US 11,789,844 B2
Container deployment with visual security profile
Venkata Vara Prasad Karri, Visakhapatnam (IN); Sarbajit K. Rakshit, Kolkata (IN); Akash U. Dhoot, Pune (IN); and Nitika Sharma, Punjab (IN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Oct. 22, 2021, as Appl. No. 17/451,824.
Prior Publication US 2023/0125755 A1, Apr. 27, 2023
Int. Cl. G06F 11/32 (2006.01); G06F 21/57 (2013.01); G06F 9/455 (2018.01); G06F 11/34 (2006.01)
CPC G06F 11/321 (2013.01) [G06F 9/45558 (2013.01); G06F 11/3457 (2013.01); G06F 21/577 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45587 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method (CIM) comprising:
receiving, from a security profile library and to a visualization engine, a plurality of security profiles, with each security profile of the plurality of security profiles being represented as a three-dimensional (3D) visual diagram;
determining a set of spatial intersections amongst the plurality of security profiles;
deploying a plurality of containers in the set of spatial intersections, with at least one container of the plurality of containers being deployed in at least one of the spatial intersections; and
responsive to the deployment of the plurality of containers in the set of spatial intersections, configuring the at least one container being deployed with the security profiles corresponding to the at least one spatial intersection.