| CPC G06F 21/554 (2013.01) [G06F 21/105 (2013.01); G06F 21/57 (2013.01)] | 7 Claims |

|
1. A method for processing trust and security for leased infrastructure, the method comprising:
initiating, before a start of a lease of the leased infrastructure, execution of:
tamper verification and proofing of the leased infrastructure;
data sanitation of data stored in the leased infrastructure; and
integrity verification of a basic input/output system (BIOS) and firmware configuration of the leased infrastructure, to determine that all components of the leased infrastructure fall within a trusted domain;
detecting, after the start of the lease of the leased infrastructure and by an event detection engine of a first computing device, a first audit event directed to the leased infrastructure, wherein:
event detection engine is continuously monitoring activities recorded in one or more event logs of a second computing device to determine if the leased infrastructure has been changed in anyway, or the event detection engine is continuously monitoring one or more configurations of a plurality of systems of the leased infrastructure for a change in the one or more configurations;
in response to detecting the first audit event: executing, by a trust verification engine of the first computing device, an execution of a first trust audit to generate a first audit result;
making a first determination, based on the first audit result and by the first computing device, that the first audit event is a verified event;
transmitting, by a notification engine of the first computing device, in response to the first determination, and to a third computing device of a user leasing the leased infrastructure, first instructions for the third computing device to display a first output notifying the user that the leased infrastructure is in the trusted domain, wherein the third computing device executes the first instructions and displays the first output to the user and wherein the third computing device is operatively connected to the first computing device;
detecting, by the event detection engine of the first computing device, a second audit event directed to the leased infrastructure, wherein the event detection engine is further continuously monitoring activities recorded in the one or more event logs of the second computing device to determine if the leased infrastructure has been changed in any way;
in response to detecting the second audit event: executing, by the trust verification engine of the first computing device, an execution of a second trust audit to generate a second audit result;
making a second determination, by the first computing device and based on the second audit result, that the second audit event is a non-verified event;
transmitting, by the notification engine of the first computing device, in response to the second determination, and to the third computing device of the user leasing the leased infrastructure, second instructions for the third computing device to display a second output notifying the user that the leased infrastructure is in an untrusted domain, wherein the third computing device executes the second instructions and displays the second output to the user; and
making a third determination directed to a billing and lease validation of the leased infrastructure based on whether the leased infrastructure is in the trusted domain or the untrusted domain.
|