Systems and methods for using machine learning for managing application incidents
11556815 · 2023-01-17
Assignee
Inventors
Cpc classification
International classification
Abstract
Disclosed herein are systems and methods for using machine learning for managing application incidents. An embodiment takes the form of a method that includes receiving extracted data pertaining to one or more applications, Model-input data is generated from the extracted data. Model-output data is generated at least in part by processing the generated model-input data with one or more machine-learning models trained to make one or more application-incident predictions. Based at least in part on the model-output data, an application-incident-likely determination is made that a likelihood of an occurrence of an application incident exceeds an application-incident-likelihood threshold, where the application incident corresponds to a given application of the one or more applications. Responsive to making the application-incident-likely determination, one or more alerts of the likelihood of the occurrence of the application incident are output.
Claims
1. A method comprising: receiving extracted data pertaining to one or more applications; generating model-input data from the extracted data; generating model-output data at least in part by processing the generated model-input data with a plurality of machine-learning models each independently trained to make one or more application-incident predictions, wherein the plurality of machine-learning models comprises a plurality of incident-type-specific machine-learning models comprising: a first machine-learning model that is trained to make application-incident predictions with respect to a first type of application incident; and a second machine-learning model that is trained to make application-incident predictions with respect to a second type of application incident, the first type of application incident and the second type of application incident being different from one another; making, based at least in part on the model-output data, an application-incident-likely determination that a likelihood of an occurrence of an application incident exceeds an application-incident-likelihood threshold, the application incident corresponding to a given application of the one or more applications; and responsive to making the application-incident-likely determination, outputting one or more alerts of the likelihood of the occurrence of the application incident.
2. The method of claim 1, wherein: the model-input data is structured according to a set of one or more features; generating the model-input data from the extracted data comprises transforming at least a portion of the extracted data into being structured according to the set of one or more features; and processing the generated model-input data with the one or more machine-learning models comprises processing the set of one or more features with the one or more machine-learning models.
3. The method of claim 2, wherein: receiving the extracted data comprises receiving the extracted data as a plurality of datasets respectively extracted from a plurality of different data stores; and transforming at least a portion of the extracted data into being structured according to the set of one or more features comprises one or more of: conducting at least one normalization function with respect to the at east a portion of the extracted data; conducting at east one join operation with respect to the at least a portion of the extracted data; conducting at east one metric calculation with respect to the at least a portion of the extracted data; and conducting at least one data-quality check with respect to the at least a portion of the extracted data.
4. The method of claim 1, wherein: a data-shaping platform generates the model-input data from the extracted data; a machine-learning platform generates the model-output data at least in part by processing the generated model-input data with the plurality of machine-learning models; and the method further comprises conveying the model-input data from the data-shaping platform to the machine-learning platform using data-movement software.
5. The method of claim 1, wherein the plurality of machine-learning models comprises one or more gradient boosting machine (GBM) models.
6. The method of claim 1, wherein the first type of application incident comprises an application-patching-related incident.
7. The method of claim 1, wherein the first type of application incident comprises an application-access-related incident.
8. The method of claim 1, wherein the first type of application incident comprises an application-configuration-related incident.
9. The method of claim 1, wherein the first type of application incident comprises an application-server-relationship-related incident.
10. The method of claim 1, wherein the plurality of machine-learning models further comprises: a third machine-learning model that is trained to make application-incident predictions with respect to a first application of the one or more applications; and a fourth machine-learning model that is trained to make application-incident predictions with respect to a second application of the one or more applications, the first application and the second application being different from one another.
11. The method of claim 1, wherein the application-incident-likely determination is that the likelihood of an occurrence of an application incident within a predetermined amount of time exceeds the application-incident-likelihood threshold.
12. The method of claim 1, wherein: the model-output data indicates the likelihood of the occurrence of the application incident; and making the application-incident-likely determination based at least in part on the model-output data comprises comparing the indicated likelihood to the application-incident-likelihood threshold.
13. The method of claim 1, wherein: the model-output data comprises an indication that the likelihood of the occurrence of the application incident exceeds the application-incident-likelihood threshold; and making the application-incident-likely determination based at least in part on the model-output data comprises making the application-incident-likely determination based at least in part on the indication.
14. The method of claim 1, further comprising presenting the one or more alerts via one or more user interfaces.
15. The method of claim 1, wherein outputting one or more alerts comprises outputting the one or more alerts to one or more of data storage, a computing device, and a networked server.
16. The method of claim 1, further comprising outputting the model-output data to an administrative interface.
17. A system comprising: at least one processor; and one or more non-transitory computer readable storage media containing instructions executable by the at least one processor for causing the at least one processor to perform operations comprising: receiving extracted data pertaining to one or more applications; generating model-input data from the extracted data; generating model-output data at least in part by processing the generated model-input data with a plurality of machine-learning models each independently trained to make one or more application-incident predictions wherein the plurality of machine-learning models comprises a plurality of incident-type-specific machine-learning models comprising: a first machine-learning model that is trained to make application-incident predictions with respect to a first type of application incident; and a second machine-learning model that is trained to make application-incident predictions with respect to a second type of application incident, the first type of application incident and the second type of application incident being different from one another; making, based at least in part on the model-output data, an application-incident-likely determination that a likelihood of an occurrence of an application incident exceeds an application-incident-likelihood threshold, the application incident corresponding to a given application of the one or more applications; and responsive to making the application-incident-likely determination, outputting one or more alerts of the likelihood of the occurrence of the application incident.
18. One or more non-transitory computer readable storage media containing instructions executable by at least one processor for causing the at least one processor to perform operations comprising: receiving extracted data pertaining to one or more applications; generating model-input data from the extracted data; generating model-output data at least in part by processing the generated model-input data with a plurality of machine-learning models each independently trained to make one or more application-incident predictions, wherein the plurality of machine-learning models comprises a plurality of incident-type-specific machine-learning models comprising: a first machine-learning model that is trained to make application-incident predictions with respect to a first type of application incident; and a second machine-learning model that is trained to make application-incident predictions with respect to a second type of application incident, the first type of application incident and the second type of application incident being different from one another: making, based at least in part on the model-output data, an application-incident-likely determination that a likelihood of an occurrence of an application incident exceeds an application-incident-likelihood threshold, the application incident corresponding to a given application of the one or more applications; and responsive to making the application-incident-likely determination, outputting one or more alerts of the likelihood of the occurrence of the application incident.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) A more detailed understanding may be had from the following description, which is presented by way of example in conjunction with the following drawings, in which like reference numerals are used across the drawings in connection with like elements.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION
(9)
(10) In the example communication context 100 that is depicted in
(11) In an example scenario, the network 102 could be a data-communication network such as, including, or in communication with the Internet. The network 102 could operate according to a suite of communication protocols such the Transmission Control Protocol (TCP) over the Internet Protocol (IP) (collectively, TCP/IP), the User Datagram Protocol (UDP) over IP (UDP/IP), and/or others. Furthermore, the network 122 could be a private IP network operated by an institution such as a financial-services institution as an example. In addition to other functions, the server system 118 could provide network-access-server (NAS) functions, gateway services, firewall protections, and/or the like between the network 102 and the network 122. Any of the devices in communication with the network 102, such as one or more of the ATM 104, the ATM 106, and the ATM 108, the laptop computer 110, and/or the server system 116, as examples, could communicate via the network 102 and the server system 118 with one or more entities on the network 122, in some cases doing so via a virtual private network (VPN) and/or another type of secure-tunneling communication protocol, connection, and/or the like.
(12) Any one or more of the ATM 104, the ATM 106, and the ATM 108 could be an ATM that provides conventional ATM-type services such as cash withdrawal, check deposit, account transfers, balance inquiries, bill pay, and/or the like. Users may access any one or more of the ATM 104, the ATM 106, and the ATM 108 using a secure card, a mobile device such as the mobile device 114, and/or the like, along with provided security credentials such as a personal identification number (PIN), password, passcode, and/or the like. In some implementations, biometric authentication is used by one or more of the ATM 104, the ATM 106, and the ATM 108.
(13) Any one or more of the communication links depicted in
(14) Any one or more of the ATM 104, the ATM 106, the ATM 108, the laptop computer 110, the laptop computer 112, the mobile device 114, the server system 116, the server system 118, the data-store system 120, the laptop computer 124, the desktop computer 126, and any of the entities that are depicted in the other figures could have an architecture similar to that described below in connection with the example machine 600 of
(15) Moreover, although pictured as data-storage containers, the data-store system 120 could include, in addition to one or more data-storage devices, units, and/or the like, one or more database servers that operate to serve valid requests to carry out database operations with respect to the data-store system 120, where such database operations could include operations to store data, retrieve data, extract data, modify data, update data, remove data, and/or the like. Moreover, although the data-store system 120 is shown as being in a single network location in the communication context 100, the data-store system 120 could include multiple different data silos in multiple different geographic and/or network-topology locations. Some example data silos that could be included in the data-store system 120 are depicted in and described below in connection with
(16)
(17) Each of the data silo 202, the data silo 204, the data silo 206, and the data silo 208 could house one or more particular types of data pertaining to one or more of the applications operating within an IT ecosystem of an institution. Some example types of data silos are given below, where the provided label for each listed example type of data silo refers to the example type of data stored therein.
(18) One of the data silos could be a change-management data silo that houses data related to a clearinghouse function for changes to applications within the ecosystem. A change-management data silo could include data pertaining to (e.g., generated by, used by, and/or the like) an application or set of applications, such as a suite of change-management tools, Generally stated, with respect to this example and other examples that are given herein of specific software products, these software products are offered purely by way of illustration and not limitation. Other examples of similar software products could be used in various different implementations, and certainly other types of software products (e.g., applications) could be present in various different example implementations as well.
(19) Another example is a risk-management data silo, which could house data related to a clearinghouse for issues at a given financial-services institution. This risk-management data could be related to big-picture problems related to, e.g., a governance plan for an application serving millions of customers. The data in a risk-management data silo could pertain to an operating model for risk managers at the financial-services institution. In at least one embodiment that includes a risk-management data silo, the data contained therein could pertain to an integrated risk management application or set of applications.
(20) In at least one embodiment, one of the data silos is an application-criticality-assessment data silo, which could include data that reflects how critical each application in the IT ecosystem is considered to be with respect to the ongoing functioning of the financial-services institution as a whole. In some instances, applications could be graded on a criticality scale into categories such as a high level of criticality, a medium level of criticality, and a low level of criticality. Certainly innumerable other delineations into criticality strata could be used in various different implementations. In some cases, the level of criticality of a given application could reflect factors such as whether or not the application is a customer-facing application, where an application being customer-facing would tend to increase the level of criticality of that application. In some instances, an application-criticality-assessment data silo could house data pertaining to an application tool.
(21) Another example type of data silo that could be implemented is a vulnerability-management data silo, which may house data pertaining to one or more systems, applications, and/or the like that manage vulnerabilities of applications in an IT ecosystem. In at least some embodiments, and as contrasted with an “issue,” which is a term used above in connection with discussion of an example risk-management data silo, a vulnerability could refer to an actual problem that has been identified with respect to the code (e.g., source code, executable code, interpretable code, and/or the like) of an application. Thus, in at least one embodiment, a vulnerability is a specific problem with the code of an application and requires a patch (i.e., a software patch) to be installed, applied, and/or the like in order to address and fix the vulnerability. In at least one embodiment, an example instance of a vulnerability-management data silo houses data that pertains to a platform or other set of vulnerability-management tools.
(22) In at least one embodiment, one of the data silos is application-end-of-life-management data silo, which includes data that reflects whether or not certain applications in an IT ecosystem are at or nearing their end of life, which may refer to a date after which a vendor of a given application will no longer support that application. That support could include updates, patches, technical support, and/or the like. Continuing to operate an application in an ecosystem when that application is at or past its end-of-life date typically increases the probability that one or more incidents will occur in connection with that application.
(23) Another example of a type of data silo that could be maintained is a risk-identification-and-mitigation data silo, which could house data related to monitoring whether various different software vendors have had problems, are high risk, and/or the like. This data silo could include data reflecting whether or not the financial-services institution that operates the IT ecosystem that includes these data silos has performed an assessment with respect to one or more software vendors. In some embodiments, a risk-identification-and-mitigation data silo includes data pertaining to a risk-identification-and-mitigation software suite.
(24) One example of a type of data silo that could be maintained is a shared-risk-platform data silo, which could house data related to control failures (identified during control testing) and risk-management processes (e.g., overdue issues, corrective actions, etc.) for an application. Control failures and lax risk management can result in application problems.
(25) Another example of a type of data silo that could be maintained is a software-infrastructure-and-standards data silo, which could house data related to software in an institution's infrastructure. Furthermore, this data silo could include data related to whether software is supported by a third party or by the institution that operates the IT ecosystem that includes these data silos. If software is not supported, required patches may not be produced or implemented to fix known vulnerabilities.
(26) In at least one embodiment, the data silos include a project-management data silo, which could include data reflecting, e.g., how much money the financial-services institution that operates the IT ecosystem is spending on various applications for one or more purposes such as support, maintenance, patching, debugging, and/or the like. In at least one embodiment, a project-management data silo includes data pertaining to an application known as a Project Management Universal Work Station (PMUWS).
(27) Another example of a type of data silo that could be implemented is referred to here as an IT-survey-assessment data silo. This example type of data silo could include data pertaining to one or more survey assessments carried out by one or more IT professionals with respect to one or more IT assets. These survey assessments could pertain to aspects such as how well various IT assets are functioning, whether or not one or more IT assets are experiencing data-quality issues, and/or the like.
(28) As stated above, the depiction in
(29) As shown in
(30) Various different types of data-extraction tools could be used for any one or more of the data extractions that are depicted in
(31) As depicted in
(32) As described here and elsewhere throughout the present disclosure, among the operations that are performed in various different embodiments on the aggregated extracted data by the data-shaping platform 210 are normalization operations, database (i.e., table) join operations, calculation of one or more metrics, data-quality checks, and/or the like. As an example, with respect to normalization, the data-shaping platform 210 may transform and aggregate one or more many-to-one relationships into respective one-to-one relationships to compute metrics such as averages, minimums, maximums, sums, and/or the like over various consolidated timeframes that may initially be expressed in multiple data records.
(33) At least one result of these operations that are performed on the aggregated extracted data by the data-shaping platform 210 is the generation and/or identification of useful risk indicators, which are also referred to herein as being the features of the one or more machine-learning models 214. It is noted that the order in which various operations (e.g., normalizations, joins, and/or the like) are performed on various different subsets of the aggregated extracted data can depend on a number of factors, including whether or not a given one of the features is a function of data that is extracted from more than one of the herein-described data silos. Among the goals of the aggregation operations (e.g., calculations) that are performed on the aggregated extracted data is to identify and arrive at features for the machine-learning models 214 that are generally non-redundant and generally useful in predicting application incidents. An extensive list of example features used by one or more machine-learning models 214 is provided below in Table 1.
(34) The aggregation operations that are performed on the aggregated extracted data result in the model-input data 230, which in at least one embodiment is transferred from the data-shaping platform 210 to the machine-learning platform 212 using data-movement software, another term for which is a data-movement tool, and one example of which is Network Data Mover (NDM) Connect:Direct). As a general matter, a data-movement tool (e.g., NDM) is a set of software tools, applications, and/or the like that are collectively used to get complex data sets from one place to another. In at least one embodiment, the model-input data 230 is packaged in what is referred to in the art as a modeling export file that contains the generated risk indicators (i.e., features) discussed herein.
(35) In at least one embodiment, the machine-learning platform 212 is configured to receive the model-input data 230 from the data-shaping platform 210, and is further configured to process the model-input data 230 using the one or more machine-learning models 214 as discussed herein, to produce model-output data 232, which is then transmitted by the machine-learning platform 212 to both an alert platform 216 and an admin interface 220. As described further below, in certain instances, the alert platform 216 processes the model-output data 232 and responsively transmits one or more alerts 234 to an alerts interface 218.
(36) In various examples, the machine-learning platform 212 processes the model-input data 230 through the machine-learning models 214 to produce the model-output data 232. With respect to the one or more machine-learning models 214, these models in various different embodiments have one or more of the properties of being predictive and having been trained using supervised learning. In at least one embodiment, one or more of the machine-learning models 214 are gradient boosting machine (GBM) models. In some embodiments, at least two of the machine-learning models 214 are different types of machine-learning models. In other embodiments, each of the machine-learning models 214 is the same type of machine-learning model.
(37) In some embodiments, at least one of the machine-learning models 214 is trained specifically to predict a certain type of application incident, such as patching-related incidents, access-related incidents, configuration-related incidents, and server-relationship-related incidents, to name a few examples. In some embodiments, the machine-learning models 214 include a first model trained to predict a first type of application incident and a second model trained to predict a second type of application incident, where the first type of application incident and the second type of application incident are different from one another.
(38) In an embodiment in which one of the one or more machine-learning models 214 is trained specifically to predict patching-related incidents, features such as those listed below in Table 1 were used. These features were selected based on subject-matter expertise in key, drivers of patching-related incidents as being applicable to root causes of patching-related incidents. In some embodiments, collinearity is identified and used as a basis to remove redundant features from the feature set used in operation by the patching-related-incident-specific machine-learning model. As a general matter in machine learning, it is desirable to select as features the smallest subset of independent variables that explains almost as much of the variation in the response as do all of the independent variables. Moreover, in some embodiments, false positives were accounted for by filtering out incidents that were determined to not be problematic.
(39) Similarly, in some embodiments, at least one of the machine-learning models 214 is trained specifically to predict incidents for a certain application, such as a web-portal application, a bill-pay application, a statistical-analysis application, and/or the like. In some embodiments, the 214 include a first model trained to predict incidents for a first application and a second model trained to predict incidents for a second application, where the first application and the second application are different applications.
(40) As a general matter with respect to implementing multiple machine-learning models 214, these models in at least some embodiments are independently trained using, e.g., supervised learning (i.e., learning that utilizes known, labeled results). Separate and independent models offer the benefit of a clear connection between variables in the respective model, and also enhance interpretability of the results of the inference function of the models.
(41) The model-output data 232, which the alert platform 216 receives from the machine-learning platform 212 in at least one embodiment, could take the form of one or more assessments that indicate probabilities of application incidents (e.g., of particular types and/or with respect to particular applications) occurring. In some embodiments, these probabilities relate to the probability of such an incident occurring within a specified time frame such as one month, three months, six months, one year, and/or the like. In some instances, the machine-learning platform 212 compares these probabilities to one or more applicable probability thresholds, and then informs the alert platform 216 in the model-output data 232 as to whether or not one or more of such probabilities exceeded a respective threshold. In other embodiments, the model-output data 232 includes the probabilities themselves, and it is the alert platform 216 that makes the comparison to the one or more respective thresholds. Other approaches could be implemented as well.
(42) In at least one embodiment, if it is determined (by, e.g., the machine-learning platform 212 and/or the alert platform 216) that at least one probability (i.e., likelihood) of an occurrence of an application incident exceeds a corresponding threshold, then the alert platform 216 outputs one or more corresponding alerts to the alerts interface 218. In various different embodiments, the alerts interface 218 could be or include one or more user-interface elements of one or more devices such as the laptop computer 124, the desktop computer 126, the laptop computer 112, the mobile device 114, and/or the like. In some embodiments, outputting an alert includes outputting an alert to one or more of a report, data storage, e-mail, one or more user interfaces (e.g., one or more digital dashboards), via one or more digital channels (e.g., messaging applications such as Slack, What's App, and/or the like) and/or one or more other suitable destinations. In an embodiment, the alert platform 216 could be programmed at least in part using the Python programming language. Other languages that could be used to develop any one or more of the entities described herein include Java, Java Platform, Enterprise Edition (J2EE), C++, and/or the like.
(43) The content of a given alert could take any form deemed suitable by those of skill in the art for a given implementation. One example alert is described below in connection with
(44) As shown in
(45)
(46) As an overview of the machine-learning framework 300, which is described in more detail below, it can be seen in
(47) Each of the incident-prediction-model features 302 is either an individual measurable property of the phenomenon being observed, which in embodiments of the present disclosure is operation of ecosystem applications, or a derived or aggregated (but still measurable and numeric) property of that phenomenon. In the machine-learning context, a feature is akin to an explanatory variable that is used in statistical techniques such as linear regression. Choosing informative, discriminating, and independent features is important for effective operation of machine-learning programs in pattern recognition, classification, and regression. Features may be of different types, such as numbers, character strings, and graphs. In
(48) In at least some embodiments, there are phases of training, validation, and testing in order to complete the transition 314 from the models-in-training 310 to the machine-learning models 214. Once the training, validation, and testing phases are complete, the machine-learning models 214 generate the incident-prediction-model assessments 316 based on the model-input data 230. In at least one embodiment, each of the incident-prediction-model assessments 316 is a likelihood (e.g., probability) of the occurrence (e.g., within a specified or default timeframe) of one or more application incidents.
(49) Within the field of artificial intelligence (AI), machine learning is a subcategory in which computer systems are designed and created to be able to automatically learn and improve from experience without being explicitly (further) programmed. Within machine learning, there are at least three categories: reinforcement learning, unsupervised learning, and supervised learning. Reinforcement learning involves the use of various algorithms such as Monte Carlo, Q-learning, SARSA (state-action-reward-state-action), and/or the like. Unsupervised learning involves the use of various algorithms such as clustering algorithms, association algorithms, and/or the like. Embodiments of the present disclosure involve training a model using supervised learning—accordingly, various example supervised-learning algorithms are discussed herein.
(50) Generally speaking; within the category of machine learning known as supervised learning, there are algorithms used for problems such as regression and classification. Regression algorithms (e.g., linear regression) are typically used to determine a numerical answer to a given problem (e.g., in the context of real-estate transactions, “What is the best price at which I should list my house?”), whereas classification algorithms are used to select one of multiple discrete outcomes (e.g., in the context of facial recognition, “Is this particular face that of an authorized user or not?”). As a general matter, the individual data items (e.g., images of faces in the example context of facial recognition) that are classified using a classification algorithm are referred to as observations, and the classification of a given new observation (as, e.g., “an authorized user” or “not an authorized user”) is referred to as an assessment. The process of making such assessments is often referred to as inference.
(51) Further with respect to training, machine-learning techniques train models to accurately make predictions on data fed into the models. During a learning phase, the models are developed against a training dataset of inputs to train the models to correctly predict the output for a given input. Generally, the learning phase may be supervised, semi-supervised, or unsupervised, indicating a decreasing level to which the “correct” outputs are provided in correspondence to the training inputs. In a supervised-learning approach, as described herein in connection with embodiments of the present disclosure, all of the outputs are provided to the model, guiding the model to develop a general rule that maps the input to the output. In contrast, in an unsupervised-learning approach, the desired output is not provided for the inputs; as such, the model can develop its own rules to discover relationships within the training dataset. In a semi-supervised learning approach, an incompletely labeled training set is provided, with some of the outputs known and some unknown for the training dataset.
(52) Models may be run against a training dataset for several epochs (e.g., iterations), in which the training dataset is repeatedly fed into the model to refine its results. For example, in a supervised-learning approach, a model is developed to predict the output for a given set of inputs, and is evaluated over several epochs to more reliably provide the output that is specified as corresponding to the given input for the training dataset. In another example, in an unsupervised-learning approach, a model is developed to cluster the training dataset into n groups, and is evaluated over several epochs as to how consistently it places a given input into a given group and how reliably it produces the n desired clusters across each epoch.
(53) Once an epoch is run, the models are evaluated and the values of their variables (e.g., coefficients) are adjusted to attempt to better refine the model in an iterative fashion. In various aspects, the evaluations are biased against false negatives, biased against false positives, or evenly biased with respect to the overall accuracy of the model. The values may be adjusted in several ways depending on the machine-learning technique being used. For example, in a genetic or evolutionary algorithm, the values for the models that are most successful in predicting the desired outputs are used to develop values for models to use during the subsequent epoch, which may include random variation/mutation to provide additional data points. One of ordinary skill in the art will be familiar with several machine-learning algorithms that may be applied with the present disclosure, including linear regression, GBMs, random forests, decision-tree learning, neural networks, deep neural networks, and the like.
(54) Each model develops a rule or algorithm over several epochs by varying the values of one or more variables affecting the inputs to more closely map to a desired result, but as the training dataset may be varied, and is preferably very large, perfect accuracy and precision may not be achievable. A number of epochs that make up a learning phase, therefore, may be set as a given number of trials or a fixed time/computing budget, or may be terminated before that number/budget is reached when the accuracy of a given model is high enough or low enough or an accuracy plateau has been reached. For example, if the training phase is designed to run n epochs and produce a model with at least 95% accuracy, and such a model is produced before the n.sup.th epoch, the learning phase may end “early,” and the produced model maybe used as satisfying the end-goal accuracy threshold. Similarly, if a given model is inaccurate enough to satisfy a random-chance threshold (e.g., the model is only 55% accurate in determining true/false outputs for given inputs), the learning phase for that model may be terminated early, although other models in the learning phase may continue training. Similarly, when a given model continues to provide similar accuracy or vacillate in its results across multiple epochs having reached a performance plateau—the learning phase for the given model may terminate before the epoch number and/or computing budget is reached.
(55) Once the learning phase is complete, the models are finalized. In some example embodiments, models that are finalized are evaluated against testing criteria. In a first example, a testing dataset that includes known outputs for its inputs is fed into the finalized models to determine an accuracy of the model in handling data on which it has not been trained. In a second example, a false-positive rate or false-negative rate is used to evaluate the models after finalization. In a third example, a delineation between data clusterings is used to select a model that produces the clearest bounds for its clusters of data. Other approaches may be used as well.
(56) During training, in at least one embodiment, the models-in-training 310 builds classifiers (i.e., trees), and each such tree assesses each data point (i.e., vector) in the incident-prediction-model training data 312. As the training continues, the trees are formed, and the coefficients are adjusted. Once the training reaches a certain amount of time, iterations, and/or accuracy (as compared with the known labels), the training stops. In at least one embodiment, after training, an automated-validation phase is conducted. Prior to the training phase, the incident-prediction-model training data 312 may be divided into what is referred to herein as “pure training data,” “validation data,” and “testing data.” In other embodiments, only “pure training data” and “testing data” are used, in which case there is not an automated-validation phase. In some embodiments that use the automated-validation phase, the incident-prediction-model training data 312 may be divided randomly into 60% pure training data, 20% validation data, and 20% testing data. Other divisions could be used as well. In embodiments that use only pure training data and testing data, a split such as 70%/30% or another suitable value could be used.
(57) After the automated-validation phase (if conducted), a testing phase is also conducted. During both the automated-validation phase and the testing phase, the models-in-training 310 are tested by submitting vectors that had not yet been seen, and checking the outputs of the models-in-training 310 against known, labeled outputs. If a satisfactory accuracy level is reached in both phases, the transition 314 is considered to be complete and the machine-learning models 214 are accordingly ready to conduct inferences on the model-input data 230. It is also noted that, in addition to suitable accuracy levels, those accuracy levels are checked in some embodiments to verify that they are within a tolerance of the accuracy level being achieved near the end of the training phase. If the training accuracy more than an acceptable tolerance higher than either or both of the validation accuracy and the testing accuracy, the model can said to be overfitting the training data. If, on the other hand, the training accuracy is more than an acceptable tolerance lower than either or both of the validation accuracy and the testing accuracy, the model can said to be underfitting the training data. It is generally desirable to avoid both.
(58)
(59) At operation 402, the data-shaping platform 210 receives the aggregated extracted data, which pertains to one or more applications. At operation 404, the data-shaping platform 210 generates the model-input data 230 from the aggregated extracted data, as described above. At operation 406, the machine-learning platform 212 generates the model-output data 232 at least in part by processing the generated model-input data 230 with one or more machine-learning models 214 trained to make one or more application-incident predictions.
(60) At operation 408, based at least in part on the model-output data 232, the alert platform 216 makes an application-incident-likely determination that a likelihood of an occurrence of an application incident exceeds an application-incident-likelihood threshold, where the application incident corresponds to a given application of the one or more applications. In at least one embodiment, the application incident has a particular incident type (e.g., patching-related), and the one or more machine-learning models 214 include an incident-type-specific machine-learning model trained to make application-incident predictions corresponding to application incidents having that particular incident type. In at least one such embodiment, the alert platform 216 makes the application-incident-likely determination based at least in part on output data from the incident-type-specific machine-learning model.
(61) At operation 410; responsive to making the application-incident-likely determination, the alert platform 216 outputs one or more alerts 234 of the likelihood of the occurrence of the application incident. In at least one embodiment, operation 410 involves presenting the one or more alerts via one or more user interfaces such as the alerts interface 218. In at least one embodiment, operation 410 involves outputting the one or more alerts 234 to one or more of data storage, a computing device, and a networked server. Moreover, as discussed above, in at least one embodiment, in addition to outputting the model-output data 232 to the alert platform 216, the machine-learning platform 212 also outputs the model-output data 232 to the admin interface 220.
(62)
(63) The sample alert 500 includes a title bar 502 that indicates the type of incident, in this case patching alert, to which a user is being alerted, and also includes an alert-close element 504, which a user could click on or otherwise select to stop viewing the sample alert 500. Also included in the sample alert 500 is a headline 506, which in this case indicates that an example application called “Online Sales and Marketing” has an elevated level of risk of experiencing one or more patching-related problems. The headline 506 further indicates that “immediate” action is required to mitigate this risk.
(64) In addition to the above-described elements, the sample alert 500 also includes a risk-factor segment 508 in which one or more identified risk factors can be included. In the depicted example, the risk-factor segment 508 includes text stating that this particular application currently has 14 vulnerabilities that require remediation, and further states that 7 of those 14 vulnerabilities are overdue for patching.
(65) The sample alert 500 also includes an immediacy segment 510, which includes text conveying the relative immediacy of the information contained in the sample alert 500. In the depicted example, that text states that immediate action is required to reduce the risk of problems, and further states that a significant reduction in risk is due by a certain date in order to avoid the creation of an escalated issue.
(66) Additionally, the sample alert 500 includes an action segment 512 that includes text communicating one or more recommended actions that the receiver of the sample alert 500 should take. In the depicted example, the first recommended action is to reproduce and document each identified vulnerability. The second recommended action is to create an application-restore point so that any changes can be backed out if need be. The third recommended action is to install the required patch(es) Finally, the fourth recommended action is to update and close the ticket. In various different embodiments, the content of various alerts may be based on business logic for risk items that are actually within an application owner's ability to control (i.e., although predictions may be based on large data sets, alerts may, highlight actionable items (e.g., based on actionable features)).
(67) Other example alert text could relate to such topics as an application being past its respective end-of-life date, in some embodiments by more than a threshold amount of time (e.g., six months); an application being past its expected retirement date, in some embodiments by more than a threshold amount of time (e.g., one year); a number of applications residing on a given host that are, e.g., past end-of-life, past expected retirement date, and/or the like. Other examples could be listed as well.
(68) By operation of the alerts as well as the other operations described herein, embodiments of the present disclosure enable actions such as decommissioning unhealthy applications (e.g., those applications that have incidents), enable more efficient resource allocation (e.g., to address the key drivers of unhealthy applications), and provide personnel such as risk managers with a tool for proactive risk mitigation on an application-by-application basis, and an incident-by-incident basis.
(69)
(70) The machine 600 may include processors 602, memory 604, and I/O components 606, which may be configured to communicate with each other via a bus 608. In an example embodiment, the processors 602 (e.g., a central processing unit (CPU), a Reduced instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a graphics processing unit (GPU), a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a radio-frequency integrated circuit (RHO, another processor, and/or any suitable combination thereof) may include, for example, a processor 610 and a processor 614 that execute the instructions 612. The term “processor” is intended to include multi-core processors that may include two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously. Although
(71) The memory 604 includes a main memory 616, a static memory 618, and a storage unit 620, all accessible to the processors 602 via the bus 608. The memory 604, the static memory 618, and/or the storage unit 620 may store the instructions 612 embodying any one or more of the methodologies or functions described herein. The instructions 612 may also or instead reside, completely or partially, within the main memory 616, within the static memory 618, within machine-readable medium 622 within the storage unit 620, within at least one of the processors 602 (e.g., within the processor's cache memory), and/or any suitable combination thereof, during execution thereof by the machine 600.
(72) The I/O components 606 may include a wide variety of components to receive input, produce and/or provide output, transmit information, exchange information, capture measurements, and/or the like. The specific I/O components 606 that are included in a particular instance of the machine 600 will depend on the type of machine. For example, portable machines such as mobile phones may include a touch input device or other such input mechanisms, while a headless server machine may not include such a touch input device. It will be appreciated that the I/O components 606 may include many other components that are not shown in
(73) In further example embodiments, the I/O components 606 may include biometric components 636, motion components 638, environmental components 640, and/or position components 642, among a wide array of other components. For example, the biometric components 636 may include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, eye tracking, and/or the like), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, brain waves, and/or the like), identify a person (by way of, e.g., voice identification, retinal identification, facial identification, fingerprint identification, electroencephalogram-based identification, and/or the like), and/or the like. The motion components 638 may include acceleration sensor components (e.g., an accelerometer), gravitation sensor components, rotation sensor components (e.g., a gyroscope), and so forth. The environmental components 640 may include, for example, illumination sensor components (e.g., a photometer), temperature sensor components (e.g., one or more thermometers), humidity-sensor components, pressure-sensor components (e.g., a barometer), acoustic-sensor components (e.g., one or more microphones), proximity-sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas-detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), and/or other components that may provide indications, measurements, signals, and/or the like that correspond to a surrounding physical environment. The position components 642 may include location-sensor components (e.g., a global positioning system (GPS) receiver), altitude-sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation-sensor components (e.g., magnetometers), and/or the like.
(74) Communication may be implemented using a wide variety of technologies. The I/O components 606 may further include communication components 644 operable to communicatively couple the machine 600 to a network 624 and/or devices 626 via a coupling 628 and/or a coupling 630, respectively. For example, the communication components 644 may include a network-interface component or another suitable device to interface with the network 624. In further examples, the communication components 644 may include wired-communication components, wireless-communication components, cellular-communication components, Near Field Communication (NFC) components, Bluetooth (e.g., Bluetooth Low Energy) components, Wi-Fi components, and/or other communication components to provide communication via one or more other modalities. The devices 626 may include one or more other machines and/or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a universal serial bus (USB) connection).
(75) Moreover, the communication components 644 may detect identifiers or include components operable to detect identifiers. For example, the communication components 644 may include radio frequency identification (RFID) tag reader components, NFC-smart-tag detection components, optical-reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar codes, multi-dimensional bar codes such as Quick Response (QR) codes, Aztec codes, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar codes, and/or other optical codes), and/or acoustic-detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 644, such as location via. Internet Protocol (IP) geolocation, location via Wi-Fi signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and/or the like.
(76) One or more of the various memories (e.g., the memory 604, the main memory 616, the static memory 618, and/or the memory of the processors 602) and/or the storage unit 620 may store one or more sets of instructions and data structures (e.g., software) embodying or used by any one or more of the methodologies or functions described herein. These instructions (e.g., the instructions 612), when executed by processors 602, cause various operations to implement the disclosed embodiments.
(77) The instructions 612 may be transmitted or received over the network 624, using a transmission medium, via a network-interface device (e.g., a network-interface component included in the communication components 644) and using any one of a number of well-known transfer protocols (e.g., the Session Initiation Protocol (SIP), the hypertext transfer protocol (HTTP), and/or the like). Similarly, the instructions 612 may be transmitted or received using a transmission medium via the coupling 630 (e.g., a peer-to-peer coupling) to the devices 626.
(78)
(79) The operating system 712 manages hardware resources and provides common services. The operating system 712 includes, for example, a kernel 724, services 726, and drivers 728. The kernel 724 acts as an abstraction layer between the hardware and the other software layers. For example, the kernel 724 may provide memory management, processor management (e.g., scheduling), component management, networking, and/or security settings, in some cases among other functionality. The services 726 can provide other common services for the other software layers. The drivers 728 are responsible for controlling or interfacing with the underlying hardware. For instance, the drivers 728 can include display drivers, camera drivers, Bluetooth or Bluetooth Low Energy drivers, flash memory drivers, serial communication drivers USB drivers), Wi-Fi drivers, audio drivers, power management drivers, and/or the like.
(80) The libraries 714 provide a low-level common infrastructure used by the applications 718. The libraries 714 can include system libraries 730 (e.g., C standard library) that provide functions such as memory-allocation functions, string-manipulation functions, mathematic functions, and/or the like. In addition; the libraries 714 can include API libraries 732 such as media libraries (e.g., libraries to support presentation and/or manipulation of various media formats such as Moving Picture Experts Group-4 (MPEG4), Advanced Video Coding (H.264 or AVC), Moving Picture Experts Group Layer-3 (MP3), Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR) audio codec, Joint Photographic Experts Group (JPEG or JPG), Portable Network Graphics (PNG), and/or the like), graphics libraries (e.g., an OpenGL framework used to render in two dimensions (2D) and three dimensions (3D) in a graphic content on a display), database libraries (e.g., SQLite to provide various relational-database functions), web libraries (e.g., WebKit to provide web-browsing functionality), and/or the like. The libraries 714 can also include a wide variety of other libraries 734 to provide many other APIs to the applications 718.
(81) The frameworks 716 may provide a high-level common infrastructure that is used by the applications 718. For example, the frameworks 716 may provide various graphical user interface (GUI) functions, high-level resource management, high-level location services, and/or the like. The frameworks 716 can provide a broad spectrum of other APIs that can be used by the applications 718, some of which may be specific to a particular operating system or platform.
(82) Purely as representative examples, the applications 718 may include a home application 742, a contacts application 736, a browser application 738, a book-reader application 740, a location application 746, a media application 748, a messaging application 750, a game application 752, and/or a broad assortment of other applications generically represented in
(83) TABLE-US-00001 TABLE 1 Example Features: Feature Name Definition Significance Access Access recertification process Access recertification Recertif- in place. Authorization is mitigates risk of application- ication granting of permissions to an security violations authenticated user or account to access functions within the application. Authorization may include the level of access to be allowed such as “read only” or “update.” For example: a manager may have permissions to update salary information and a delegate may only have the ability to view salary information. Reliability Over the past year, how often This captures the (Frequency the application has produced application’s effectiveness at of Defects) incorrect results given correct providing accurate results inputs, or produced incorrect results because of failure to detect invalid inputs (e.g., duplicate postings, using yesterday’s file input, accepting the same online transaction twice, accepting invalid inputs in an online transaction, etc.) Number of Number of active SOX SOX controls are mandated Active Controls by Congress under the Sarbanes- reformed regulatory Oxley standards. They are designed (SOX) to protect investors from the Controls possibility of fraudulent accounting activities by corporations. Application The unique identifier Application Key uniquely Key identifies the application/metric month combo for creating the model and joining the model results back to the master data set for presentation Application Estimated number of years Prolonged need for Life until the application will be retirement or modernization Span retired or require substantial may pose application investment for modernization. security risk due to outdated technology and relevancy Number of Number of 3rd-party risk Past-due third party risk Third- assessments that are past due assessments indicate Party Risk potential for unidentified Assessments risks with vendor Past Due Automated Number of automated Automated controls are Controls Controls more effective than Manual controls, with less room for human error and higher efficiency Business Identifies whether the BCPs enable a business to Continuity application has a Business respond to accidents, Plan (BCP) Continuity Plan identified in disasters, emergencies, the system of record and/or threats without any stoppage or hindrance in its key operations. Without proper BCP in place, the organization cannot recover to an operational state in case of serious incidents or disasters. Areas exposed include Resilience, Recovery', and Contingency Vendor Is some or the majority of the If the application’s business Business application’s business logic logic is provided by vendor Logic provided by vendor software? software, it can be exposed Business logic does not to Third-Party Risk include middleware. Card Does the application store, Applications that store, Processing process, or transmit full credit process, or transmit credit or or debit-card account debit card numbers are numbers? exposed to cyber security threats and fraud risk Number of Open corrective actions that Applications with corrective Corrective have been flagged as at risk to actions at risk have Actions be completed by their due date acknowledged systemic at Risk issues to be resolved, and are encountering delays to closing out corrective actions according to schedule Detective Number of Controls that are Internal controls are either Controls Detective directive, preventive or detective. Detective controls are intended to uncover the existence of errors, inaccuracies or fraud that has already occurred. Directive Number of Controls that are Internal controls are either Controls Directive directive, preventive or detective. Directive controls are those designed to establish desired outcomes Number Number of Controls Failed Controls that are failing are of Failed doing very little or none of Controls what they are meant to do Key Number of Key Controls Key controls are internal Controls control that have a pervasive affect upon the accomplishment of management’s control objectives. Non-Key Number of Non-Key Controls Non-key controls mitigate Controls the low risk areas of an organization Not-Failing Number of Controls Not Controls that are NOT Controls Failed failing are doing mostly or all of what they are meant to do Number of Number of Controls not Controls that are not Non- reviewed reviewed are not assessed Reviewed for their effectiveness Controls Preventive Number of Preventive Internal controls are either Controls Controls directive, preventive or detective. Preventive controls are designed to prevent errors, inaccuracy or fraud before it occurs. Primary' Number of Primary- Controls Primary controls are the Controls foremost controls to mitigate risk Criticality The criticality of an Application criticality application reflects the application’s significance to the enterprise Distributed Indicator of application’s Understanding the type of Application using a distributed platform platform hosting the application is key to understanding the risks the application is exposed to Mainframe Indicator of application’s Understanding the type of Application using a mainframe platform platform hosting the application is key to understanding the risks the application is exposed to Customer An application is customer Customer facing application Facing facing if customers deal exposes the company to directly with it additional cyber security risk, as well as reputational risk. It also implies an increased number of users which increase the inherent risk. Data at Flag to identify if the data at Storing data that is not Rest rest is encrypted according to encrypted according to Encrypted policy. enterprise standards may According increase information security to Policy risks Is Data at Indicates whether or not the Encryption for data at rest is Rest application employs an a control for application Encrypted? encryption solution for data at security rest Data Indicates the classification of More sensitive data carries Classifi- the data used by the greater risk exposure than cation application less sensitive data Data in Flag to identify if the data in Transmitting data that is not Motion motion is encrypted according encrypted according to Encrypted to policy. enterprise standards may According increase information security to Policy risks Is Data in Indicates whether or not the Encryption for data in Motion application employs an motion is a control for app Encrypted? encryption solution for data in security motion Application is any portion of the DMZ hosting carries a DMZ application - including different risk exposure than Hosted servers, load balancers, traditionally hosted solutions proxies, and appliances - hosted in a DMZ Monthly Number of changes that have A larger number of changes Number of a lead time of “Emergency”. submitted to fix specific Emergency incidents is a trailing Changes indicator for an unhealthy application Vendor Inherent Risk identified from The engagement with the Engagement a relationship with a Third third party vendor has an Risk Party Vendor inherent risk that is part of Assessment the application’s overall Inherent inherent risk Risk Vendor Residual Risk identified from The engagement with the Engagement a relationship with a Third third party vendor has a Risk Party Vendor residual risk that contributes Assessment to the application’s overall Residual residual risk Risk Enterprise Authentication method exists Enterprise authentication is Authenti- to verify the identity of a an automated control to cation person, device, or entity, often prevent unauthorized access as a prerequisite to allowing to data and information. access to a system or facility. Monthly Number of changes that have A larger number of changes Number of a lead time of “Exception”. submitted against the group Exception policy change timeline Changes indicates processes not being followed as well as potential gaps in thorough testing Externally Flag to identify if the External facing applications Facing application directly supports can present additional other applications that reputational risk if sendees communicate externally over are not always available or Internet, VPN, or Extranet functioning as expected for connections customers. Externally Flag to identify if an External hosting can Hosted application is externally- introduce additional risk hosted, whether completely or compared to internal in part hosting, and represent a different risk portfolio Extranet Flag to identify if the External communications Commu- application communicates can present additional risk nication across private (Extranet) into an application connections with third parties Global Flag to identify if the Understanding the support Resources application is/was built, structure is critical to delivered and/or maintained understanding how the by resources located in one or application team is able to more particular countries respond to potential and actual failures Application The year that the application Implementation year is Impleme- was deployed important to consider for ntation modernization needs Year Access Flag to identify if the The presence of Access Related application has any access Related Issues may be a Incidents related incidents dependent variable for a predictive model. Patch Flag to identify if the The presence of Patch Related application has any patch Related Issues may be a Incidents related incidents dependent variable for a predictive model. Patch Related Issues can be indicative of insufficient testing and may cause interruptions in business availability Number Number of open issues that Issues represent known of Issues are flagged as being at risk to faults within an application’s at Risk be completed by the current function or operations, and due date having issues at risk of being completed within their due date increases the risk of those faults manifesting into material loss Number Number of corrective actions Open corrective actions of Open that are open related to the indicate a known risk has Corrective application not been completely Actions remediated IP Flag to identify if the IP address leakage can lead Address application stores or parses IP to additional targeted attacks Handling addresses Number of Number of open issues that Issues represent known Non Self- were not self-identified faults within application’s Identified function or operations, and Issues having a higher percentage of issues that are identified from outside certain business or technology units in the organization may indicate increased risk potential Number of Number of open issues that Issues represent known Issues Past are past their current due date faults within application’s Due function or operations, and having issues not completed by their target due date indicates a failure to mitigate those faults within a target period Access Flag to identify if the Access controls prevent Control application uses an Access unauthorized access to data Control System. An access and leakage of information, control system is often custom having a large number of developed, handling the different access control authentication and/or systems leads to difficulty in authorization capabilities for standardizing procedures another asset Open The number of open issues Open issues indicate a Issues related to this application known risk has not been completely remediated Mean Time The average time taken to Higher times taken to patch to deploy fixes to vulnerabilities vulnerabilities leads to a Vulner- once they are identified higher potential for ability vulnerabilities to be Reme- exploited diation VPN Flag to identify if the Understanding the Connections application communicates applications network across VPN connections connections is important to identify potential for leakage Monthly Number of changes that were A larger number of changes Number identified as having a negative that have a negative impact of Changes impact. A negative impact is reduces the ability of the with any non-beneficial impact that application to function as Negative was not described as a part of specified and can indicate Impact the business impact of the insufficient testing change Mainframe Flag to identify if the Understanding the type of Only application runs only on a platform hosting the mainframe application is key to understanding the risks the application is exposed to Support Flag to identify if the Whether an application has Group application has a documented an identified team to manage Recorded support group its health affects the application’s ability to proactively manage risks and respond in the event of failure On Publicly Flag to identify if the Infrastructure that is publicly Accessible application sits on a PAI accessible is exposed to Infra- increased cyber security risk structure (PAI) Number The number of total A larger number of of Unique vulnerabilities identified vulnerabilities Vulner- presents higher risk in terms abilities of a wider range of targets to exploit Publicly Flag to identify if the Web applications that are Accessible application is a PAA. PAAs publicly accessible are Application are web applications (e.g. web exposed to increased cyber (PAA) site, social media, etc.), web- security risk services, or mobile applications that are accessible from outside the corporate network over a publicly accessible network (e.g. Internet, cellular network) Platform Identifies if the application is The inherent and residual Group distributed, midrange, or risk of the application mainframe depend on the security of the underlying platform Change The number of staff with Change approval should be Approval change approval access limited to only a few Staff individuals to maintain the control effectiveness, if too many people have change approval access, then the change approval process will become irrelevant. Sudden reduction of Support The number of staff tech application support staff Staff support over time can lead to app management/ maintenance issues Privileged The type of privileged access Privileged access control Access to identify if user entitlements prevent unauthorized access Type or roles are maintained to data and dissemination of information. Public Flag to identify if the Applications that Internet application communicates communicate across the across the public internet public internet are exposed to increased cyber security risk Risk The number of vulnerabilities This represents the Vulner- intersection between the abilities number of vulnerabilities and the number of applications affected by those vulnerabilities. Recovery Flag to identify whether the An identified gap in Time application has BCP failure RTO/RPO/RTC indicates Objective (RTO/RPO/RTC Gaps) risk in the organization’s (RTO), Resilience, Recovery, and Recovery Contingency capabilities Point Objective (RPO), or Recovery Time Capability (RTC) Gaps Service Flag to identify whether the The level of security for all Accounts application uses sendee manner of accounts is a very' accounts that are specific to important aspect of any the application network security initiative. Business Assessment of how well this Suitability is important to Suitability application meets current operational efficiency and business needs appropriate allocation of resources Third Party Does Third Party Server Third Party server side code Server contain code? is additional channel of Side Code susceptibility for vulnerabilities and must be appropriately managed Application Recovery Time Objective Application Tiers may RTO represent a reduced number of categories derived from the applications RTO used for modeling purposes. User Flag to identify if there is a Leaving inactive users Access capability or process in place accounts open increases the Suspension for disabling or suspending inherent risk, and exposes Process application user access after, institutions to fraudsters e.g., 90 days of inactivity stealing inactive accounts to gain access to the internal network Log of Log of the number of users of The log of the number of Users the application users helps reduce the Affected disparity between the smallest and largest Non- Number of vulnerabilities that The number vulnerabilities Compliant are identified as non- outside of compliance is a Vulner- compliant metric to understand abilities remediations completed vs. planned, and lack of compliance to deadlines AIX Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with an OS is important to identify abilities AIX operating system (OS) risk by Operating System HP-UX Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with an HP- OS is important to identify abilities UX OS risk by Operating System Linux Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with a OS is important to identify abilities Linux OS risk by Operating System Solaris Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with a OS is important to identify abilities Solaris OS risk by Operating System VMWare Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with a OS is important to identify abilities VMWare OS risk by Operating System Windows Number of vulnerabilities on Vulnerability breakdown by Vulner- computer systems with a OS is important to identify abilities Windows OS risk by Operating System Number Number of vulnerabilities Overdue vulnerabilities of Overdue for Patches introduce a risk to Overdue application security that Vulner- should have been resolved abilities by remediation processes Number of Number of overdue Overdue vulnerabilities Overdue vulnerabilities that do not without an exception Vulner- have an exception introduce a risk to abilities application security that without should have been resolved Exception by remediation processes Number of Number of vulnerabilities that The number of Vulner- require a patch for vulnerabilities requiring abilities remediation patches to be fixed is useful requiring for creating patching a patch schedules and understanding capacity requirements Application Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the Asset Class is important to abilities Application product platform identifying concentration by Asset Type Database Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the Asset Class is important to abilities Database product platform identifying concentration by Asset Type Firmware Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the Asset Class is important to abilities Firmware product platform identifying concentration by Asset Type Middleware Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the Asset Class is important to abilities Middleware product platform identifying concentration by Asset Type OS Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the OS Asset Class is important to abilities product platform identifying concentration by Asset Type Other Number of vulnerabilities Vulnerability breakdown by Product classified as part of an Asset Class is important to Vulner- “Other” product platform identifying concentration by abilities Asset Type PC Number of vulnerabilities Vulnerability breakdown by Vulner- classified as part of the PC Asset Class is important to abilities product platform identifying concentration by Asset Type Emergency Number of vulnerabilities Counts by a threat score Severity classified with a severity adds context around the Vulner- rating of Emergency severity of vulnerabilities abilities being identified High Number of vulnerabilities Counts by a threat score Severity classified with a severity adds context around the Vulner- rating of High severity of vulnerabilities abilities being identified Low Number of vulnerabilities Counts by a threat score Severity classified with a severity- adds context around the Vulner- rating of Low severity of vulnerabilities abilities being identified Medium Number of vulnerabilities Counts by a threat score Severity classified with a severity- adds context around the Vulner- rating of Medium severity of vulnerabilities abilities being identified Software Number of software that are Past EOL introduces risk not past past institution-specific EOL exposure through institution- but not retired within an app unaddressed security gaps in specific software code end of life (EOL) Monthly Number of software that are Past EOL and/or retirement Software past institution-specific date introduces risk past retirement date and retired exposure through institution- within an app unaddressed security gaps in specific software code Retirement Date Software Number of software that are Past EOL introduces risk with past institution-specific EOL exposure through Unknown and unknown in retirement unaddressed security gaps in institution- status within an app software code specific EOL status Third Party Indicates whether an Applications hosted by Hosted application is Third Party Third Party Vendors can Application Hosted have a greater inherent risk
(84) To promote an understanding of the principles of the present disclosure, various embodiments are illustrated in the drawings. The embodiments disclosed herein are not intended to be exhaustive or to limit the present disclosure to the precise forms that are disclosed in the above detailed description. Rather, the described embodiments have been selected so that others skilled in the art may utilize their teachings. Accordingly, no limitation of the scope of the present disclosure is thereby intended.
(85) In any instances in this disclosure, including in the claims, in which numeric modifiers such as first, second, and third are used in reference to components, data (e.g., values, identifiers, parameters, and/or the like), and/or any other elements, such use of such modifiers is not intended to denote or dictate any specific or required order of the elements that are referenced in this manner. Rather, any such use of such modifiers is intended to assist the reader in distinguishing elements from one another, and should not be interpreted as insisting upon any particular order or carrying any other significance, unless such an order or other significance is clearly and affirmatively explained herein.
(86) Moreover, consistent with the fact that the entities and arrangements that are described herein, including the entities and arrangements that are depicted in and described in connection with the drawings, are presented as examples and not by way of limitation, any and all statements or other indications as to what a particular drawing “depicts,” what a particular element or entity in a particular drawing or otherwise mentioned in this disclosure “is” or “has,” and any and all similar statements that are not explicitly self-qualifying by way of a clause such as “In at least one embodiment,” and that could therefore be read in isolation and out of context as absolute and thus as a limitation on all embodiments, can only properly be read as being constructively qualified by such a clause. It is for reasons akin to brevity and clarity of presentation that this implied qualifying clause is not repeated ad museum in this disclosure.