions. The method further includes one or more processorsdetermining a validation result based on results returned from theexecuted script functions.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram of a data processing environment,in accordance with an embodiment of the present invention.

FIG. 2 is a flowchart depicting operational steps of a program forvalidating the configuration and compliance of managed services, inaccordance with an embodiment of the present invention.

FIG. 3 is a flowchart depicting operational steps of a program fordetermining scripts to utilize for validation, in accordance with anembodiment of the present invention.

FIG. 4 is a flowchart depicting operational steps of a program forperforming validation utilizing plug-ins, in accordance with anembodiment of the present invention.

FIG. 5 depicts an example of a request of a managed service input by acustomer, in accordance with an embodiment of the present invention.

FIG. 6 depicts a cloud computing node, according to an embodiment of thepresent invention.

FIG. 7 depicts a cloud computing environment, according to an embodimentof the present invention.

FIG. 8 depicts abstraction model layers, according to an embodiment ofthe present invention.

DETAILED DESCRIPTION

Embodiments of the present invention allow for an automated method andsystem for validating configuration and compliance of services in amulti-tenant cloud computing environment. The method and system iscapable of dynamically composing a checklist question set that can bevalidated based on an order request from a customer. The customer'sorder can be for different managed service providers, which includedifferent configurations and security settings. Various embodiments ofthe present invention allow for validating the configuration andcompliance of services in a multi-tenant cloud service environment.

Embodiments of the present invention recognize that validatingconfiguration and security compliance is an important part of a servicemanagement process and for governance in information technology (IT)delivery organizations. Validating configuration and security compliancehelp ensure that security risks, governance controls, andvulnerabilities are pro-actively managed throughout the life cycle ofservices and that discovered problems and issues are addressed andremediated for quality assurance purposes. Validating configuration andsecurity compliance can be particularly challenging in multi-tenantcloud managed services. Performing validation of configuration andsecurity compliance can be challenging because customers can order avariety of different managed services, and each potential managedservice can have different security and configuration settings. Inaddition, the customers can choose or customize policies for complianceand security/health checking. Further, procedures to gather,consolidate, and validate acceptable evidence for the managed servicescan differ for different managed services, which can lead to increaseddifficulty for users without domain expertise.

Implementation of embodiments of the invention may take a variety offorms, and exemplary implementation details are discussed subsequentlywith reference to the Figures.

The present invention will now be described in detail with reference tothe Figures. FIG. 1 is a functional block diagram illustrating adistributed data processing environment, generally designated 100, inaccordance with one embodiment of the present invention. FIG. 1 providesonly an illustration of one implementation and does not imply anylimitations with regard to the environments in which differentembodiments may be implemented. Many modifications to the depictedenvironment may be made by those skilled in the art without departingfrom the scope of the invention as recited by the claims.

An embodiment of data processing environment 100 includes user portal102, provisioning component 104, endpoints 106 and 108, compliancevalidation engine 110, managed service provider 120, and checklistresult repository 125. In one embodiment, user portal 102, provisioningcomponent 104, endpoints 106 and 108, compliance validation engine 110,managed service provider 120, and checklist result repository 125communicate utilizing network communications. Network communications canbe, for example, a local area network (LAN), a telecommunicationsnetwork, a wide area network (WAN), such as the Internet, or anycombination of the three, and include wired, wireless, or fiber opticconnections. In general, network communications can be any combinationof connections and protocols that will support communications betweenuser portal 102, provisioning component 104, endpoints 106 and 108,compliance validation engine 110, managed service provider 120, andchecklist result repository 125, in accordance with embodiments of thepresent invention. In an example embodiment, data processing environment100 is representative of a multi-tenant cloud computing environment thatprovides managed services (e.g., from a plurality of managed serviceproviders) to users (e.g., in response to a user request).

User portal 102 is a portal that users of a computing environment (e.g.,a cloud computing environment) can utilize to interact with thecomputing environment. In an example embodiment, user portal 102 is auser interface or an application programming interface (API) that isaccessible to customers of a cloud computing environment to requestfunctionalities of the cloud environment. For example, a customer canutilize user portal 102 to request provisioning of a new virtual machine(VM), services on VMs, destroy a VM, etc. In additional embodiments,data processing environment 100 can include additional instances of userportals (not shown). Customers can utilize user portal 102 to select oneor more managed services, each of the managed services having respectiveconfigurations and security settings, each with service configurationparameters and service security parameters

In one embodiment, user portal 102 is a user interface that resides on acomputing device that is accessible to customers of a cloud computingenvironment. A user interface is a program that provides an interfacebetween a user of a computing device and a plurality of applicationsthat reside on the computing device. A user interface refers to theinformation (such as graphic, text, and sound) that a program presentsto a user, and the control sequences the user employs to control theprogram. A variety of types of user interfaces exist. In one embodiment,the user interface is a graphical user interface. A graphical userinterface (GUI) is a type of user interface that allows users tointeract with electronic devices, such as a computer keyboard and mouse,through graphical icons and visual indicators, such as secondarynotation, as opposed to text-based interfaces, typed command labels, ortext navigation. In computing, GUIs were introduced in reaction to theperceived steep learning curve of command-line interfaces which requirecommands to be typed on the keyboard. The actions in GUIs are oftenperformed through direct manipulation of the graphical elements. Inanother embodiment, the user interface is a script or applicationprogramming interface (API).

Provisioning component 104 is a component of a cloud computingenvironment that can fulfill customer requests (e.g., from user portal).In one embodiment, provisioning component 104 can provision services(e.g., VM operations, etc.) on a requested endpoint, such as endpoints106 and 108. In example embodiments, provisioning component 104 canoperate as an application that is hosted on a server computer or othercomputing device (e.g., the same computing device as user portal 102, ona server that hosts compliance validation engine 110, etc.). In anotherembodiment, provisioning component 104 routes a request of a managedservice (e.g., entered by a customer into user portal 102) to compliancevalidation engine 110.

Endpoints 106 and 108 are requested deployment destinations for managedservices. For example, a customer utilizes user portal 102 and requestsa managed service to be executed or deployed on one or more of endpoints106 and 108. In one embodiment, endpoints 106 and 108 are target VMsthat can operate managed services of the cloud computing environment. Invarious embodiments, endpoints 106 and 108 are VMs that are hosted onone or more server computers. In example embodiments, endpoints 106 and108 can be on a desktop computer, a computer server, or any othercomputer systems known in the art. In certain embodiments, endpoints 106and 108 can operate on computer systems utilizing clustered computersand components (e.g., database server computers, application servercomputers, etc.) that act as a single pool of seamless resources whenaccessed by elements of data processing environment 100. A server mayinclude components as depicted and described in further detail withrespect to FIG. 6, in accordance with embodiments of the presentinvention.

Compliance validation engine 110 includes compliance program 200,Representational State Transfer (REST) API 111, managed services plug-inframework 112, checklist generator 113, checklist result consolidator114, script assembler 115, script executor 116, mapping database 117,script repository 118, and checklist set repository 119. In variousembodiments, compliance program 200 utilizes components and modules ofcompliance validation engine 110 (e.g., REST API 111, managed servicesplug-in framework 112, checklist generator 113, checklist resultconsolidator 114, script assembler 115, script executor 116, mappingdatabase 117, script repository 118, and checklist set repository 119).Compliance program 200 validates the configuration and compliance ofmanaged services that are deployed on a cloud computing environment, inaccordance with embodiments of the present invention.

In example embodiments, compliance validation engine 110 can be adesktop computer, a computer server, or any other computer systems knownin the art. In certain embodiments, compliance validation engine 110represents computer systems utilizing clustered computers and components(e.g., database server computers, application server computers, etc.)that act as a single pool of seamless resources when accessed byelements of data processing environment 100 (e.g., provisioningcomponent 104). In general, compliance validation engine 110 isrepresentative of any electronic device or combination of electronicdevices capable of executing computer readable program instructions.Compliance validation engine 110 may include components, as depicted anddescribed in further detail with respect to FIG. 6, in accordance withembodiments of the present invention.

REST API 111 is an API (or another type of application) that can receiveand process service requests. In an example embodiment, compliancevalidation engine 110 receives (e.g., from provisioning component 104 oruser portal 102) a request for a managed service that was input intouser portal 102 (e.g., by a customer). REST API 111 can receive aservice request and validate information included in the request. In oneembodiment, REST API 111 receives a service request and validates theformat of the received request. In other embodiments, REST API 111 canbe an API that is based on a plurality of different architectures (i.e.,other than REST).

Managed services plug-in framework 112 is a component of compliancevalidation engine 110 that manages plug-ins of managed services. Invarious embodiments, the plug-ins of managed services includeinformation on how to perform validations for the configuration ofmanaged services on endpoints. In an example embodiment, managedservices plug-in framework 112 determine relevant plug-ins, which haveknowledge on how to communicate with managed service provider 120.Managed services plug-in framework 112 utilizes identified informationthat is associated with the received request to identify and utilizeplug-ins that are associated with a received request of a managedservice. In various embodiments, the plug-ins are software componentsand/or applications, which may be based on, or include, APIs. Managedservices plug-in framework 112 can register and run plug-ins, which cancommunicate with a remote managed service provider (e.g., managedservice provider 120).

Checklist generator 113 is a component of compliance validation engine110 that generates a checklist that corresponds to a received requestfor a managed service. In one aspect, for each managed service type,checklist generator 113 identifies checklist questions (e.g., inchecklist set repository 119) utilizing mapping database 117. In anotheraspect, for each enabled managed service provider, checklist generator113 initializes a corresponding plug-in (e.g., utilizing managedservices plug-in framework 112) with a corresponding configuration andchecklist question set.

Checklist result consolidator 114 is a component of compliancevalidation engine 110 that utilizes the result sets from checklists togenerate a report. In example embodiments, checklist result consolidator114 determines reports, which are stored in checklist result repository125. In various embodiments, once generated checklists and associatedplug-ins validate deployment of a managed service on an endpoint (e.g.,endpoints 106 and 108), checklist result consolidator 114 creates areport utilizing the resulting information, and the created report(e.g., also storing the associated information) is stored on checklistresult repository 125.

Script assembler 115 is a component of compliance validation engine 110that utilizes managed services plug-in framework 112 to identify andassemble validation scripts that correspond to a received request for amanaged service. In one embodiment, script assembler 115 utilizesconfiguration information that is included in the received request asrun-time parameters to identify and generate scripts. In another aspect,compliance program 200 utilizes plug-ins to parse the configurationinformation from the received request. In an example embodiment, scriptassembler 115 composes script functions with specified configurationparameters based on information from managed service providers.

Script executor 116 is a component of compliance validation engine 110that is capable of executing scripts on an endpoint. For example, scriptexecutor 116 executes scripts assembled by script assembler 115 on oneor more of endpoints 106 and 108. In example embodiments, scriptexecutor 116 transfers scripts to an endpoint, executes the scripts onthe endpoint, and fetches the corresponding results of the scripts. Forexample, script executor 116 can utilize secure shell (SSH), secure copy(SCP), or another approach to transfer scripts to an endpoint.

Mapping database 117 is a repository or database on compliancevalidation engine 110 that includes information that indicatesrelationships between managed services, plug-ins, checklist questions,and scripts. For example, mapping database 117 includes dataassociations between information stored in script repository 118,managed service provider 120, managed services plug-in framework 112,and checklist set repository 119. In example embodiments, mappingdatabase 117 stores associations between managed service types andchecklist questions, managed service type/name and plug-ins, plug-insand scripts, etc.

Script repository 118 is a repository or database on compliancevalidation engine 110 that stores scripts that can be utilized by scriptassembler 115 and script executor 116. In another embodiment, plug-inscan generate scripts based on information that is stored in scriptrepository 118 and store scripts in script repository 118. Checklist setrepository 119 is a repository or database on compliance validationengine 110 that stores checklist questions and correspondinganswers/definitions, which are utilized by checklist generator 113. Inan example embodiment, an individual associated with compliancevalidation engine 110 (e.g., a system administrator, a customer, etc.)and/or a set of procedures defines a set of compliance checklistquestion sets that address IT standards of compliance and regulations,which are stored in checklist set repository 119.

Mapping database 117, script repository 118, and checklist setrepository 119 can be implemented with any type of storage device, forexample, persistent storage, which is capable of storing data that maybe accessed and utilized by compliance validation engine 110, such as adatabase server, a hard disk drive, or a flash memory. In otherembodiments, mapping database 117, script repository 118, and checklistset repository 119 can represent multiple storage devices withincompliance validation engine 110.

Managed service provider 120 is capable of providing a plurality ofmanaged services of the cloud computing environment (e.g., dataprocessing environment 100). In an example embodiment, a customerutilizes user portal 102 to request to deploy a managed service that ishosted by managed service provider 120 on an endpoint, such as endpoints106 and 108. In various embodiments, managed services hosted by managedservice provider 120 include patching, health checking, backupoperations, restoration operations, monitoring, VM operations, accountmanagement, etc.

In example embodiments, managed service provider 120 can be a desktopcomputer, a computer server, or any other computer systems known in theart. In certain embodiments, managed service provider 120 representscomputer systems utilizing clustered computers and components (e.g.,database server computers, application server computers, etc.) that actas a single pool of seamless resources when accessed by elements of dataprocessing environment 100 (e.g., compliance validation engine 110). Ingeneral, managed service provider 120 is representative of anyelectronic device or combination of electronic devices capable ofexecuting computer readable program instructions. Managed serviceprovider 120 may include components as depicted and described in furtherdetail with respect to FIG. 6, in accordance with embodiments of thepresent invention. In another embodiment, managed service provider 120also hosts checklist result repository 125.

Checklist result repository 125 is a database or repository that storesthe results of checklists that are utilized for validation. For example,once a checklist is completed, checklist result consolidator 114consolidates the results and stores the results in checklist resultrepository 125. Checklist result repository 125 can be implemented withany type of storage device, for example, persistent storage, which iscapable of storing data that may be accessed and utilized by compliancevalidation engine 110, such as a database server, a hard disk drive, ora flash memory. In other embodiments, checklist result repository 125can represent multiple storage devices.

FIG. 2 is a flowchart depicting operational steps of compliance program200, a program for validating the configuration and compliance ofmanaged services, in accordance with embodiments of the presentinvention. In an example embodiment, compliance program 200 operates tovalidate the configuration and compliance of managed services that aredeployed on a cloud computing environment.

In step 202, compliance program 200 receives a request of a managedservice. In one embodiment, compliance program 200 receives a request ofa managed service, which a customer (e.g., of data processingenvironment 100) input into user portal 102. In example embodiments, acustomer inputs a request of a managed service into user portal 102. Therequest includes an indication of an endpoint on which to deploy therequested managed service (e.g., endpoints 106 and 108). Provisioningcomponent 104 received the request from user portal 102 and routes therequest to compliance program 200 on compliance validation engine 110.In an additional embodiment, provisioning component 104 also deploys therequested managed service onto the corresponding endpoint. In anotherembodiment, the received request can be a request for multiple managedservices. REST API 111 can receive a service request and validateinformation included in the request. In an example, compliance program200 receives a request for a managed service, and compliance program 200utilizes REST API 111 to validate the format of the received request.

In one embodiment, the request of a managed service includes a type ofservice, a name of service, and a type of action. For example, a requestincludes a service type of “Backup Service,” a service name of “BackupStorage Manager,” and an action type of “Activate Service.” In anotherembodiment, the request of a managed service can include a location ofthe managed service or the managed service provider (e.g., a uniformresource locator (URL)), a username and password that corresponds to thecustomer, and additional parameters associated with the request of aservice.

FIG. 5 depicts sample service request 500, which is an example of arequest of a managed service input by a customer into user portal 102.Sample service request 500 includes fields that provide informationincluding: a service type, a service name, an action type, a URLassociated with a managed service, a username, a password, andadditional parameters associated with the request of a service. In anexample, a customer inputs sample service request 500 into user portal102, and the request is routed, via provisioning component 104, tocompliance program 200 on compliance validation engine 110.

In step 204, compliance program 200 parses the received request toidentify information associated with the received request. For example,compliance program 200 identifies relevant information that includesinformation to utilize when generating a checklist of configurationchecks and security checks for the requested managed service. In anexample embodiment, a customer inputs sample service request 500 intouser portal 102 (step 202), and compliance program 200 identifiesinformation associated with sample service request 500. Complianceprogram 200 can identify information in sample service request 500 thatincludes a service type, a service name, an action type, a locationassociated with a managed service, and additional parameters associatedwith the request of a service. In various embodiments, complianceprogram 200 is capable of parsing and analyzing the format of thereceived request to identify the payload of the request and associatedinformation that is included in the request.

Compliance program 200 parses service requests to identify relevantinformation. In an example embodiment, compliance validation engine 110receives (e.g., from provisioning component 104 or user portal 102) arequest for a managed service that was input into user portal 102 (e.g.,by a customer). In this example, compliance program 200 parses thereceived request to identify information that is associated with thereceived request (e.g., to utilize in creation of a checklist).

In step 206, compliance program 200 generates a checklist thatcorresponds to the received request. In one embodiment, complianceprogram 200 utilizes checklist generator 113 to generate a checklist forthe managed service request based on the identified information (fromstep 204). Checklist set repository 119 is a repository or database oncompliance validation engine 110 that stores checklist questions andcorresponding answers/definitions, which are utilized by checklistgenerator 113. Compliance program 200 utilizes the informationidentified in step 204 and generates one or more checklists based oncorresponding checklist question sets stored in checklist set repository119.

Mapping database 117 maintains data that indicates relationships betweenmanaged services, plug-ins, checklist questions, and scripts. Complianceprogram 200 utilizes mapping database 117 to identify checklistquestions (stored in checklist set repository 119) that correspond tothe received request of a managed service and the correspondingendpoint. For example, compliance program 200 (e.g., utilizing checklistgenerator 113) utilizes information in mapping database 117 thatdescribes relationships between managed service names and/or types(identified in step 204) to corresponding checklist questions and/orsets of checklist questions (stored in checklist set repository 119).

In an additional embodiment, compliance program 200 utilizes checklistgenerator 113 to identify managed service plug-ins that are associatedwith managed service names and/or types and corresponding checklistquestions. In various embodiments, compliance program 200 utilizes theplug-ins to parse and validate the configuration on a managed service onan endpoint. For example, compliance program 200 (e.g., utilizingchecklist generator 113) utilizes information in mapping database 117that describes relationships between managed service names and/or types(identified in step 204) to corresponding managed services plug-ins(provided by managed services plug-in framework 112). In variousembodiments, managed services plug-in framework 112 accesses andutilizes the plug-ins of managed services, which include information onhow to perform validations for the configuration of managed services onendpoints (e.g., validations associated with and included in achecklist).

Compliance program 200 generates a checklist that corresponds to themanaged service request that includes the corresponding checklistquestions and sets of checklist questions (from checklist set repository119). In example embodiments, compliance program 200 utilizes checklistgenerator 113, which generated a checklist of configuration and securitychecks by mapping user defined configuration and security specificationsto corresponding service configuration parameters and service securityparameters.

In one example, compliance program 200 receives a request (in step 202)for a “Backup and Recovery” process. Compliance program 200 utilizeschecklist generator 113 and mapping database 117 to identify one or morerelevant checklist questions in checklist set repository 119. Forexample, compliance program 200 identifies a checklist question of “Hasthe service been scheduled for backups according to the parameters ofthe account's backup policy?” In an additional embodiment, the checklistquestions include an indication of types of evidence that indicateswhether or not validation is passed. For example, compliance program 200identifies evidence of “Output from the backup tool showing the schedulefor the applicable systems.” In addition, the checklist can includeinformation indicating a requested endpoint (e.g., a VM, an operatingsystem, a network application, a subsystem, etc.), action type (e.g.,new, delete, rebuild, clone, etc.), and other types of informationincluded in the received request.

In various aspects of the invention, generating a checklist thatcorresponds to the received request provides advantages of a checklistthat is customized based on user selection of certain managed services.Further, the checklist is generated based on information that is parsedfrom the request that the user provides, which provides the advantage ofbasing the checklist off of the initially provided information.Generating checklists with the flexibility to support customizedon-demand validation in a multi-tenant cloud environment is advantageousand allows different services with different configuration and securityparameters to be validated with increased accuracy.

In step 207, compliance program 200 determines plug-ins that correspondto the requested managed service. In one embodiment, compliance program200 utilizes data relationships in mapping database 117 that indicateplug-ins that correspond to managed services. For example, complianceprogram 200 utilizes data relationships in mapping database 117 todetermine plug-ins that correspond to the requested managed service(e.g., plug-ins utilized by managed services plug-in framework 112). Inan additional embodiment, compliance program 200 utilizes mappingdatabase 117 to determine the plug-ins(s) that relate to the requestedmanaged service and questions in the generated checklist. In an exampleembodiment, compliance program 200 utilizes mapping database 117 toidentify plug-ins that correspond to the requested managed service andthat compliance program 200 can utilize to perform validation based onthe generated checklist (e.g., the plug-ins are identified during thegeneration of the checklist(s)). In various embodiments, the plug-ins ofmanaged services include information on how to perform validations forthe configuration of managed services on endpoints.

In step 208, compliance program 200 determines scripts that correspondto the requested managed service. In one embodiment, compliance program200 utilizes script assembler 115 to determine scripts in scriptrepository 118 that correspond to the requested managed service. In oneaspect, compliance program 200 determines which scripts in scriptrepository 118 relate to questions in the generated checklist for thereceived request (generated in step 206). Compliance program 200determines one or more scripts from script repository 118 thatcompliance program 200 can utilize to validate the question(s) includedin the generated checklist. In another aspect, compliance program 200can utilize one or more identified scripts (from script repository 118)to determine a script that is customized to perform validation for oneor more of the questions in a checklist. The process of determining oneor more scripts that correspond to the requested managed service isdescribed in further detail in FIG. 3.

In an additional embodiment, compliance program 200 utilizes mappingdatabase 117 to determine the script(s) that relate to the requestedmanaged service and questions in the generated checklist. In oneexample, compliance program 200 (e.g., utilizing script assembler 115)utilizes information in mapping database 117 that describesrelationships between managed service names and/or types (identified instep 204) to relevant scripts (stored in script repository 118). Inanother example, compliance program 200 (e.g., utilizing scriptassembler 115) utilizes information in mapping database 117 thatdescribes relationships between managed service plug-ins (e.g.,associated with the generated checklist and from managed servicesplug-in framework 112) to relevant scripts (stored in script repository118).

In step 210, compliance program 200 executes the determined scripts anddetermines a validation result. In one embodiment, compliance program200 utilizes script executor 116 to execute the determined scripts (fromstep 208) and determine a validation result. Compliance program 200executes the scripts on the requested endpoint (e.g., endpoints 106and/or 108). Compliance program 200 can identify the requested endpointin step 204 based on parsing the received request to identify one ormore endpoints included in the request. In an example, complianceprogram 200 transfers the determined scripts to the endpoint (e.g.,utilizing secure shell (SSH), secure copy (SCP), or another approach totransfer scripts) and executes the scripts on the endpoint. Onceexecuted on an endpoint, the scripts provide an indication (i.e., avalidation result) of whether the managed service on the endpoint passesthe configuration and security checks (e.g., validation checks based onthe generated checklist). Based on the results returned from executionof the determined scripts on the endpoint(s), compliance program 200determined a validation result for managed service deployed to theendpoint.

In step 212, compliance program 200 executes validation utilizingdetermined plug-ins and determines a validation result. In oneembodiment, compliance program 200 utilizes plug-ins that are managed bymanaged services plug-in framework 112 and that correspond to therequested managed service. In another aspect, compliance program 200utilizes data relationships in mapping database 117 that indicateplug-ins that correspond to managed services. In various embodiments,the plug-ins of managed services include information on how to performvalidations for the configuration of managed services on endpoints.Compliance program 200 utilizes the plug-ins to determine a validationresult (e.g., whether the managed service on the endpoint passes theconfiguration and security checks). The process of determining avalidation result utilizing plug-ins for the managed service isdescribed in additional detail in FIG. 4.

In decision step 214, compliance program 200 determines whether thevalidation passes. In one embodiment, compliance program 200 utilizesthe validation result determined from executing the determined scripts(from step 210) and the validation result determined from executing theplug-ins (from step 212) to determine whether the validation passes. Ifcompliance program 200 determines that the validation passes, then therequested managed service is validated to have been deployed on therequested endpoint, configured properly on the endpoint, and includedthe proper security features.

In an example embodiment, if both the validation results from step 210and from step 212 indicate a complete pass, then compliance program 200determines that the validation for deploying the managed service doespass. In another example embodiment, in response to determining that thevalidation results from step 210 and from step 212 indicate that acertain percentage of validation checks have passed (e.g., a thresholdpercentage for validation), compliance program 200 determines that thevalidation for deploying the managed service does pass.

In step 216, compliance program 200 provides a report indicating thatthe validation failed. More specifically, in response to determiningthat the validation did not pass (decision step 214, no branch),compliance program 200 provides a report indicating that the validationfailed. In example embodiments, compliance program 200 provides a reportto user portal 102 and/or an account associated with the user thatrequested the managed service (e.g., an account provided in therequest). The provided report can include an indication of why thevalidation failed (e.g., which scripts and/or plugins failed),information included in the request, and other information that isrelevant to the request for the managed service. In another embodiment,compliance program 200 provides a report that includes the generatedchecklist, which can include an indication of which questionspassed/failed.

In step 218, compliance program 200 stores the result of the generatedchecklist. In one scenario, in response to determining that thevalidation does pass (decision step 214, yes branch), compliance program200 stores the result of the generated checklist in checklist resultrepository 125. In another scenario, compliance program 200 determinesthat the validation does not pass (decision step 214, no branch),provides a failure report, and stores the result (i.e., failing result)of the generated checklist in checklist result repository 125. In oneembodiment, compliance program 200 utilizes checklist resultconsolidator 114 to consolidate the results of the one or more checklistquestions (or one or more checklists) utilized in the validation into areport, which compliance program 200 can then send to checklist resultrepository 125.

FIG. 3 is a flowchart depicting script program 300, a program fordetermining scripts to utilize for validation, in accordance withembodiments of the present invention. Script program 300 is a functionof compliance program 200 (depicted in FIG. 2). In an exampleembodiment, script program 300 further describes a process fordetermining scripts that correspond to the requested managed service(i.e., step 208 of compliance program 200). In one embodiment, scriptprogram 300 operates for each managed service provider that is indicatedin the received request.

In step 302, script program 300 identifies a managed service provider.In one embodiment, script program 300 identifies a managed serviceprovider indicated in the request for a managed service. In anotherembodiment, script program 300 identifies a managed service providerthat corresponds to a managed service that is requested in the receivedrequest. In various embodiments, since script program 300 operates foreach managed service provider that is indicated in the received request,script program 300 identifies each managed service provider that isassociated with the received request (based on the multiple possibleiterations of script program 300).

In decision step 304, script program 300 determines whether the endpointrequests validation for the identified managed service provider. In oneembodiment, script program 300 determines whether the endpoint indicatedin the request for the managed service requests to perform validationfor the identified managed service provider (identified in step 302). Inexample embodiments, script program 300 can utilize stored preferencesthat correspond to the endpoint and/or information provided in therequest for the managed service to determine whether validation is tooccur. In response to determining that the endpoint does not request forvalidation to occur (decision step 304, no branch), script program 300returns to step 302 and identifies another managed service providerassociated with the received request (if another is present). In anexample, if script program 300 determines that validation is not tooccur, then script program 300 does not need to perform validation forthe corresponding managed service (e.g., the scripts corresponding tothe managed service do not need to execute).

In step 306, script program 300 identifies script functions andutilities that are associated with the requested managed service and acorresponding endpoint. More specifically, in response to determiningthat the endpoint does request for validation to occur (decision step304, yes branch), script program 300 identifies script functions andutilities that are associated with the requested managed service and acorresponding endpoint. In one embodiment, script program 300 utilizesscript assembler 115 to identify scripts in script repository 118 thatcorrespond to the requested managed service and the correspondingendpoint indicated in the request for the managed service. In anadditional embodiment, script program 300 utilizes mapping database 117to identify the script(s) that relate to the requested managed service,the corresponding endpoint indicated in the request for the managedservice, and questions in the generated checklist. In an example, scriptrepository 118 includes common scripts that are relevant to certaintypes of managed services, certain managed service providers, certainendpoints, etc. Script program 300 utilizes information in the receivedrequest for a managed service to identify the common script functionsand/or utilities that are associated with the requested managed serviceand a corresponding endpoint indicated in the request for the managedservice.

In step 308, script program 300 composes script functions that are basedon parameters of the endpoint. In one embodiment, script program 300utilizes the identified script functions that correspond to the managedservice (e.g., identified in step 306 or a subset of the scriptsidentified in step 306). In another embodiment, script program 300creates one or more script functions for the requested managed servicebased on parameters of the endpoint indicted in the request (e.g., basedon and utilizing one or more script function from script repository 118.In an additional embodiment, script program 300 can store composedscript functions in script repository 118 for potential future use.

FIG. 4 is a flowchart depicting plug-in program 400, a program forperforming validation utilizing plug-ins, in accordance with embodimentsof the present invention. Plug-in program 400 is a function ofcompliance program 200 (depicted in FIG. 2). In an example embodiment,plug-in program 400 further describes a process for determining avalidation result utilizing plug-ins for the managed service (i.e., step212 of compliance program 200). In one embodiment, plug-in program 400operates for each managed service provider that is indicated in thereceived request.

In step 402, plug-in program 400 identifies a managed service provider.In one embodiment, plug-in program 400 identifies a managed serviceprovider indicated in the request for a managed service. In anotherembodiment, plug-in program 400 identifies a managed service providerthat corresponds to a managed service that is requested in the receivedrequest. In various embodiments, since plug-in program 400 operates foreach managed service provider that is indicated in the received request,plug-in program 400 identifies each managed service provider that isassociated with the received request (based on the multiple possibleiterations of plug-in program 400).

In decision step 404, plug-in program 400 determines whether to performvalidation for the identified managed service provider. In oneembodiment, plug-in program 400 determines whether to perform validationfor the identified managed service provider based on parameters of theendpoint indicated in the request for the managed service and/or theidentified managed service provider (from step 402). In an exampleembodiment, plug-in program 400 can utilize stored preferences thatcorrespond to the endpoint and/or information provided in the requestfor the managed service to determine whether validation is to occur. Inanother example embodiment, plug-in program 400 can utilize storedpreferences associated with the identified managed service providerand/or data associations in mapping database 117 to determine whethervalidation is to occur. For example, plug-in program 400 determineswhether managed services plug-in framework 112 is managing one or moreplug-ins that correspond to the requested managed service (e.g., basedon the identified managed service provider) in the received request.

In response to determining not to perform validation for the identifiedmanaged service (decision step 404, no branch), plug-in program 400returns to step 402 and identifies another managed service providerassociated with the received request (if another is present). In anexample, if plug-in program 400 determines that validation is not tooccur, then plug-in program 400 does not need to perform validation forthe corresponding managed service (e.g., utilizing plug-ins associatedwith the requested managed service or identified managed serviceprovider).

In step 406, plug-in program 400 initiates validation plug-ins withprovider access information and configuration parameters. Morespecifically, in response to determining to perform validation for theidentified managed service provider (decision step 404, yes branch),plug-in program 400 initiates validation plug-ins (e.g., on the endpointindicated in the request for the managed service) with provider accessinformation and configuration parameters. In one embodiment, plug-inprogram 400 initiates one or more validation plug-ins (e.g., frommanaged services plug-in framework 112) with corresponding managedservice provider access information and configuration parameters. In anexample, the configuration parameters correspond to the requestedparameters for properly deploying a managed service on an endpoint,which can be included in the request for the managed service and/orassociated with the endpoint or managed service provider. In one aspectof the invention, plug-in program 400 utilizes plug-ins that are managedby managed services plug-in framework 112 and that correspond to therequested managed service. In another aspect, plug-in program 400utilizes data relationships in mapping database 117 that indicateplug-ins that correspond to managed services.

In step 408, plug-in program 400 determines a validation resultutilizing one or more of the initiated plug-ins for the managed service.In one embodiment, plug-in program 400 utilizes the initiated plug-ins(from step 406) to determine a validation result. In variousembodiments, the plug-ins of managed services (e.g., from managedservices plug-in framework 112) include information on how to performvalidations for the configuration of managed services on endpoints.Plug-in program 400 utilizes the plug-ins to determine a validationresult (e.g., whether the managed service on the endpoint passes theconfiguration and security checks). For example, plug-in program 400 canexecute the plug-ins on the endpoint, and the plug-ns provide avalidation result that indicates whether the managed service on theendpoint passes configuration and security checks.

Various aspects of the invention provide advantages of performingvalidation checks for configuration and compliance of services based onuser selection of certain managed services. Further, the validation isperformed utilizing checklists, scripts, and/or plug-ins based oninformation that is parsed from the request that the user provides,which provides the advantage of a customized validation based on theinitially provided information. A customized validation approachprovides flexibility to support customized on-demand validation in amulti-tenant cloud environment and provides advantages of allowingdifferent services with different configuration and security parametersto be validated with increased accuracy.

It is understood in advance that although this disclosure includes adetailed description on cloud computing, implementation of the teachingsrecited herein are not limited to a cloud computing environment. Rather,embodiments of the present invention are capable of being implemented inconjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly release to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface, such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

Referring now to FIG. 6, a schematic of an example of a cloud computingnode is shown. Cloud computing node 10 is only one example of a suitablecloud computing node and is not intended to suggest any limitation as tothe scope of use or functionality of embodiments of the inventiondescribed herein.

Regardless, cloud computing node 10 is capable of being implementedand/or performing any of the functionality set forth hereinabove. Inexample embodiments, cloud computing node 10 is representative ofendpoints 106 and 108, compliance validation engine 110, and managedservice provider 120.

In cloud computing node 10 there is a computer system/server 12, whichis operational with numerous other general purpose or special purposecomputing system environments or configurations. Examples of well-knowncomputing systems, environments, and/or configurations that may besuitable for use with computer system/server 12 include, but are notlimited to, personal computer systems, server computer systems, thinclients, thick clients, hand-held or laptop devices, multiprocessorsystems, microprocessor-based systems, set top boxes, programmableconsumer electronics, network PCs, minicomputer systems, mainframecomputer systems, and distributed cloud computing environments thatinclude any of the above systems or devices, and the like.

Computer system/server 12 may be described in the general context ofcomputer system-executable instructions, such as program modules, beingexecuted by a computer system. Generally, program modules may includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes. Computer system/server 12 may be practiced in distributed cloudcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed cloud computing environment, program modules may be locatedin both local and remote computer system storage media including memorystorage devices.

As shown in FIG. 6, computer system/server 12 in cloud computing node 10is shown in the form of a general-purpose computing device. Thecomponents of computer system/server 12 may include, but are not limitedto, one or more processors or processing unit 16, a memory 28, and a bus18 that couples various system components including memory 28 toprocessing unit 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnects (PCI) bus.

Computer system/server 12 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 12, and it includes both volatileand non-volatile media, removable and non-removable media.

Memory 28 can include computer system readable media in the form ofvolatile memory, such as random access memory (RAM) 30 and/or cache 32.Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 34 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk, such as a CD-ROM, DVD-ROM, or other optical media can be provided.In such instances, each can be connected to bus 18 by one or more datamedia interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the invention.

Program/utility 40, having a set (at least one) of program modules 42,may be stored in memory 28 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 42 generally carry out the functions and/ormethodologies of embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more externaldevice(s) 14, such as a keyboard, a pointing device, a display 24, etc.;one or more devices that enable a user to interact with computersystem/server 12; and/or any devices (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing devices. Such communication can occur via Input/Output(I/O) interface(s) 22. Still yet, computer system/server 12 cancommunicate with one or more networks, such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 20. As depicted, network adapter 20communicates with the other components of computer system/server 12 viabus 18. It should be understood that although not shown, other hardwareand/or software components could be used in conjunction with computersystem/server 12. Examples, include, but are not limited to: microcode,device drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

Referring now to FIG. 7, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 comprises one or morecloud computing node 10 with which local computing devices used by cloudconsumers, such as, for example, personal digital assistant (PDA) orcellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Cloud computingnode 10 may communicate with one another. They may be grouped (notshown) physically or virtually, in one or more networks, such asPrivate, Community, Public, or Hybrid clouds as described hereinabove,or a combination thereof. This allows cloud computing environment 50 tooffer infrastructure, platforms, and/or software as services for which acloud consumer does not need to maintain resources on a local computingdevice. It is understood that the types of computing devices 54A-N shownin FIG. 7 are intended to be illustrative only and that cloud computingnode 10 and cloud computing environment 50 can communicate with any typeof computerized device over any type of network and/or networkaddressable connection (e.g., using a web browser).

Referring now to FIG. 8, a set of functional abstraction layers providedby cloud computing environment 50 (FIG. 7) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 8 are intended to be illustrative only and embodiments of theinvention are not limited thereto. As depicted, the following layers andcorresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage devices 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and compliance program 200.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the invention.The terminology used herein was chosen to best explain the principles ofthe embodiment, the practical application or technical improvement overtechnologies found in the marketplace, or to enable others of ordinaryskill in the art to understand the embodiments disclosed herein.

What is claimed is:
 1. A method for validation of services, the methodcomprising: receiving, by one or more processors, a request of a servicefor deployment on an endpoint; generating, by one or more processors, achecklist that corresponds to the received request of the service basedon information included in the received request, wherein the generatedchecklist includes configuration and security checks that correspond todetermining whether the endpoint meets one or more validation parametersassociated with deploying the requested service on the endpoint;generating, by one or more processors, a set of validation scriptscorresponding to executing the generated checklist and the configurationand security checks that are associated with the received request;executing, by one or more processors, the generated set of validationscripts and one or more validation plug-ins that are associated with therequested service; and determining, by one or more processors, avalidation result utilizing the generated checklist, and resultsreturned from executing the generated set of validation scripts and theone or more validation plug-ins, wherein the validation result indicateswhether to initiate deployment of the requested service on the endpointaccording to the configuration and security checks in the generatedchecklist and the set of validation scripts.
 2. The method of claim 1,wherein determining the validation result utilizing the generatedchecklist and the generated set of validation scripts further comprises:executing, by one or more processors, prior to deployment andinstallation of the requested service on the endpoint, the set ofvalidation scripts on the endpoint; and determining, by one or moreprocessors, a validation result based on results returned from theexecuted set of validation scripts.
 3. The method of claim 1, whereingenerating the set of validation scripts corresponding to executing thegenerated checklist and the configuration and security checks that areassociated with the received request further comprises: assembling, byone or more processors, from a script repository, a plurality ofvalidation scripts that correspond to the requested service; andcomposing, by one or more processors, validation scripts that arecustomized to parameters of the endpoint and validate the parameters ofthe endpoint, wherein the generated set of validation scripts determinewhether the endpoint meets one or more validation parameters associatedwith deploying the requested service on the endpoint by executing on theendpoint to determine characteristics of the endpoint in relation to theone or more validation parameters.
 4. The method of claim 1, whereingenerating a checklist that corresponds to the received request of theservice based information included in the received request furthercomprises: identifying, by one or more processors, one or more checklistquestions stored in a database that are associated with the identifiedinformation included in the received request of the service; andgenerating, by one or more processors, a checklist that includes the oneor more identified checklist questions.
 5. The method of claim 1,wherein receiving the request of the service further comprises:receiving, by one or more processors, a selection of one or moreservices via one or more user interface portals, wherein each service isrespectively associated with configuration parameters and securityparameters; and parsing, by one or more processors, the received requestof the service to identify information included in the received requestof the service.
 6. The method of claim 1, further comprising: storing,by one or more processors, results of the configuration and securitychecks included in the generated checklist.
 7. The method of claim 1,wherein generating the set of validation scripts corresponding toexecuting the generated checklist and the configuration and securitychecks that are associated with the received request further comprises:creating, by one or more processors, one or more executable scriptfunctions based on parameters of the corresponding endpoint and the oneor more identified script functions.
 8. The method of claim 1, whereingenerating the set of validation scripts corresponding to executing thegenerated checklist and the configuration and security checks that areassociated with the received request further comprises: identifying, byone or more processors, a data association that maps a first validationscript, that is stored in the script repository, to the requestedservice.
 9. A computer program product for validation of services, thecomputer program product comprising: one or more computer readablestorage media and program instructions stored on the one or morecomputer readable storage media, the program instructions comprising:program instructions to receive a request of a service for deployment onan endpoint; program instructions to generate a checklist thatcorresponds to the received request of the service based on theidentified information, wherein the generated checklist includesconfiguration and security checks that correspond to determining whetherthe endpoint meets one or more validation parameters associated withdeploying the requested service on the endpoint; program instructions togenerate a set of validation scripts corresponding to executing thegenerated checklist and the configuration and security checks that areassociated with the received request; program instructions to executethe generated set of validation scripts and one or more validationplug-ins that are associated with the requested service; and programinstructions to determine a validation result utilizing the generatedchecklist, and results returned from executing the generated set ofvalidation scripts and the one or more validation plug-ins, wherein thevalidation result indicates whether to initiate deployment of therequested service on the endpoint according to the configuration andsecurity checks in the generated checklist and the set of validationscripts.
 10. The computer program product of claim 9, wherein theprogram instructions to determine the validation result utilizing thegenerated checklist further comprise program instructions to: execute,prior to deployment and installation of the requested service on theendpoint, the set of validation scripts on the endpoint; and determine avalidation result based on results returned from the executed set ofvalidation scripts.
 11. The computer program product of claim 9, whereinthe program instructions to generate the set of validation scriptscorresponding to executing the generated checklist and the configurationand security checks that are associated with the received requestfurther comprise program instructions to: assemble from a scriptrepository, a plurality of validation scripts that correspond to therequested service; and compose validation scripts that are customizedto-parameters of the endpoint and validate the parameters of theendpoint, wherein the generated set of validation scripts determinewhether the endpoint meets one or more validation parameters associatedwith deploying the requested service on the endpoint by executing on theendpoint to determine characteristics of the endpoint in relation to theone or more validation parameters.
 12. The computer program product ofclaim 9, wherein the program instructions to generate a checklist thatcorresponds to the received request of the service based on informationincluded in the received request further comprise program instructionsto: identify one or more checklist questions stored in a database thatare associated with the identified information included in the receivedrequest of the service; and generate a checklist that includes the oneor more identified checklist questions.
 13. The computer program productof claim 9, wherein the program instructions to receive the request ofthe service further comprise program instructions to: receive aselection of one or more services via one or more user interfaceportals, wherein each service is respectively associated withconfiguration parameters and security parameters; and parse the receivedrequest of the service to identify information included in the receivedrequest of the service.
 14. The computer program product of claim 9,wherein the program instructions to generate the set of validationscripts corresponding to executing the generated checklist and theconfiguration and security checks that are associated with the receivedrequest further comprise program instructions to: create one or moreexecutable script functions based on parameters of the correspondingendpoint and the one or more identified script functions.
 15. A computersystem for validation of services, the computer system comprising: oneor more computer processors; one or more computer readable storagemedia; and program instructions stored on the computer readable storagemedia for execution by at least one of the one or more processors, theprogram instructions comprising: program instructions to receive arequest of a service for deployment on an endpoint; program instructionsto generate a checklist that corresponds to the received request of theservice based on the identified information, wherein the generatedchecklist includes configuration and security checks that correspond todetermining whether the endpoint meets one or more validation parametersassociated with deploying the requested service on the endpoint; programinstructions to generate a set of validation scripts corresponding toexecuting the generated checklist and the configuration and securitychecks that are associated with the received request; programinstructions to execute the generated set of validation scripts and oneor more validation plug-ins that are associated with the requestedservice; and program instructions to determine a validation resultutilizing the generated checklist, and results returned from executingthe generated set of validation scripts and the one or more validationplug-ins, wherein the validation result indicates whether to initiatedeployment of the requested service on the endpoint according to theconfiguration and security checks in the generated checklist and the setof validation scripts.
 16. The computer system of claim 15, wherein theprogram instructions to determine the validation result utilizing thegenerated checklist further comprise program instructions to: execute,prior to deployment and installation of the requested service on theendpoint, the set of validation scripts on the endpoint; and determine avalidation result based on results returned from the executed set ofvalidation scripts.
 17. The computer system of claim 15, wherein theprogram instructions to generate the set of validation scriptscorresponding to executing the generated checklist and the configurationand security checks that are associated with the received requestfurther comprise program instructions to: assemble from a scriptrepository, a plurality of validation scripts that correspond to therequested service; and compose validation scripts that are customizedto-parameters of the endpoint and validate the parameters of theendpoint, wherein the generated set of validation scripts determinewhether the endpoint meets one or more validation parameters associatedwith deploying the requested service on the endpoint by executing on theendpoint to determine characteristics of the endpoint in relation to theone or more validation parameters.
 18. The computer system of claim 15,wherein the program instructions to generate a checklist thatcorresponds to the received request of the service based on informationincluded in the received request further comprise program instructionsto: identify one or more checklist questions stored in a database thatare associated with the identified information included in the receivedrequest of the service; and generate a checklist that includes the oneor more identified checklist questions.
 19. The computer system of claim15, wherein the program instructions to receive the request of theservice further comprise program instructions to: receive a selection ofone or more services via one or more user interface portals, whereineach service is respectively associated with configuration parametersand security parameters; and parse the received request of the serviceto identify information included in the received request of the service.20. The computer system of claim 15, wherein the program instructions togenerate the set of validation scripts corresponding to executing thegenerated checklist and the configuration and security checks that areassociated with the received request further comprise programinstructions to: create one or more executable script functions based onparameters of the corresponding endpoint and the one or more identifiedscript functions.