US 12,248,585 B2
Runtime risk assessment to protect storage systems from data loss
Senthil Ponnuswamy, San Jose, CA (US); Mahadev Karadigudda, San Jose, CA (US); Madhu Agrahara Gopalakrishna, Fremont, CA (US); and Praveen Kumar Lakkimsetti, Hayward, CA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jan. 14, 2022, as Appl. No. 17/576,115.
Prior Publication US 2023/0229792 A1, Jul. 20, 2023
Int. Cl. G06F 21/60 (2013.01); G06F 21/55 (2013.01)
CPC G06F 21/604 (2013.01) [G06F 21/554 (2013.01); G06F 2221/2101 (2013.01); G06F 2221/2137 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
monitoring a time of a system administration event in a data storage system, wherein the system administration event comprises one of: a creation of a security officer role in the data storage system, a change of system time of the data storage system, and a disabling of alerts in the data storage system;
determining whether or not a data destruction command is attempted within a time window after the system administration event;
checking for one or more de-risking factors justifying attempting the data destruction command within the time window, wherein the de-risking factors comprise a recency of installation or re-installation of the data storage system and a percentage amount of data capacity ingestion in the data storage system;
allowing the data destruction command to execute if it is attempted after the time window and there are no de-risking factors; and
disallowing the data destruction command from executing if it is attempted within the time window and there are de-risking factors.