System and method for providing and managing security rules and policies

ABSTRACT

Methods, systems, and computer readable media for providing and managing security rules and policies are described. In some implementations, a method may include receiving, at a crowdsourcing security policy server, a security policy from a first user account, and providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts. The method may also include receiving from one or more of the other user accounts, a security policy rating corresponding to the security policy, and receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account.

TECHNICAL FIELD

Embodiments relate generally to wireless computer networks, and more particularly, to methods, systems and computer readable media for providing and managing security rules and policies.

BACKGROUND

Devices that can access networks via wired or wireless connections have proliferated. As a consequence, the variety of threats, devices, applications, and communication protocols available has also increased. Implementing and maintaining effective security policies in dynamic and rapidly changing network environments can be a challenge for users.

Embodiments were conceived in light of the above mentioned needs, challenges and/or limitations, among other things.

SUMMARY

In general, some implementations may include a system configured to provide and manage security rules and policies.

One or more embodiments may include methods, systems and computer readable media for providing and managing security rules and policies. Some implementations may include a threat management system comprising one or more processors, and a nontransitory computer readable medium coupled to the one or more processors, the nontransitory computer readable medium having stored thereon software instructions that, when executed by the one or more processors, causes the one or more processors to perform operations. The operations may include receiving, at a crowdsourcing security policy server, a security policy from a first user account of the threat management system, and providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts of the threat management system. The operations may also include receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy, and receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account. The operations may further include adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy, and causing the section of the crowdsourced security policy user interface corresponding to the security policy to be displayed.

In some implementations, the security policy may include a set of one or more rules and protocols for a given device. The security policy may include a set of one or more rules and protocols for a given application.

The security policy may include a portion of a security rule. The security policy may include a plurality of security rules. The security policy may include one or more rules applied at an endpoint. The crowdsourcing security policy server may be integrated with the threat management system.

The operations may also include providing for display a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating of security policies in the list of security policies.

Some implementations may include a nontransitory computer readable medium having stored thereon software instructions that, when executed by one or more processors, causes the one or more processors to perform operations. The operations may include receiving, at a crowdsourcing security policy server, a security policy from a first user account of the threat management system, and providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts of the threat management system. The operations may also include receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy, and receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account. The operations may further include adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy, and causing the section of the crowdsourced security policy user interface corresponding to the security policy to be displayed.

In some implementations, the security policy may include a set of one or more rules and protocols for a given device. The security policy may include a set of one or more rules and protocols for a given application.

The security policy may include a portion of a security rule. The security policy may include a plurality of security rules. The security policy may include one or more rules applied at an endpoint. The crowdsourcing security policy server may be integrated with the threat management system.

The operations may also include providing for display a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating of security policies in the list of security policies.

Some implementations may include a method. The method may include receiving, at a crowdsourcing security policy server, a security policy from a first user account, and providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts. The method may also include receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy, and receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account.

The method can further include adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy, and causing the section of the crowdsourced security policy user interface corresponding to the security policy to be displayed.

The security policy may include a set of one or more rules and protocols for a given device. The security policy may include a set of one or more rules and protocols for a given application. The method may also include providing for display a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating of security policies in the list of security policies.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an example threat management environment including a system for providing and managing security rules and policies in accordance with some implementations.

FIG. 2 is a flowchart showing an example method for providing and managing security rules and policies in accordance with some implementations.

FIG. 3 is a flowchart showing an example method for providing and managing security rules and policies in accordance with some implementations.

FIG. 4 is diagram of an example environment for threat management.

FIG. 5 is a diagram of an exemplary threat management system.

FIG. 6 is a diagram of an example computing device configured for providing and managing security rules and policies in accordance with at least one implementation.

FIG. 7 is a flowchart showing an example method of generating a security policy template in accordance with some implementations.

FIG. 8 is a flowchart showing an example of applying a security policy template in accordance with some implementations.

FIG. 9 is a flowchart showing an example method or providing updated security rule and policy recommendations in accordance with some implementations.

DETAILED DESCRIPTION

In general, some implementations may help reduce the burden of developing and distributing effective security policies and parts of security policies though a system for providing and managing security rules and policies. Some implementations can be configured for use within a context or operating environment of network devices and network security devices such as gateways, firewalls, and wireless access points. A security rule and/or policy may include a configuration or setting that configures a device with permissions, access, rules, etc. as to traffic, content, packets, data, applications, devices, etc. that may be allowed or not allowed to perform certain operations or be transmitted within a network. The policy may include one or more rules, or may be a group of policies.

Some implementations may include methods and systems for providing security policy and/or rule template recommendations from a library of rule and policy templates that may be contributed by users, resellers, or other third parties. The templates may be rated via a feedback system to provide users with an indication of the effectiveness of a given security template and/or user account submitting the template. While so-called “crowd-sourcing” and rating systems may exist in other industries and endeavors such as graphic design, branding, eCommerce, etc., the security policy contribution and ratings system features of some implementations described herein apply specifically to templates for security policies, rules and configurations.

In some implementations, security policy, rule, and configuration templates may be provided by internal or external users (e.g., security influencers, IT managers, experts, etc.) and stored in an electronic library or repository. The templates may be downloaded from the repository and configured for use in a network deployment. The templates may be rated and the providers of the templates may be rated. The templates may be tagged with one or more tags that can indicate a scenario or application for which the template may be useful (e.g., “Free Wi-Fi”, “Skype Video”, etc.). The templates may include portions that have been abstracted to make the templates applicable for use across a variety of end user configurations or applications. For example, abstracted portions of the template may be those portions that need to be completed or “filled in” by a user of the template or automatically by another system.

A user's network may be monitored or instrumented to collect data regarding applications, traffic flow, hardware installed, etc. Security templates may be suggested based on collected data about the user's network. The user's network may then be monitored or instrumented after a security policy in the library is applied to measure effectiveness and/or performance of the security policy.

FIG. 1 is a diagram of an example environment 100 in accordance with some implementations. The environment 100 includes a threat management system 102 that includes a security policy server 104, a security policy server database 106, and a cloud administration console 108. The environment 100 also includes a wireless threat management system 110 serving as an intermediary system between one or more user systems 118 and a network 114 (e.g., the Internet). The environment 100 also includes a content creator administration system 116. The environment 100 also includes another wireless threat management system 112 serving an intermediary system between one or more user systems 122 and the network 114.

In operation, the threat management system 102 can provide security policy provision and management according to one or more of the techniques described below in conjunction with FIGS. 2, 3, 7, 8, and 9 . For example, a user of the content creator admin system 116 can create a security policy or rule to help secure the user's network (e.g., user systems 118, wireless threat management system 110 and the network 114 or other devices coupled to the network associated with the wireless threat management system 110). The network associated with the receiver administration system 120 can include a feature that is similar to the network associated with the content creator administration system 116 such that the security policy created by the user of the content creator system 116 may be helpful in securing the network associated with the receiver administration system 120 (e.g., user systems 122, wireless threat management system 112, and the network 114 or other devices coupled to the network associated with the receiver administration system 120).

The security policy or rule created by the user of the content creator administration system 116 can be uploaded to and received by the security policy server of the threat management system 102 and processed according to one or more of the methods described herein to generate a security policy template (e.g., processed to generate a template from a network specific policy) that is stored in the database 106. The security policy template can be provided by the security policy server to the wireless threat management system 112 associated with the receiver administration system 120, as described herein. The template can be configured using the specific details of the network associated with the receiver administration system 120 and applied by the wireless threat management system 112 to help protect the network associated with the receiver administration system 120. A cloud administration console 108 may be used to remotely maintain the security policy server 104 and/or threat management system 102.

FIG. 2 is a flowchart showing an example method 200 for providing and managing security policies. The method begins at 202, where a security policy from a user is received at a security policy server (e.g., 104). The security policy can include a set of one or more rules and/or protocols for a particular device and/or application. For example, there may be a security policy tailored for adding a smart TV to a network, or permitting user devices to access an application such as Snapchat, etc. In another example, a security policy could be one developed for a user network environment of a retail store having one or more point of sale terminals, employee devices (e.g., bring your own device or BYOD), and a Wi-Fi hotspot with Facebook/twitter login that invites customer into the network. The security policy can include ports to be enabled/disabled, access to certain sensors disabled, etc. Processing continues to 204.

At 204, the security policy is provided or made available to other users of the security policy server. For example, the security policy could be automatically processed by the security policy server to remove user network specific details and generate a template that is applicable to other user networks, where the user network specific details are replaced by non-user network specific placeholders in the template. The security policy server can then make the template available to other users of the security policy server. Processing continues to 206.

At 206, a security policy rating corresponding to the security policy is received. For example, the security policy server could receive a security policy rating from a user of the receiver administration system. The rating can be provided by a user, such as a system administrator, or can be provided by an automated system that provides the rating based on a programmatic analysis of the effectiveness of the security policy. Processing continues to 208.

At 208, a user account rating is received, where the user account rating represents a rating of the user account that provided (or shared) the security policy with the other users of the security policy server. The user account rating can be a rating received from one or more users or may be an automatically generated rating based on one or more factors such as rating of security policies submitted by the user account, etc. Processing continues to 210.

At 210, the security policy rating and/or user account rating are added to a user interface section corresponding to the security policy. For example, a user interface displaying crowd-sourced security policies being recommended could include an indication of the policy rating and a rating of the user or user account that submitted the policy. Processing continues to 212.

At 212, the user interface is caused to be displayed. For example, the user interface could be caused to be displayed on the screen of a mobile device or other computer system display device. Processing continues to 214.

At 214, a ranked list of security polices is optionally provided for display in a user interface. For example, a group of security policies relating to a given network feature could be ranked according to one or more of the security policy rating or the user account rating. In some implementations, the system can receive user selection of one or more security policies and/or rules, and apply the selected security policies and/or rules by configuring one or more security policies or rules specifying how to process data communication traffic within the network.

FIG. 3 is a flowchart showing an example method 300 for providing and managing security rules and policies in accordance with some implementations. Processing begins at 302 where network information corresponding to a network is received. For example, the network information can include one or more of network traffic, devices (e.g., device model, hardware and/or software version, etc.), applications, protocols, topology, or the like. The network information can be gathered automatically (e.g., via instrumentation, etc.) or received via user input. Network information can also be dynamic such that the network information automatically detects and updates to reflect a change in one or more parameters of the network information (e.g., network traffic, devices, applications, protocols, topology, etc.). Processing continues to 304.

At 304, the network information is programmatically analyzed. For example, the network information can be programmatically analyzed to determine one or more applications corresponding to network traffic. For example, the network information can be programmatically analyzed to determine protocols used in the network. In another example, the network information is programmatically analyzed to determine that a change has occurred in the network (e.g., new device, new application, installation change such as addition or relocation of access points, etc.). In some implementations, programmatic analysis can include programmatic analysis of automatically inspected network traffic. In some implementations, programmatic analysis can include identifying one or more tags that are descriptive of the user network environment. Processing continues to 306.

At 306, one or more security policies from a library of security policies are programmatically determined based on a result of the programmatic analysis. The library of security policies can include user contributed security policies (e.g., crowd sourced security policies from other network administrators or network users). In some implementations, programmatic analysis can include matching one or more security policies or rules with one or more attributes of the network information (e.g., matching a security policy or rule for a particular device with the presence of that device in the user network attributes based on the programmatic analysis, matching a security policy or rule for a particular protocol or network destination with the presence of that protocol or network traffic associated with the application). For example, if programmatic analysis determines that a file sharing application (e.g., “Box” or “Dropbox” or “Google Drive”) is in use, security policies that allow or enable that file sharing application may be determined as well as security policies that allow updates to that file sharing application. For example, if programmatic analysis determines that remote access to certain devices is allowed for administration, a security policy that restricts remote access to certain source computers may be determined. Programmatically determining can also include selecting a number of security policies based on a respective security policy rating and/or user account rating of the security policies. Programmatically determining can include matching the one or more tags identified during the programmatic analysis. Processing continues to 308.

At 308, a recommendation of one or more security policies is provided to a user. For example, a user interface may display the one or more security policies optionally ranked by security policy rating and/or user account rating. Using the above example, if the use of “Dropbox” application is detected on the network, security policies that relate to the “Dropbox” application may be provided. If the use of “Google Drive” application is detected on the network, security policies that relate to “Google Drive” may be provided. Security policies may be provided, for example, in a user interface, or for example in a portal for the threat management facility 102 (FIG. 1 ). Security policies may be provided, for example, in a web interface, or using a configuration utility for an administration system such as the content creator administration system 116 or Receiver administration system 120 of FIG. 1 .

FIG. 4 illustrates an environment for threat management. Specifically, FIG. 4 depicts a block diagram of a threat management facility 400 providing protection to one or more enterprises, networks, locations, users, businesses, etc. against a variety of threats—a context in which the techniques described above may usefully be deployed. The threat management facility 400 may be used to protect devices and assets (e.g., IoT devices or other devices) from computer-generated and human-generated threats. For example, a corporation, school, web site, homeowner, network administrator, or other entity may institute and enforce one or more policies that control or prevents certain network users (e.g. employees, residents, users, guests, etc.) from accessing certain types of applications, devices, resources generally or in a particular manner. Policies may be created, deployed and managed, for example, through the threat management facility 400, which may update and monitor network devices, users, and assets accordingly.

The threat of malware or other compromises may be present at various points within a network 402 such as laptops, desktops, servers, gateways, communication ports, handheld or mobile devices, IoT devices, firewalls. In addition to controlling or stopping malicious code, a threat management facility 400 may provide policy management to control devices, applications, or users that might otherwise undermine productivity and network performance within the network 402.

The threat management facility 400 may provide protection to network 402 from computer-based malware, including viruses, spyware, adware, Trojans, intrusion, spam, policy abuse, advanced persistent threats, uncontrolled access, and the like. In general, the network 402 may be any networked computer-based infrastructure or the like managed by a threat management facility 402, such as an organization, association, institution, or the like, or a cloud-based facility that is available for subscription by individuals. For example, the network 402 may be a corporate, commercial, educational, governmental, or other network 402, and may include multiple networks, computing resources, and other facilities, may be distributed among more than one geographical locations, and may include administration 434, a firewall 438A, an appliance 440A, a server 442A, network devices 448A-B, clients 444A-D, such as IoT devices or other devices. It will be understood that any reference herein to a client or client facilities may include the clients 444A-D shown in FIG. 4 and vice-versa.

The threat management facility 400 may include computers, software, or other computing facilities supporting a plurality of functions, such as security management facility 422, policy management facility 412, update facility 420, a definitions facility 414, network access rules facility 424, remedial action facility 428, detection techniques facility 430, testing facility 418, a threat research facility 432, and the like. In embodiments, the threat protection provided by the threat management facility 400 may extend beyond the network boundaries of the network 402 to include clients 444D (or client facilities) that have moved into network connectivity not directly associated with or controlled by the network 402. Threats to client facilities may come from a variety of sources, such as from network threats 404, physical proximity threats 410, secondary location threats 408, and the like. Clients 444A-D may be protected from threats even when the client 444A-D is not directly connected or in association with the network 402, such as when a client 444E—F moves in and out of the network 402, for example when interfacing with an unprotected server 442C through the Internet 454, when a client 444F is moving into a secondary location threat 408 network such as interfacing with components 440B, 442B, 448C, 448D that are not protected, and the like.

The threat management facility 400 may use or may be included in an integrated system approach to provide network 402 protection from a plurality of threats to device resources in a plurality of locations and network configurations. The threat management facility 400 may also or instead be deployed as a stand-alone solution. For example, some or all of the threat management facility 400 components may be integrated into a server or servers at a remote location, for example in a cloud computing facility. For example, some or all of the threat management facility 400 components may be integrated into a firewall, gateway, or access point within or at the border of the network 402. In some embodiments, the threat management facility 400 may be integrated into a product, such as a third-party product, e.g., through an application programming interface, which may be deployed on endpoints, on remote servers, on internal servers or gateways for a network, or some combination of these.

The security management facility 422 may include a plurality of elements that provide protection from malware to network 402 device resources in a variety of ways including endpoint security and control, email security and control, web security and control, reputation-based filtering, control of unauthorized users, control of guest and non-compliant computers, and the like. The security management facility 422 may include a local software application that provides protection to one or more network 402 devices. The security management facility 422 may have the ability to scan client facility files for malicious code, remove or quarantine certain applications and files, prevent certain actions, perform remedial actions and perform other security measures. This may include scanning some or all of the files stored on the client facility or accessed by the client facility on a periodic basis, scanning an application when the application is executed, scanning data (e.g., files or other communication) in transit to or from a device, etc. The scanning of applications and files may be performed to detect known or unknown malicious code or unwanted applications.

The security management facility 422 may provide email security and control. The security management facility 422 may also or instead provide for web security and control, such as by helping to detect or block viruses, spyware, malware, unwanted applications, and the like, or by helping to control web browsing activity originating from client devices. In an embodiment, the security management facility 422 may provide for network access control, which may provide control over network connections. In addition, network access control may control access to virtual private networks (VPN) that provide communications networks tunneled through other networks. The security management facility 422 may provide host intrusion prevention through behavioral based protection, which may guard against known or unknown threats by analyzing behavior before or while code executes. The security management facility 422 may provide reputation filtering, which may target or identify sources of code.

In embodiments, the security management facility 422 may provide secure VLANs in the wireless network (e.g., according to the methods described above regarding FIGS. 2 and 3 ). This aspect of the security management facility may also take place on the firewall 438A (e.g., an access point) or appliance 440A.

In general, the security management facility 422 may support overall security of the network 402 using the various techniques described above, optionally as supplemented by updates of malicious code information and so forth for distribution across the network 402.

The administration facility 434 may provide control over the security management facility 422 when updates are performed. Information from the security management facility 422 may also be sent from the enterprise back to a third party, a vendor, or the like, which may lead to improved performance of the threat management facility 400.

The threat management facility 400 may include a policy management facility 412 configured to take actions, such as to block applications, users, communications, devices, and so on based on determinations made. The policy management facility 412 may employ a set of rules or policies that determine network 402 access permissions for a client 444. In an embodiment, a policy database may include a block list, a black list, an allowed list, a white list, or the like, or combinations of the foregoing, that may provide a list of resources internal or external to the network 402 that may or may not be accessed by client devices 444. The policy management facility 412 may also or instead include rule-based filtering of access requests or resource requests, or other suitable techniques for controlling access to resources consistent with a corresponding policy.

In some embodiments, the policy management facility 412 may include or be part of a security policy server (e.g., 104 described above). The policy management facility 412 may include policies to permit or deny access, to take remedial action, to issue alerts, and so on based on particular reliability index determinations.

The policy management facility 412 may also or instead provide configuration policies to be used to compare and control the configuration of applications, operating systems, hardware, devices, and/or a network associated with the network 402. An evolving threat environment may dictate timely updates, and thus an update management facility 420 may also be provided by the threat management facility 400. In addition, a policy management facility 412 may require update management (e.g., as provided by the update facility 420 herein described). In embodiments, the update management facility 420 may provide for patch management or other software updating, version control, and so forth.

The security facility 422 and policy management facility 412 may push information to the network 402 and/or a given client 444. The network 402 and/or client 444 may also or instead request information from the security facility 422 and/or policy management facility 412, network server facilities 442, or there may be a combination of pushing and pulling of information. In an embodiment, the policy management facility 412 and the security facility 422 management update modules may work in concert to provide information to the network 402 and/or client 444 facility for control of applications, devices, users, and so on.

As threats are identified and characterized, the threat management facility 400 may create updates that may be used to allow the threat management facility 400 to detect and remediate malicious software, unwanted applications, configuration and policy changes, and the like. The threat definition facility 414 may contain threat identification updates, also referred to as definition files. A definition file may be a virus identity file that may include definitions of known or potential malicious code. The virus identity definition files may provide information that may identify malicious code within files, applications, or the like. The definition files may be accessed by security management facility 422 when scanning files or applications within the client facility for the determination of malicious code that may be within the file or application. A definition management facility may include a definition for a neural network or other recognition engine. A definition management facility 414 may provide timely updates of definition files information to the network, client facilities, and the like.

The security management facility 422 may be used to scan an outgoing file and verify that the outgoing file is permitted to be transmitted per the enterprise facility 402 rules and policies. By checking outgoing files, the security management facility 422 may be able to discover malicious code infected files that were not detected as incoming files.

The threat management facility 400 may provide controlled access to the network 402. A network access rules facility 424 may be responsible for determining if a client facility 444 application should be granted access to a requested network resource. In an embodiment, the network access rules facility 424 may verify access rights for client facilities 444 to or from the network 402 or may verify access rights of computer facilities to or from external networks. When network access for a client facility is denied, the network access rules facility 424 may send an information file to the client facility, e.g., a command or command file that the remedial action facility 428 may access and take action upon. The network access rules facility 424 may include one or more databases that may include a block list, a black list, an allowed list, a white list, a reputation list, an unacceptable network resource database, an acceptable network resource database, a network resource reputation database, or the like. The network access rules facility 424 may incorporate rule evaluation. Rule evaluation may, for example, parse network access requests and apply the parsed information to network access rules. The network access rule facility 424 may also or instead provide updated rules and policies to the enterprise facility 402.

When a threat or policy violation is detected by the threat management facility 400, the threat management facility 400 may perform or initiate remedial action through a remedial action facility 428. Remedial action may take a variety of forms, such as terminating or modifying an ongoing process or interaction, issuing an alert, sending a warning to a client or administration facility 434 of an ongoing process or interaction, executing a program or application to remediate against a threat or violation, record interactions for subsequent evaluation, and so forth. The remedial action may include one or more of blocking some or all requests to a network location or resource, performing a malicious code scan on a device or application, performing a malicious code scan on the client facility 444, quarantining a related application (or files, processes or the like), terminating the application or device, isolating the application or device, moving a process or application code to a sandbox for evaluation, isolating the client facility 444 to a location or status within the network that restricts network access, blocking a network access port from a client facility 444, reporting the application to an administration facility 434, or the like, as well as any combination of the foregoing.

Remedial action may be provided as a result of a detection of a threat or violation. The detection techniques facility 430 may include tools for monitoring the network or managed devices within the network 402. The detection techniques facility 430 may provide functions such as monitoring activity and stored files on computing facilities. Detection techniques, such as scanning a computer's stored files, may provide the capability of checking files for stored threats, either in the active or passive state. Detection techniques such as streaming file management may be used to check files received at the network, a gateway facility, a client facility, and the like.

Verifying that the threat management facility 400 detects threats and violations to established policy, may require the ability to test the system, either at the system level or for a particular computing component. The testing facility 418 may allow the administration facility 434 to coordinate the testing of the security configurations of client facility computing facilities on a network. For example, the administration facility 434 may be able to send test files to a set of client facility computing facilities to test the ability of the client facility to determine acceptability of the test file. After the test file has been transmitted, a recording facility may record the actions taken by the client facility in reaction to the test file. The recording facility may aggregate the testing information from the client facility and report the testing information to the administration facility 434. The administration facility 434 may be able to determine the level of preparedness of the client facility 444 based on the reported information. Remedial action may be taken for any of the client facilities 444 as determined by the administration facility 434.

The threat management facility 400 may provide threat protection across the network 402 to devices such as clients 444, a server facility 442, an administration facility 434, a firewall 438, a gateway, one or more network devices (e.g., hubs and routers 448, a threat management or other appliance 440, any number of desktop or mobile users, and the like. As used herein the term endpoint may refer to any compute instance running on a device that can source data, receive data, evaluate data, buffer data, process data or the like (such as a user's desktop computer, laptop, IoT device, server, etc.). This may, for example, include any client devices as well as other network devices and the like within the network 402, such as a firewall or gateway (as a data evaluation endpoint computer system), a laptop (as a mobile endpoint computer), a tablet (as a hand-held endpoint computer), a mobile phone, or the like. The term endpoint may also or instead refer to any final or intermediate source or destination for data within a network 402. The endpoint computer security facility 452 may be an application locally loaded onto any corresponding computer platform or computer support component, either for local security functions or for management by the threat management facility 400 or other remote resource, or any combination of these.

The network 402 may include a plurality of client facility computing platforms on which the endpoint computer security facility 452 is installed. A client facility computing platform may be a computer system that is able to access a service on another computer, such as a server facility 442, via a network. The endpoint computer security facility 452 may, in corresponding fashion, provide security in any suitable context such as among a plurality of networked applications, for a client facility connecting to an application server facility 442, for a web browser client facility connecting to a web server facility 442, for an e-mail client facility retrieving e-mail from an Internet 454 service provider's mail storage servers 442 or web site, and the like, as well as any variations or combinations of the foregoing.

The network 402 may include one or more of a variety of server facilities 442, such as application servers, communications servers, file servers, database servers, proxy servers, mail servers, fax servers, game servers, web servers, and the like. A server facility 442, which may also be referred to as a server facility 442 application, server facility 442 operating system, server facility 442 computer, or the like, may be any device(s), application program(s), operating system(s), or combination of the foregoing that accepts client facility connections in order to service requests from clients 444. In embodiments, the threat management facility 400 may provide threat protection to server facilities 442 within the network 402 as load conditions and application changes are made.

A server facility 442 may include an appliance facility 440, where the appliance facility 440 provides specific services to other devices on the network. Simple server facility 442 appliances may also be utilized across the network 402 infrastructure, such as switches, routers, hubs, gateways, print servers, modems, and the like. These appliances may provide interconnection services within the network 402, and therefore may advance the spread of a threat if not properly protected.

A client facility 444 may be protected from threats from within the network 402 using a local or personal firewall, which may be a hardware firewall, software firewall, or combination, that controls network traffic to and from a client. The local firewall may permit or deny communications based on a security policy. Another component that may be protected by an endpoint computer security facility 452 is a network firewall facility 438, which may include hardware or software, in a standalone device or integrated with another network component, that may be configured to permit, deny, or proxy data through a network 402.

The interface between the threat management facility 400 and the network 402, and through the appliance facility 440 to embedded endpoint computer security facilities, may include a set of tools that may be the same or different for various implementations, and may allow each network administrator to implement custom controls. In embodiments, these controls may include both automatic actions and managed actions. The administration facility 434 may configure policy rules that determine interactions. The administration facility 434 may also establish license management, which in turn may further determine interactions associated with licensed applications. In embodiments, interactions between the threat management facility 400 and the network 402 may provide threat protection to the network 402 by managing the flow of network data into and out of the network 402 through automatic actions that may be configured by the threat management facility 400 for example by action or configuration of the administration facility 434.

Client facilities 444 within the network 402 may be connected to the network 402 by way of wired network facilities 448A or wireless network facilities 448B. Mobile wireless facility clients 444, because of their ability to connect to a wireless network access point, may connect to the Internet 454 outside the physical boundary of the network 402, and therefore outside the threat-protected environment of the network 402. Such a client 444, if not for the presence of a locally-installed endpoint computer security facility 452, may be exposed to a malware attack or perform actions counter to network 402 policies. Thus, the endpoint computer security facility 452 may provide local protection against various threats and policy violations. The threat management facility 400 may also or instead be configured to protect the out-of-enterprise facility 402 mobile client facility (e.g., the clients 444) through interactions over the Internet 454 (or other network) with the locally-installed endpoint computer security facility 452. Thus mobile client facilities that are components of the network 402 but temporarily outside connectivity with the network 402 may be provided with the threat protection and policy control the same as or similar to client facilities 444 inside the network 402. In addition, mobile client facilities 444 may receive the same interactions to and from the threat management facility 400 as client facilities 444 inside the enterprise facility 402, such as by receiving the same or equivalent services via an embedded endpoint computer security facility 452.

Interactions between the threat management facility 400 and the components of the network 402, including mobile client facility extensions of the network 402, may ultimately be connected through the Internet 454 or any other network or combination of networks. Security-related or policy-related downloads and upgrades to the network 402 may be passed from the threat management facility 400 through to components of the network 402 equipped with the endpoint computer security facility 452. In turn, the endpoint computer security facility 452 components of the enterprise facility 102 may upload policy and access requests back across the Internet 454 and through to the threat management facility 400. The Internet 454 however, is also the path through which threats may be transmitted from their source, and an endpoint computer security facility 452 may be configured to protect a device outside the network 402 through locally-deployed protective measures and through suitable interactions with the threat management facility 400.

Thus, if the mobile client facility were to attempt to connect into an unprotected connection point, such as at a secondary location 408 hat is not a part of the network 402, the mobile client facility 444 may be required to request network interactions through the threat management facility 400, where contacting the threat management facility 400 may be performed prior to any other network action. In embodiments, the client facility's 444 endpoint computer security facility 452 may manage actions in unprotected network environments such as when the client facility (e.g., client 444F) is in a secondary location 408, where the endpoint computer security facility 452 may dictate what applications, actions, resources, users, etc. are allowed, blocked, modified, or the like.

The secondary location 408 may have no endpoint computer security facilities 452 as a part of its components, such as its firewalls 438B, servers 442B, clients 444G, hubs and routers 448C—D, and the like. As a result, the components of the secondary location 408 may be open to threat attacks, and become potential sources of threats, as well as any mobile enterprise facility clients 444B—F that may be connected to the secondary location's 408 network. In this instance, these components may now unknowingly spread a threat to other connected to the network 402.

Some threats do not come directly from the Internet 454. For example, a physical proximity threat 410 may be deployed on a client device while that device is connected to an unprotected network connection outside the enterprise facility 402, and when the device is subsequently connected to a client 444 on the network 402, the device can deploy the malware or otherwise pose a threat. In embodiments, the endpoint computer security facility 452 may protect the network 402 against these types of physical proximity threats 410, for instance, through scanning any device prior to allowing data transfers, through security validation certificates, through establishing a safe zone within the network 402 to receive data for evaluation, and the like.

FIG. 5 illustrates an exemplary threat management system 500 as contemplated herein. In general, the threat management system may include an endpoint 502 for example, a laptop, or a device such as an IoT device, an access point 504, a server 506 and a threat management facility 508 in communication with one another directly or indirectly through a data network 505, for example, as generally described above. Each of the entities depicted in FIG. 5 , may, for example, be implemented on one or more computing devices such as the computing device described with reference to FIG. 6 .

A number of systems may be distributed across these various components to support threat management, for example, including a coloring system 510, a key management system 512 and a heartbeat system 514, each of which may include software components executing on any of the foregoing system components, and each of which may communicate with the threat management facility 508 or an endpoint threat protection agent 520 executing on an endpoint 502, on an access point or firewall 504, or on a server 506 to support improved threat detection and remediation.

The coloring system 510 may be used to label or ‘color’ software objects for improved tracking and detection of potentially harmful activity. The coloring system 510 may, for example, label files, executables, processes, network communications, data sources and so forth with any suitable label. A variety of techniques may be used to select static and/or dynamic labels for any of these various objects, and to manage the mechanics of applying and propagating coloring information as appropriate. For example, a process may inherit a color from an application that launches the process. Similarly a file may inherit a color from a device when it is created or opened by a device, and/or a process may inherit a color from a file that the process has opened. More generally, any type of labeling, as well as rules for propagating, inheriting, changing, or otherwise manipulating such labels, may be used by the coloring system 510 as contemplated herein. A color may be or may be based on one or more reliability index values, the meeting of one or more reliability index thresholds, the rate of change of one or more reliability index values, etc. A color of a device may be used in a security policy. A color of a process, a file, a network request, and so on may be based on a color of a device, and that color may be used in a security policy.

The key management system 512 may support management of keys for the endpoint 502 in order to selectively permit or prevent access to content on the endpoint 502 on a file-specific basis, a process-specific basis, an application-specific basis, a user-specific basis, or any other suitable basis in order to prevent data leakage, and in order to support more fine-grained and immediate control over access to content on the endpoint 502 when a security compromise is detected. Thus for example, if a particular process executing on the endpoint is compromised, or potentially compromised or otherwise under suspicion, keys to that process may be revoked in order to prevent, e.g., data leakage or other malicious activity. In embodiments, keys on device may be revoked based on one or more reliability index values, the meeting of one or more reliability index thresholds, the rate of change of one or more reliability index values, etc.

The heartbeat system 514 may be used to provide periodic or aperiodic information from an endpoint about system health, security, status, etc. A heartbeat may be encrypted or plaintext, or some combination of these, and may be communicated unidirectionally (e.g., from the endpoint 502 to the threat management facility 508) or bidirectionally (e.g., between the endpoint 502 and the server 506, or any other pair of system components) on a useful schedule.

In implementations, the access point or firewall 504 may use the heartbeat 514 to report a potential or actual compromise of a device based, for example, on a color of the device, or based on one or more reliability index values, the meeting of one or more reliability index thresholds, the rate of change of one or more reliability index values, etc. The heartbeat 514 from the access point 504 may be communicated to a server 506, for example, and administrative server or directly or indirectly to a threat management facility 508. If the endpoint device 502 has an endpoint threat protection facility 520, the facility 520 may be used to further investigate the status, or to take remedial measures, again by communication using the secure heartbeat 514.

In general, these various monitoring and management systems may cooperate to provide improved threat detection and response. For example, the coloring system 510 may be used to evaluate when a particular device is potentially compromised, and a potential threat may be confirmed based on an interrupted heartbeat from the heartbeat system 514. The key management system 512 may then be used to revoke keys to a process so that no further files can be opened, deleted or otherwise modified. More generally, the cooperation of these systems enables a wide variety of reactive measures that can improve detection and remediation of potential threats to an endpoint.

In some implementations, the coloring 510 and/or the heartbeat 514 may be used to assign a device to a VLAN. In some implementations, information about the status of the device, for example, health status, may be provided by a security module, and the status of the device may be used to assign the device to VLAN. For example, the endpoint threat detection 520 may monitor the device. A change in health status as reported by the threat detection 520 may be used to request that an access point 502 assign or reassign a device to a VLAN. For example, a device that meets security requirements may continue to use or may be assigned to a particular VLAN and a device that has one or more flagged security issues, such as software that is not up to date, a modified operating system, identified malware, etc., may be assigned or reassigned to another VLAN. The heartbeat 514 may be used as a secure communication channel to report the status of the endpoint.

In some implementations, the access point 504 may receive status information from the endpoint, and assign or reassign the endpoint 502 to the VLAN based on the status information. In some implementations, the server 506 or the threat management facility 508 may receive information about the endpoint 502 and direct the wireless access point to assign or re-assign the endpoint 502 to a VLAN. In some implementations, the threat management facility 508 may direct the endpoint 502 to a VLAN without the cooperation of the access point, or by notifying the access point 504 and the endpoint 502 of the change at the same time.

In some implementations, in connection with the assignment or reassignment of an endpoint 502 to a VLAN, the threat management facility 508 or the server 506 provides an authentication credential to the endpoint 502, which the endpoint can, in turn, present to the access point 504 for VLAN access.

In some implementations, an access point or firewall 504 may color the endpoint 502 based at least in part on activity or behavior of the endpoint 502. The coloring may be used by the access point or firewall 504 to assign or reassign the endpoint to VLAN. For example, if a color that indicates a potential compromise is assigned to the endpoint 502, the endpoint may be assigned or reassigned to a VLAN. Likewise, the assignment to a VLAN may be used as a color to consider the behavior of the VLAN in context.

FIG. 6 is a diagram of an example computing device 600 in accordance with at least one implementation. The computing device 600 includes one or more processors 602, nontransitory computer readable medium or memory 604, I/O interface devices 606 (e.g., wireless communications, etc.) and a network interface 608. The computer readable medium 604 may include an operating system 608, a security policy provision and management application 610 for providing and managing security policies (e.g., crowd sourced security policies) and a data section 612 (e.g., for storing security policies, security rules, rankings, ratings, etc.).

In operation, the processor 602 may execute the application 610 stored in the computer readable medium 604. The application 610 may include software instructions that, when executed by the processor, cause the processor to perform operations for providing and managing security rules and policies in accordance with the present disclosure (e.g., performing one or more of the operations described in one or more of FIGS. 2, 3, 7, 8, and 9 ).

The application program 610 may operate in conjunction with the data section 612 and the operating system 608. The device 600 may communicate with other devices (e.g., a wireless access point) via the I/O interfaces 606.

FIG. 7 is a flowchart showing an example method 700 of generating a security policy template in accordance with some implementations. Processing begins at 702, where a security policy is received. The security policy may contain user network specific information. Processing continues to 704.

At 704, the security policy is programmatically analyzed to determine user network specific information. For example, the security policy can be programmatically analyzed to determine machine names, types of networks, protocols, applications, devices, ports, communication protocols, data transfer direction (e.g., send and/or receive), deny/allow, etc. Processing continues to 706.

At 706, a template is generated based on the security policy by substituting user network specific information with corresponding non-user network specific placeholders. For example, a specific machine name in a security policy could be substituted with a placeholder such as MACHINE_NAME_1 or the like in a corresponding security policy template to be placed into a library of security policies on the security policy server.

FIG. 8 is a flowchart showing an example method 800 of applying a security policy template in accordance with some implementations. Processing begins at 802, where an indication of a selection of a security policy template is received. The selection can be based on input from a user via user interface, from acceptance by a user of a recommended security policy template, or from an automatic selection of a security policy template. Processing continues to 804.

At 804, user network information is received. The user network information can include network information that has been manually provided by a user (e.g., a system administrator or other user) or network information that has been automatically determined. The network information can include details or information about the user network that may be useful for applying a security policy such as devices, device details, applications, protocols, topology or other aspects of the user network. Processing continues to 806.

At 806, non-user network specific placeholders in the security policy template are resolved using the network information to generate a security policy with user network specific information. The resolving can include replacing the placeholders with actual values determined from the network information.

FIG. 9 is a flowchart showing an example method 900 of providing updated security rule and policy recommendations in accordance with some implementations. Processing begins at 902, where a new security policy template and/or a change to a user network is detected. For example, a new security policy template may be detected that is related to a security policy in use by a user network, or a change to a security policy in use may be detected. Also, a change to a user network may be detected such as a new device being used, a new application being used, etc. In addition or as an alternative to changes in the user network, calendar dates and/or times may be detected that are linked to changes in security profiles. For example, on a high traffic day such as “Black Friday” or “Cyber Monday”, user networks may want to have a configuration that is applied for those special event days and then the security policy reverts back to a baseline policy when the special event ends. Processing continues to 904.

At 904, a security policy update recommendation is provided to a user associated with the user network. For example, the recommendation may be provided via a user interface, a message (e.g., email, text message, etc.), or a notification on a device. If the user accepts the recommendation, the system updates the security policy. Processing continues to 906.

At 906, the user network is monitored for security policy performance and network changes. The security policy performance monitoring can be used to determine if a security policy is effective and should remain in use, or if a security policy is not as effective as desired and a replacement or updated security policy may be considered. The performance monitoring results may be used as training data for a machine learning model that can adapt to changing configuration profiles. Performance monitoring can include instrumenting the user network to extract information that can permit a system to automatically determine the effectiveness of a security policy or rule received from the security policy server.

In some implementations, when an attack on one or more networks is detected (e.g., a zero day attack), a security policy or rule corresponding to the attack may be recommended to one or more of the user systems associated with a security policy server. For example, all of the members of a crowd sourcing security policy system may receive an alert or a recommendation to install a new security policy or rule to prevent or handle the zero day attack.

It will be appreciated that one or more of 202-214, 302-308, 702-706, 802-806, and 902-906 may be repeated, performed in a different order or performed periodically.

In some implementations, network information may not be known (e.g., when a network is being configured or deployed for the first time). In these circumstances, characteristics of the customer or user network can be used to make security policy recommendations and/or select an initial security policy template. For example, the security policy server could use information such as type of business or organization (e.g., sales office, hotel, etc.), number of access points, vendor or supplier of access points in an initial specification of the user environment to match a security policy template to the user.

Some implementations can include a security policy deploy undue or rollback operation. This feature permits users to revert back to an earlier version of the security policy when the user's current security policy is associated with undesirable effects.

It will be appreciated that the modules, processes, systems, and sections described above may be implemented in hardware, hardware programmed by software, software instructions stored on a nontransitory computer readable medium or a combination of the above. A system as described above, for example, may include a processor configured to execute a sequence of programmed instructions stored on a nontransitory computer readable medium. For example, the processor may include, but not be limited to, a personal computer or workstation or other such computing system that includes a processor, microprocessor, microcontroller device, or is comprised of control logic including integrated circuits such as, for example, an Application Specific Integrated Circuit (ASIC). The instructions may be compiled from source code instructions provided in accordance with a programming language such as Java, C, C++, C#.net, assembly or the like. The instructions may also comprise code and data objects provided in accordance with, for example, the Visual Basic™ language, or another structured or object-oriented programming language. The sequence of programmed instructions, or programmable logic device configuration software, and data associated therewith may be stored in a nontransitory computer-readable medium such as a computer memory or storage device which may be any suitable memory apparatus, such as, but not limited to ROM, PROM, EEPROM, RAM, flash memory, disk drive and the like.

Furthermore, the modules, processes systems, and sections may be implemented as a single processor or as a distributed processor. Further, it should be appreciated that the steps mentioned above may be performed on a single or distributed processor (single and/or multi-core, or cloud computing system). Also, the processes, system components, modules, and sub-modules described in the various figures of and for embodiments above may be distributed across multiple computers or systems or may be co-located in a single processor or system. Example structural embodiment alternatives suitable for implementing the modules, sections, systems, means, or processes described herein are provided below.

The modules, processors or systems described above may be implemented as a programmed general purpose computer, an electronic device programmed with microcode, a hard-wired analog logic circuit, software stored on a computer-readable medium or signal, an optical computing device, a networked system of electronic and/or optical devices, a special purpose computing device, an integrated circuit device, a semiconductor chip, and/or a software module or object stored on a computer-readable medium or signal, for example.

Embodiments of the method and system (or their sub-components or modules), may be implemented on a general-purpose computer, a special-purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element, an ASIC or other integrated circuit, a digital signal processor, a hardwired electronic or logic circuit such as a discrete element circuit, a programmed logic circuit such as a PLD, PLA, FPGA, PAL, or the like. In general, any processor capable of implementing the functions or steps described herein may be used to implement embodiments of the method, system, or a computer program product (software program stored on a nontransitory computer readable medium).

Furthermore, embodiments of the disclosed method, system, and computer program product (or software instructions stored on a nontransitory computer readable medium) may be readily implemented, fully or partially, in software using, for example, object or object-oriented software development environments that provide portable source code that may be used on a variety of computer platforms. Alternatively, embodiments of the disclosed method, system, and computer program product may be implemented partially or fully in hardware using, for example, standard logic circuits or a VLSI design. Other hardware or software may be used to implement embodiments depending on the speed and/or efficiency requirements of the systems, the particular function, and/or particular software or hardware system, microprocessor, or microcomputer being utilized. Embodiments of the method, system, and computer program product may be implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the function description provided herein and with a general basic knowledge of the software engineering and computer networking arts.

Moreover, embodiments of the disclosed method, system, and computer readable media (or computer program product) may be implemented in software executed on a programmed general purpose computer, a special purpose computer, a microprocessor, a network server or switch, or the like.

It is, therefore, apparent that there is provided, in accordance with the various embodiments disclosed herein, methods, systems and computer readable media for providing and managing security rules and policies.

While the disclosed subject matter has been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be, or are, apparent to those of ordinary skill in the applicable arts. Accordingly, Applicants intend to embrace all such alternatives, modifications, equivalents and variations that are within the spirit and scope of the disclosed subject matter. It should also be understood that references to items in the singular should be understood to include items in the plural, and vice versa, unless explicitly stated otherwise or clear from the context. Grammatical conjunctions are intended to express any and all disjunctive and conjunctive combinations of conjoined clauses, sentences, words, and the like, unless otherwise stated or clear from the context. Thus, the term “or” should generally be understood to mean “and/or” and so forth. 

What is claimed is:
 1. A threat management system comprising: one or more processors; and a nontransitory computer readable medium coupled to the one or more processors, the nontransitory computer readable medium having stored thereon software instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving, at a security policy server, a security policy from a first user account of the threat management system; providing a crowdsourced security policy user interface that includes a section corresponding to the security policy configured to make the security policy available for use by other user accounts of the threat management system; receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy; receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account; adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy; causing the section of the security policy user interface corresponding to the security policy to be displayed; and providing for display, a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating.
 2. The threat management system of claim 1, wherein the security policy includes a set of one or more rules and protocols for a given device.
 3. The threat management system of claim 1, wherein the security policy includes a set of one or more rules and protocols for a given software application.
 4. The threat management system of claim 1, wherein the security policy includes a portion of a security rule.
 5. The threat management system of claim 1, wherein the security policy includes a plurality of security rules.
 6. The threat management system of claim 1, wherein the security policy includes one or more security rules that are suitable for application at an endpoint.
 7. The threat management system of claim 1, wherein the threat management system further comprises the security policy server.
 8. A nontransitory computer readable medium having stored thereon software instructions that, when executed by one or more processors, cause the one or more processors to perform operations including: receiving, at a crowdsourcing security policy server, a security policy from a first user account; providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts; receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy; receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account; adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy; causing the section of the crowdsourced security policy user interface corresponding to the security policy to be displayed; and providing for display, a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating of security policies in the list of security policies.
 9. The nontransitory computer readable medium of claim 8, wherein the security policy includes a set of one or more rules and protocols for a given device.
 10. The nontransitory computer readable medium of claim 8, wherein the security policy includes a set of one or more rules and protocols for a given application.
 11. The nontransitory computer readable medium of claim 8, wherein the security policy includes a portion of a security rule.
 12. The nontransitory computer readable medium of claim 8, wherein the security policy includes a plurality of security rules.
 13. The nontransitory computer readable medium of claim 8, wherein the security policy includes one or more rules applied at an endpoint.
 14. The nontransitory computer readable medium of claim 8, wherein the crowdsourcing security policy server is integrated with a threat management system.
 15. A method comprising: receiving, at a crowdsourcing security policy server, a security policy from a first user account; providing a crowdsourced security policy user interface including a section corresponding to the security policy configured to make the security policy available for use by other user accounts; receiving, from one or more of the other user accounts, a security policy rating corresponding to the security policy; receiving, from one or more of the other user accounts, a user account rating corresponding to the first user account; adding the security policy rating and the user account rating to the section of the crowdsourced security policy user interface corresponding to the security policy; causing the section of the crowdsourced security policy user interface corresponding to the security policy to be displayed; and providing for display, a list of security policies ranked according to one or more of a respective security policy rating and a respective user account rating of security policies in the list of security policies.
 16. The method of claim 15, wherein the security policy includes a set of one or more rules and protocols for a given device.
 17. The method of claim 15, wherein the security policy includes a set of one or more rules and protocols for a given application.
 18. The method of claim 15, further comprising: receiving user selection of the security policy; and applying the security policy by configuring one or more rules specifying how to process data communication traffic within a network associated with the crowdsourcing security policy server. 