Identifying recommended feature sets for software under development

ABSTRACT

Systems, methods, and software described herein provide for identifying recommended feature sets for new security applications. In one example, a method of providing recommended feature sets for a new security application includes identifying a request for the new security application, and determining a classification for the new security application. The method further provides identifying related applications to the new security application based on the classification, and identifying a feature set for the new security application based on features provided in the related applications.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/206,632, filed Jul. 11, 2016, which application claims the benefitof, and priority to, U.S. Provisional Patent Application No. 62/190,356,entitled “RECOMMENDED SECURITY ACTION FEATURE SETS”, filed Jul. 9, 2015,which applications are hereby incorporated by reference in theirentirety for all purposes.

TECHNICAL FIELD

Aspects of the disclosure are related to computing environment security,and in particular to recommending security action feature sets.

TECHNICAL BACKGROUND

An increasing number of data security threats exist in the moderncomputerized society. These threats may include viruses or other malwarethat attacks the local computer of the end user, or sophisticatedcyber-attacks to gather data and other information from the cloud orserver based infrastructure. This server based infrastructure includesreal and virtual computing devices that are used to provide a variety ofservices to user computing systems, such as data storage, cloudprocessing, web sites and services, amongst other possible services. Toprotect applications and services, various antivirus, encryption, andfirewall implementations may be used across an array of operatingsystems, such as Linux and Microsoft Windows.

In some implementations, computing networks may employ a variety ofcomputing assets with different hardware and software configurations toprovide the desired operation of the network. These computing assets mayinclude end user computing devices, host computing devices, virtualmachines, switches, routers, and the like. However, as more computingassets are initiated within the computing network, it may becomedifficult and burdensome for an administrator to manage the differentsoftware configurations of the computing assets, and apply securityactions to the various security applications in the network. Further, itmay be difficult for a developer to generate new security applications,such as firewalls, antivirus applications, and ticketing applicationsthat can efficiently be applied within a computing environment withother applications.

Overview

The technology disclosed herein offers enhancements for providing aunified feature set for applications from multiple distributors. In oneexample, a method of providing recommended feature sets for a newsecurity application includes identifying a request for the new securityapplication, and determining a classification for the new securityapplication. The method further provides identifying relatedapplications to the new security application based on theclassification, and identifying a feature set for the new securityapplication based on features provided in the related applications.

In another implementation, a computing apparatus includes one or morenon-transitory computer readable storage media, a processing systemoperatively coupled with the one or more non-transitory computerreadable storage media, and program instructions stored on the one ormore non-transitory computer readable storage media that direct theprocessing system to identify a request for a new security application.The program instructions further direct the processing system todetermine a classification for the new security application, identifyrelated applications to the new security application based on theclassification, and identify a feature set for the new securityapplication based on features provided in the related applications.

In a further implementation, an apparatus includes one or morenon-transitory computer readable storage media, and program instructionsstored on the one or more non-transitory computer readable storage mediathat direct a processing system to identify a request for a new securityapplication. The program instructions further direct the processingsystem to determine a classification for the new security application,identify related application to the new security application based onthe classification, and identify a feature set for the new securityapplication based on features provided in the related applications.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the disclosure can be better understood with referenceto the following drawings. While several implementations are describedin connection with these drawings, the disclosure is not limited to theimplementations disclosed herein. On the contrary, the intent is tocover all alternatives, modifications, and equivalents.

FIG. 1 illustrates a system to recommend feature sets to applicationdevelopers according to one implementation.

FIG. 2 illustrates a method of recommending feature sets to applicationdevelopers according to one implementation.

FIG. 3 illustrates an operational scenario of recommending feature setsto application developers according to one implementation.

FIG. 4 illustrates a feature set data structure to manage features for aplurality of applications according to one implementation.

FIG. 5 illustrates an operational scenario of applying a unified commandin a computing environment according to one implementation.

FIG. 6 illustrates an available features data set according to oneimplementation.

FIG. 7 illustrates a feature set computing system to provide applicationfeature sets for new applications according to one implementation.

TECHNICAL DISCLOSURE

The various examples disclosed herein provide recommended feature setsfor new security applications. In particular, security applicationdevelopers, such as firewall, antivirus, data backup, and ticketingapplication developers, often develop applications for a variety ofdistributors and hardware platforms. Because the applications aregenerated by different distributors, the processes required to implementparticular security actions may be different for each application. Forexample, the processes required to block an internet protocol (IP)address with a first firewall from a first distributor may be differentthan the processes required to block the same IP address on a secondfirewall from a second distributor.

Here, to unify the ability of administrators and users to implementparticular security actions within computing assets of a computingenvironment, a feature set database is provided that recommends featuresthat should be implemented across all applications of a particularclassification. Accordingly, when multiple distributors produce anapplication for the same classification, an administrator or user mayreadily apply the same feature to the various applications executing intheir network. For example, if a user required an operation to block anIP address in firewalls from two separate software providers in responseto identifying a security threat associated with the IP address, theuser may be able to rely on the same feature for the first firewall andthe second firewall to implement a required action.

In some implementations, the features in the feature sets employed bythe applications may be associated unified application language that canbe used by the administrators to apply a security action acrossapplications from multiple distributors. This unified applicationlanguage permits an administrator or an automated administration systemto issue a single command that can then be translated by each of theapplications into operations to implement the desired action. Forexample, once an action is specified by an administrator, the action maybe translated by each of the applications configured with the associatedfeature into the necessary procedures to implement the action within theadministrator's environment. Thus, if the administrator specified to“block IP address X on computing assets Y and Z,” the action may betranslated by the security applications on assets Y and Z into thenecessary operations and processes to implement the block IP operation.

To further demonstrate the operations of providing recommended featuresets, FIG. 1 is provided. FIG. 1 illustrates a system 100 to recommendfeature sets to application developers according to one implementation.System 100 includes developer system 120, feature set database 130, andcommunication network 140. Feature set database 130 further includesapplications 140-143, which are representative of the various featuresets for the individual applications.

In operation, developers generate applications that provide varioussecurity operations for computing networks of corporations, smallbusinesses, partnerships, and other similar organization networks. Theseapplications include various security responsibilities, such as firewallapplications, data backup and storage applications, security threat andsoftware ticket applications, or any other similar application. Indevelopment of these applications, the developers often generatecommands and other prompts that allow administrators and users to changesettings and preferences of the applications to provide the desiredfunctionality. For example, in a firewall application, a developer mayprovide processes to block IP addresses, block domain names, blockwebsites with particular content, or any other similar operation.

Here, developer system 120 may communicate with feature set database 130via communication network 140 to retrieve information about feature setsfor other applications of the same classification. These feature setsallow applications from different software distributors to provide thesame security actions for administrators and users of computingnetworks. In particular, computing networks may include a variety ofcomputing assets, such as end user computing devices, host computingdevices, servers, routers, switches, and other similar computing assetsthat each operate using a variety of software configurations.Accordingly, because of the different computing assets and/or thedifferent requirements of the assets, various security software fromdifferent distributors may be employed throughout the network. Ratherthan requiring the administrators of the network to learn and manage thedifferent features of each of the applications, feature set database 130may allow the developers of the applications to share their feature setswith one another, permitting the developers to apply a single featureset across a plurality of applications within the same classification.

In some implementations, the feature sets for the applications may beassociated with a unified syntax or language that can be used toimplement the required actions across applications from a variety ofdistributors. For example, referring to a firewall security application,an administrator at an administration console may request to block aparticular IP address across all computing assets in a computingnetwork. Rather than requiring the administrator to define the processesfor each individual asset, a single command may be generated by theadministrator that can be translated into the necessary processes forthe individual assets. This translation is accomplished via theapplications on the assets, wherein the feature sets implemented for theapplication translate the command into the required operations orprocedures to implement the desired action. Accordingly, even thoughassets in the network may include firewalls from different softwaredistributors, based on the shared feature set, administrators mayquickly and efficiently apply security actions to the assets.

Referring now to FIG. 2, FIG. 2 illustrates a method 200 of recommendingfeature sets to application developers according to one implementation.The processes of FIG. 2 are described with references to system 100 fromFIG. 1.

As illustrated, method 200 includes identifying a request for a newsecurity application (201). As illustrated in FIG. 1, developer system120 is responsible for generating new application 110. New application110 may comprise a firewall application, a data backup application, anantivirus application, an administration ticket application, or someother similar security application. During development of theapplication, developer system 120 may generate a request, which isidentified by feature set database 130, requesting features that shouldbe included in new application 110. Once the request is identified,method 200 further includes determining a classification for newsecurity application 110 (202). In some implementations, the requesttransferred from developer system 120 to feature set database 130includes an administrator defined classification for new application110. For example, a user interface may be provided to developer system120 wherein the user interface permits the user to select aclassification of the application.

Based on the classification, method 200 also includes identifyingrelated applications to the new security application based on theclassification (203), and identifying a feature set for the new securityapplication based on features provided in the related applications(204). For example, in response to the request for new application 110,feature set database 130 may identify one or more applications thatapply to the classification, and identify a feature set that is used forthe one or more applications. Once the feature set is identified,feature set database 130 may provide the feature set to developer system120. In some examples, to provide the feature set, feature set database130 may generate a display for the developer at developer system 120.This display may be included in an HTML file or some other display thatcan be provided to the administrator. In other examples, to provide thefeature set to developer system 120, feature set database 130 mayprovide the feature set as data across communication network 140,wherein developer system 120 is configured to generate a display basedon the data.

To generate feature set database 130, software distributors maysubscribe to a platform that allows cohesive management of securityactions in computing environments. Specifically, because computingenvironments may include a variety of software and hardwareconfigurations, the platform may allow administrators and users of thevarious environments to implement security actions using a unifiedplatform. Thus, rather than requiring the administrator to remember thenecessary security procedures for each of the applications in theenvironments, a single command may be translated into the necessaryprocedures for each of the computing assets. As new applications arecreated and added to feature set database 130, new features areidentified and can be provided to developers creating the nextapplication. For example, if a firewall application added a feature to“block domain,” then feature set database 130 may also be updated toreflect the new feature. Once updated, new application developers mayidentify what new features are available, and implement the new featureswithin their application.

In some implementations, the features that are provided in the featureset for new application 110 may be associated with unified commands thatcan be used to implement actions across applications from multipledevelopers. For example, a feature requirement for an antivirusapplication may be “delete process.” Rather than requiring anadministrator to identify the required operations to remove a process onmultiple assets with multiple security applications when a threat isidentified, a unified command syntax associated with each feature may beused that is translated by the individual antivirus applications. Thus,the same command could be used to implement an action on a firstapplication, and the same command could be used to implement the sameaction on a second application, even when the applications on differentassets require different operations to implement the desired action.

Referring to FIG. 3, FIG. 3 illustrates an operational scenario 300 ofrecommending feature sets to application developers according to oneimplementation. Operational scenario 300 includes developer 305,developer system 320, and feature database 330. Feature database 330 isrepresentative of a device or system of devices configured to managefeatures for various security applications.

As illustrated in FIG. 3, developer 305 is generating a new application310 on developer system 320. This new application may include a firewallapplication, a data backup application, an antivirus application, orsome other type of application. During the development of theapplication, a query, at step 1, may be generated from developer system320 to feature database 330 to gather possible features that can beimplemented in new application 310. In response to the query, featuredatabase 330 may determine, at step 2, a feature set to be provided todeveloper system 320 based on applications similar to new application310. In the present example, feature database 330 identifies thatsimilar applications 340-341 have a similar classification to newapplication 310, whereas other applications 342-343 are not relevant tonew application 310. As a result, features that are implemented withinsimilar applications 340-341 are provided, at step 3, to developersystem 320, allowing developer 305 to implement the features withinapplication 310. For example, if new application 310 were an antivirusapplication for end user computing systems, feature database 330 mayidentify other antivirus applications generated by other developers forend user computing systems. Once the applications are identified,features, such as “remove process,” “monitor process,” and other similarantivirus features may be identified within the related applications andprovided as a feature set to developer 305.

In some implementations, feature database 330 may be associated with aplatform that allows administrators of various computing networks toimplement security actions across computing assets within the individualcomputing networks. In particular, computing networks, such as thosefound in corporations, small businesses, partnerships, and the like mayemploy assets with various software and hardware configurations. Thesesoftware and hardware configurations may include security applicationsfrom various developers and distributors. Here, by providing featuredatabase 330, the various security software distributors that areemployed within the network may be able to employ the same features orfunctionality, allowing an administrator to quickly generate an actionacross computing assets with different software or hardwareconfigurations. For example, two computing assets may employ a differentfirewall application within a computing network. Accordingly, when anadministrator of the network attempts to implement a security action,rather than requiring the user to provide the individual operations foreach computing asset, a single feature may be selected by theadministrator and implemented within the network. Thus, an administratormay select an action for the assets, such as “block IP address A,”wherein the action (provided as a unified command for the particularfeature) is translated by the individual applications into the requiredoperations to be implemented on the desired asset.

In some examples, developer 305 may desire to implement a new featurewithin application 310 in addition to the features provided from similarapplications 340-341. Accordingly, once a new feature is added to theapplication, the features of application 310 may be supplied to featuredatabase 330, allowing other application developers to use the samefeatures. For example, feature database 330 may already include featuresfor a firewall application to block a particular IP address and block aparticular domain name. However, developer 305 may develop a new featureto block particular content. Accordingly, the new feature to blockcontent may be supplied to the next firewall developer. In someimplementations, the features of each of the applications may beautomatically determined when a new application is submitted to thefeature database. However, in other examples, to generate the featuredatabase, users may be required to provide specific information abouteach of the features implemented in the application. This informationabout the features may include a feature name, a code operation toimplement the operation in the unified syntax for the applications inthe same classification, the hardware and software configurationsupported by the application, or any other similar information.

FIG. 4 illustrates a feature set data structure 400 to manage featuresfor a plurality of applications according to one implementation. Featureset data structure 400 is an example data structure that can be used bya feature set database to store various features for securityapplications that can be employed in computing networks. Feature setdata structure 400 comprises a table with application names 410,application types 411, and features 412-413. Application names 410includes applications 420-427, and application types 411 includeapplication (app) types 430-432. Although illustrated as a table in thepresent example, it should be understood that feature sets for each ofthe applications may be stored in one or more arrays, linked lists, orother similar data structures, including combinations thereof.

As described herein, security applications may be deployed in acomputing network to provide various operations for the computing assetsof the computing network. The security applications may include, but arenot limited to, data backup applications, firewall applications,antivirus applications, encryption applications, and the computingassets may include server computing systems, end user computing systems,switches, routers, and the like. Because different computing assetswithin the computing network may deploy security software from differentdistributors, an administrator of the computing network may be requiredto understand the required processes to implement a desired action ineach of the computing assets.

Here, a database may be provided to the software distributors, allowingthe distributors to employ and share feature sets for the securitysoftware. Accordingly, rather than requiring the administrator toremember the processes and available feature sets for each of thesecurity applications, the applications may share security actionsfeatures, allowing an administrator to deploy a security action acrossassets with various software and hardware configurations.

Referring still to FIG. 4, developers of a security application mayquery a database computing system to determine the current availablefeature set for security applications with a similar classification.This classification may include a firewall classification, an encryptionclassification, a data backup classification, an antivirusclassification, or any other similar security classification. Based onthe request and the classification, the database may identify thefeatures that should be provided for the application, and supply thefeatures to the developer to implement the features in the newapplication. Here, based on the classification supplied by theadministrator, the feature set database may use the classification todetermine an application type from application types 411. Accordingly,if the classification specified application type 430, applications420-423 would be identified for the new application, along with thefeatures from features 412-413. The features identified from feature setdata structure 400 may then be supplied to the inquiring developer to beimplemented in the new application. Although illustrated as listing theapplications individually, it should be understood that in someimplementations the applications for each application type may beaggregated prior to the inquiry. Accordingly, the aggregated featuresets may be supplied to a developer for each request.

In some implementations, the developer of the application may implementnew features for their application. For example, a current feature setfor firewall applications may include block IP address functions andblock domain name functions. However, a developer may find it desirableto implement a function to block websites based on content providedwithin the website. Once the function is implemented and the applicationis complete, feature set information for the application may be added tofeature set data structure 400, allowing future developers to implementsimilar functionality for their applications.

By allowing developers to implement the same feature sets,administrators may more quickly and efficiently apply security actionswithin a computing network. For example, an administrator may desire toblock a particular IP address on multiple computing assets with varyingsoftware configurations. Rather the requiring the administrator todefine the security process for each computing asset, the shared featureset may allow the administrator to define a block IP address actionusing a unified command language or other unified command structure.Once defined, the action could be applied to the individual assets usingthe shared feature set for the firewall applications.

Although not illustrated in feature set data structure 400, it should beunderstood that the data structure or structures managed by the databasemay also include unified syntax information. This unified syntax permitsapplications to implement the same features and simplify the operationsperformed by an administrator of a network. In at least oneimplementation, each of the applications with a particular feature maybe capable of translating a command in the unified syntax andimplementing the desired operation. For example, applications 420-423with application type 430 may each be capable of implementing aparticular feature. Thus, when an administrator initiates a command fora computing network, each application in applications 420-423 maytranslate the command in the unified format into the required operationsto implement the desired command. By providing the unified syntaxcommands associated with a particular feature, a developer may ensurethat each of the functions are capable of being implemented using theshared syntax. Accordingly, a single command may be translated torequired actions across various applications, wherein the applicationsmay share a feature set.

FIG. 5 illustrates an operational scenario 500 of applying a unifiedcommand in a computing environment according to one implementation.Operational scenario 500 includes administration system 520 withadministrator 505 and computing environment 530. Computing environment530 further includes assets 540-541 with applications 550-551. Althoughillustrated with two assets in the present implementation, it should beunderstood that any number of assets may be provided in an organizationscomputing network. These assets may include routers, end user computingsystems, servers, switches, virtual machines, or any other similarcomputing system of a computing network.

As described herein, developers may develop a variety of securityapplications for an organization network to provide various operationswithin the network. These security applications may be developed for aparticular hardware configuration or configurations, or may be developedfor specific software configuration or configurations. To providecoherent management of each of the applications within the environment,the applications may be generated based on a feature set that isdetermined from other related applications. Thus, although applicationsmay be generated by different developers, and may target differenthardware and/or software configurations, the applications within thesame classification can implement the same actions using the sameincluded features. In some implementations, each of the features mayfurther include a unified input and unified output, such that a unifiedcommand can be used to implement a security action on a firstapplication and a second application.

Here, administrator 505 approves, at step 1, command 510 to beimplemented within computing environment 530. In some implementations,command 510 may comprise a command that is written in a unified syntaxby administrator 505. In other implementations, administration system520 may be provided with a suggested input command as part of a responseto a security threat. Once provided, administrator 505 may approvecommand 510 to be implemented in assets of the computing network. Oncethe command is approved, administration system 520 may transfer, at step2, the command over a network to assets 540 and 541 to receive thecommand. Once the command is received by each of the assets, the assetstranslate and implement, at step 3, the command to provide the desiredoperation in computing environment 530. In the particular example ofFIG. 5, because each application of applications 550-551 includesfeature 560, the feature permits the application to identify the commandassociated with the feature and translate the command into the requiredoperations to implement the desired feature.

For example, administrator 505 may select a command to block an IPaddress on assets 540-541. Responsive to the command that is receivedfrom the administration system, applications 550-551, which may comprisefirewalls in the present example, may receive the command and translatethe “block IP address” command into the required operations to block theaddress on the asset. These operations may include different operationsdue to the hardware or software configuration of assets 540-541,different operations due to developer preference, or any other similarreason for different operations. However, by permitting shared featureson each of the applications to be implemented using a common input orcommand, an administrator is not required to implement the individualoperations on each of the assets of the environment.

FIG. 6 illustrates an available features data set 600 according to oneimplementation. Available features data set 600 includes columns forfeature identifiers 610, command structures 611, descriptions 612, andother information 613. Although illustrated as a table in the presentexample, it should be understood that any other similar data structureor presentation element may be provided for a developer with availablefeatures for an application. Further, while demonstrated with fourfields in the columns of FIG. 6, it should be understood that any numberof fields may be presented with information about the available featuresfor a new security application.

In operation, a developer may desire to generate a new securityapplication that can be implemented alongside one or more otherapplications of the same application type. For example, a developer maydevelop a firewall application for a specific hardware and/or softwareconfiguration to be implemented with similar functionality as otherfirewalls for other hardware and software configurations. To develop theapplication, a query may be generated and identified by a feature setdatabase, wherein the feature set database identifies applications ofthe same categorization and identifies features from the applications ofthe same categorization. Once the features are identified as part of anavailable feature set, the features are provided to the developer,permitting the developer to implement the desired features in a newapplication.

Here, the feature set provided includes identifiers 620-627 and commands630-637. Commands 630-637 are representative of a unified syntax orcommand structure that is used by an administration system inimplementing a desired security action within a computing environment.For example, a firewall may include a unified command to “block IPaddress A on asset X”, wherein A represents the IP address and Xrepresents the particular asset. Accordingly, with the commandstructure, a developer may write a series of operations to translate therequest in the command format into the required operations to block therequired IP address. In the present implementation, in addition to theidentifiers and the commands, available features data structure 600further includes descriptions 612 and other information 613.Descriptions 612 may provide further descriptor information about aparticular commands structure or the defined operations that must becompleted by the command. Other information 613 may include informationabout the other applications that have implemented the particularfeature, the number of other applications that have implemented thefeature, the names of developers that have implemented the feature, orany other similar information about each of the features identifiedusing identifiers 620-627.

Based on the information provided in data structure 600, the developermay select one or more of the features and implement them within the newapplication. Accordingly, once the application is deployed, the featuresmay be implemented in the new application in a similar manner to otherapplications of similar type. In the particular example, when a featureis implemented, an administrator may use any of commands 630-637 toimplement a desired action, wherein the commands may be translated bythe new application into the required operations to implement theaction.

FIG. 7 illustrates a feature set computing system 700 to provideapplication feature sets for new applications. Feature set computingsystem 700 is representative of a computing system that may be employedin any computing apparatus, system, or device, or collections thereof,to suitably implement the feature set and feature databases describedherein in FIGS. 1-5. Specifically, feature set computing system 700 isrepresentative of feature set database 130 and feature database 330.Computing system 700 comprises communication interface 701, userinterface 702, and processing system 703. Processing system 703 iscommunicatively linked to communication interface 701 and user interface702. Processing system 703 includes processing circuitry 705 and memorydevice 706 that stores operating software 707.

Communication interface 701 comprises components that communicate overcommunication links, such as network cards, ports, radio frequency (RF)transceivers, processing circuitry and software, or some othercommunication devices. Communication interface 701 may be configured tocommunicate over metallic, wireless, or optical links. Communicationinterface 701 may be configured to use time-division multiplexing (TDM),IP, Ethernet, optical networking, wireless protocols, communicationsignaling, or some other communication format—including combinationsthereof. In particular, communication interface 701 may communicate witha plurality of developer computing systems that develop securityapplications for computing networks.

User interface 702 comprises components that interact with a user. Userinterface 702 may include a keyboard, display screen, mouse, touch pad,or some other user input/output apparatus. User interface 702 may beomitted in some examples.

Processing circuitry 705 comprises microprocessor and other circuitrythat retrieves and executes operating software 707 from memory device706. Memory device 706 comprises a non-transitory storage medium, suchas a disk drive, flash drive, data storage circuitry, or some othermemory apparatus. Operating software 707 comprises computer programs,firmware, or some other form of machine-readable program instructions.Operating software 707 includes request module 708, application module709, and feature set module 710, although any number of software modulesmay provide the same operation. Operating software 707 may furtherinclude an operating system, utilities, drivers, network interfaces,applications, or some other type of software. When executed by circuitry705, operating software 707 directs processing system 703 to operatefeature set computing system 700 as described herein.

In particular, request module 708 directs processing system 703 toidentify a request for a feature set for a new security application. Insome implementations, the request for the feature set may include aclassification for the new application, wherein the classification mayinclude a firewall application, an encryption application, a data backupapplication, or any other similar application. In response to therequest, application module 709 directs processing system 703 toidentify applications with the same classification as the newapplication. Once the similar applications are identified, feature setmodule 710 directs processing system 703 to determine a feature setbased on the identified similar applications.

In some implementations, feature set computing system 700 may include adata structure that stores information about the various features thatcan be used for applications. For example, if a new firewall applicationwere to be implemented, features for other firewall applications may beidentified and supplied as a possible feature set to the requestingdeveloper. In some instances, the feature sets may be associated with anadministration platform that allows administrators of computing networksto implement security actions across a plurality of network assets withvarious configurations. Accordingly, by supplying feature sets to thesoftware developers, an administration system may be used to select asingle action (or command) from a feature set and implement the actionacross assets with various hardware and software configurations. Forexample, if the administrator desired to block a particular IP address,the user may provide a command to block the IP address, which can thenbe supplied to the assets associated with the command and the particularfeature. Once received, the assets may translate the command for thefeature into the required operations to implement the desire actions,which in this case would include adding an IP address to a block listfor the asset.

Returning to the elements of FIG. 1, developer system 120 and featureset database 130 may each comprise one or more server computing systems,desktop computing systems, laptop computing systems, virtual machines,or other similar computing systems. Developer system 120 and feature setdatabase 130 may each comprise communication interfaces, networkinterfaces, processing systems, computer systems, microprocessors,storage systems, storage media, or some other processing devices orsoftware systems, and can be distributed among multiple devices.Although illustrated as separate in the example of FIG. 1, it should beunderstood that in some examples, developer system 120 may execute onthe same computing system or systems as feature set database 130.

Communication network 140 comprises switches, wireless access nodes,Internet routers, network gateways, application servers, computersystems, communication links, or some other type of communicationequipment—including combinations thereof. Communication network 140 maycommunicate with developer system 120 and feature set database 130 usingmetal, glass, optical, air, space, or some other material as thetransport media. Communication network 140 may be configured tocommunicate using Time Division Multiplex (TDM), asynchronous transfermode (ATM), IP, Ethernet, synchronous optical networking (SONET), hybridfiber-coax (HFC), circuit-switched, communication signaling, wirelesscommunications, or some other communication format, includingimprovements thereof.

The included descriptions and figures depict specific implementations toteach those skilled in the art how to make and use the best option. Forthe purpose of teaching inventive principles, some conventional aspectshave been simplified or omitted. Those skilled in the art willappreciate variations from these implementations that fall within thescope of the invention. Those skilled in the art will also appreciatethat the features described above can be combined in various ways toform multiple implementations. As a result, the invention is not limitedto the specific implementations described above, but only by the claimsand their equivalents.

What is claimed is:
 1. A computer-implemented method, comprising:receiving, over a network, a request for recommended applicationfeatures to be implemented by a software application being developed ata developer computer system; determining a classification for thesoftware application; identifying, in an application feature database, aset of recommended application features implemented by other softwareapplications associated with the classification, wherein execution ofeach recommended application feature of the set of recommendedapplication features causes the software application to perform one ormore application-specific operations to implement the recommendedapplication feature; and sending, to the developer computer system, dataidentifying the set of recommended application features.
 2. Thecomputer-implemented method of claim 1, further comprising causingdisplay of a graphical user interface enabling a user to specify theclassification for the software application, wherein the request isreceived via the graphical user interface and includes an identificationof the classification.
 3. The computer-implemented method of claim 1,wherein the software application is one of: a firewall application, anantivirus application, a ticketing application, a backup application, ora network security application.
 4. The computer-implemented method ofclaim 1, wherein the software application is a security application, andwherein the recommended application features include a feature used torespond to security threats of a computing network.
 5. Thecomputer-implemented method of claim 1, wherein the application featuredatabase includes a plurality of classifications, and wherein eachclassification of the plurality of classifications is associated with arespective set of recommended application features.
 6. Thecomputer-implemented method of claim 1, wherein a recommendedapplication feature of the set of recommended application features isassociated with a unified command of a unified command language definedby an administration system.
 7. The computer-implemented method of claim1, wherein the other software applications associated with theclassification include software applications implemented for differentcomputing system hardware or software configurations relative to thesoftware application.
 8. The computer-implemented method of claim 1,further comprising: receiving a request to associate a new recommendedapplication feature with a classification in the application featuredatabase; and storing the new recommended application feature inassociation with the classification in the application feature database.9. The computer-implemented method of claim 1, wherein one or moreapplication-specific operations are particular to a type of computingasset at which the operations are performed.
 10. Thecomputer-implemented method of claim 1, wherein the application featuredatabase stores, for at least one recommended application feature of theset of recommended application features, a description of the operationsto be performed to implement the at least one recommended applicationfeature.
 11. A non-transitory computer-readable storage medium storinginstructions which, when executed by one or more processors, causeperformance of operations comprising: receiving, over a network, arequest for recommended application features to be implemented by asoftware application being developed at a developer computer system;determining a classification for the software application; identifying,in an application feature database, a set of recommended applicationfeatures implemented by other software applications associated with theclassification, wherein execution of each recommended applicationfeature of the set of recommended application features causes thesoftware application to perform one or more application-specificoperations to implement the recommended application feature; andsending, to the developer computer system, data identifying the set ofrecommended application features.
 12. The non-transitorycomputer-readable storage medium of claim 11, wherein the instructions,when executed by the one or more processors, cause performance ofoperations further comprising causing display of a graphical userinterface enabling a user to specify the classification for the softwareapplication, wherein the request is received via the graphical userinterface and includes an identification of the classification.
 13. Thenon-transitory computer-readable storage medium of claim 11, wherein thesoftware application is one of: a firewall application, an antivirusapplication, a ticketing application, a backup application, or a networksecurity application.
 14. The non-transitory computer-readable storagemedium of claim 11, wherein the software application is a securityapplication, and wherein the recommended application features include afeature used to respond to security threats of a computing network. 15.The non-transitory computer-readable storage medium of claim 11, whereinthe application feature database includes a plurality ofclassifications, and wherein each classification of the plurality ofclassifications is associated with a respective set of recommendedapplication features.
 16. The non-transitory computer-readable storagemedium of claim 11, wherein a recommended application feature of the setof recommended application features is associated with a unified commandof a unified command language defined by an administration system. 17.The non-transitory computer-readable storage medium of claim 11, whereinthe other software applications associated with the classificationinclude software applications implemented for different computing systemhardware or software configurations relative to the softwareapplication.
 18. The non-transitory computer-readable storage medium ofclaim 11, wherein the instructions, when executed by the one or moreprocessors, cause performance of operations further comprising:receiving a request to associate a new recommended application featurewith a classification in the application feature database; and storingthe new recommended application feature in association with theclassification in the application feature database.
 19. Thenon-transitory computer-readable storage medium of claim 11, wherein oneor more application-specific operations are particular to a type ofcomputing asset at which the operations are performed.
 20. Thenon-transitory computer-readable storage medium of claim 11, wherein theapplication feature database stores, for at least one recommendedapplication feature of the set of recommended application features, adescription of the operations to be performed to implement the at leastone recommended application feature.
 21. An apparatus, comprising: oneor more processors; a non-transitory computer-readable storage mediumstoring instructions which, when executed by the one or more processors,cause the apparatus to: receive, over a network, a request forrecommended application features to be implemented by a softwareapplication being developed at a developer computer system; determine aclassification for the software application; identify, in an applicationfeature database, a set of recommended application features implementedby other software applications associated with the classification,wherein execution of each recommended application feature of the set ofrecommended application features causes the software application toperform one or more application-specific operations to implement therecommended application feature; and send, to the developer computersystem, data identifying the set of recommended application features.22. The apparatus of claim 21, wherein the instructions, when executedby the one or more processors, further causes the apparatus to causedisplay of a graphical user interface enabling a user to specify theclassification for the software application, wherein the request isreceived via the graphical user interface and includes an identificationof the classification.
 23. The apparatus of claim 21, wherein thesoftware application is one of: a firewall application, an antivirusapplication, a ticketing application, a backup application, or a networksecurity application.
 24. The apparatus of claim 21, wherein thesoftware application is a security application, and wherein therecommended application features include a feature used to respond tosecurity threats of a computing network.
 25. The apparatus of claim 21,wherein the application feature database includes a plurality ofclassifications, and wherein each classification of the plurality ofclassifications is associated with a respective set of recommendedapplication features.
 26. The apparatus of claim 21, wherein arecommended application feature of the set of recommended applicationfeatures is associated with a unified command of a unified commandlanguage defined by an administration system.
 27. The apparatus of claim21, wherein the other software applications associated with theclassification include software applications implemented for differentcomputing system hardware or software configurations relative to thesoftware application.
 28. The apparatus of claim 21, wherein theinstructions, when executed by the one or more processors, furthercauses the apparatus to: receive a request to associate a newrecommended application feature with a classification in the applicationfeature database; and store the new recommended application feature inassociation with the classification in the application feature database.29. The apparatus of claim 21, wherein one or more application-specificoperations are particular to a type of computing asset at which theoperations are performed.
 30. The apparatus of claim 21, wherein theapplication feature database stores, for at least one recommendedapplication feature of the set of recommended application features, adescription of the operations to be performed to implement the at leastone recommended application feature.