CPC H04L 63/205 (2013.01) [G06F 21/604 (2013.01); H04L 63/0876 (2013.01); H04L 63/101 (2013.01)] | 17 Claims |
1. A computer-implemented method for providing controlled access to a system by a user device, the method comprising:
receiving a request for access to a computing resource, the request including a current context, the current context defining a user space and a resource space;
evaluating, by the user device, the current context against a security policy,
wherein the security policy comprises a default security policy and one or more custom security policies;
wherein the one or more custom security policies include fewer rules than the default security policy including differences from the default security policy; and
wherein the evaluating includes merging, by the user device, the default security policy and the one or more custom security policies;
determining that the user device is permitted to access the computing resource based on the request in response to the evaluating the current context against the security policy; and
in response to determining that the user device is permitted to access the computing resource, accessing the computing resource as requested.
|