US 12,293,393 B2
Predictive service orchestration using threat modeling analytics
Asmahan Ali, Poughkeepsie, NY (US); Mustafa Mah, Poughkeepsie, NY (US); Abhishek Jain, Baraut (IN); and Sasikanth Eda, Vijayawada (IN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on May 24, 2022, as Appl. No. 17/664,718.
Prior Publication US 2023/0385889 A1, Nov. 30, 2023
Int. Cl. G06Q 30/0601 (2023.01)
CPC G06Q 30/0609 (2013.01) 15 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
causing, by a processor, a plurality of commands to be performed at a client computing environment having vendor storage systems, at least some of the vendor storage systems having different physical configurations than other ones of the vendor storage systems;
identifying, by the processor, a plurality of attributes of the vendor storage systems of the client computing environment;
collecting, by the processor over a network, threat modeling content relating to the plurality of commands performed on the vendor storage systems;
analyzing, by the processor and using natural language processing, the threat modeling content to identify one or more vulnerabilities associated with one or more vendor storage systems of the vendor storage systems;
comparing, by the processor, the analyzed threat modeling content with the plurality of attributes of the client computing environment;
identifying, by the processor and based on the comparing, one or more security gaps associated with the client computing environment;
generating, by the processor and based on the identifying, a client threat model for the client computing environment;
generating, by the processor, a ranking value for the client threat model, wherein the ranking value is based in part on a confidence level between the client threat model and the threat modeling content;
comparing, by the processor, the ranking value to an orchestration threshold;
causing changes to be made to one or more of the plurality of attributes of the client computing environment in response to the ranking value not meeting the orchestration threshold;
in response to the changes being made to the one or more attributes, re-evaluating the client threat model; and
orchestrating, by the processor and in response to the ranking value meeting the orchestration threshold, at least one container of the client computing environment based on the client threat model.