US 11,947,444 B2
Sharing insights between pre and post deployment to enhance cloud workload security
Fady Copty, Nazareth (IL); Omri Soceanu, Haifa (IL); Gilad Ezov, Nesher (IL); and Ronen Levy, Haifa (IL)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Nov. 6, 2020, as Appl. No. 17/091,386.
Prior Publication US 2022/0147635 A1, May 12, 2022
Int. Cl. G06F 11/36 (2006.01); G06F 8/71 (2018.01)
CPC G06F 11/3636 (2013.01) [G06F 8/71 (2013.01); G06F 11/3612 (2013.01); G06F 11/3616 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, implemented in a computer system comprising a processor, a memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, the method comprising:
generating a first performance and security information relating to a software system during a development of the software system, wherein generating the first performance and security information relating to the software system during the development of the software system comprises performing a static and dynamic testing of code of the software system during the development of the software system to generate a history of one or more generated alerts;
generating a second performance and security information relating to the software system during a deployed operation of the software system;
matching the first performance and security information relating to the software system generated during the development of the software system with the second performance and security information relating to the software system generated during the deployed operation of the software system to determine one or more performance and security alerts to escalate; and
reporting the one or more escalated performance and security alerts.