US 11,863,580 B2
Modeling application dependencies to identify operational risk
Colin Ross, Arlington, TX (US); Marc Woolward, Bude (GB); and Keith Stewart, San Francisco, CA (US)
Assigned to vArmour Networks, Inc., Los Altos, CA (US)
Filed by vArmour Networks, Inc., Los Altos, CA (US)
Filed on Dec. 23, 2020, as Appl. No. 17/133,466.
Application 17/133,466 is a continuation in part of application No. 16/428,828, filed on May 31, 2019, granted, now 11,575,563.
Prior Publication US 2021/0120029 A1, Apr. 22, 2021
Int. Cl. H04L 9/40 (2022.01); G06F 16/901 (2019.01); G06F 9/54 (2006.01); G06F 16/23 (2019.01)
CPC H04L 63/1433 (2013.01) [G06F 9/542 (2013.01); G06F 16/2379 (2019.01); G06F 16/9024 (2019.01); H04L 63/20 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method for modeling application dependencies to identify operational risk, the method comprising:
gathering, by a processor, data about applications and computing systems in a cloud computing environment or in an enterprise datacenter;
updating, by the processor, a graph database using the data including the graph database representing relationships as mapped between the applications in the cloud computing environment or in the enterprise datacenter;
using logic to analyze, by the processor, the data in the graph database to identify, based on the relationships, operational mismatches as mapped between operational requirements set for at least one application of the applications and operational requirements set for at least one further application of the applications in the cloud computing environment or in the enterprise datacenter;
deploying, by the processor, an alert for the identified operational mismatches;
creating an operations policy based on a difference between a recovery time objective and the recovery time objective on a dependent system; and
validating the operations policy by simulating the operations policy using the graph database, the validating the operations policy comprising:
determining a level of entropy in the cloud computing environment; and
determining a reliability score and at least one recommendation for the operations policy based on the level of entropy.