US 12,294,597 B2
Method of implementing enterprise cyber reports
David Michael Vigna, Sterling, VA (US)
Filed by David Michael Vigna, Sterling, VA (US)
Filed on Apr. 11, 2022, as Appl. No. 17/658,746.
Application 17/658,746 is a continuation in part of application No. 15/929,388, filed on Apr. 30, 2020, granted, now 11,301,241.
Claims priority of provisional application 62/862,997, filed on Jun. 18, 2019.
Prior Publication US 2022/0377092 A1, Nov. 24, 2022
Int. Cl. H04L 29/06 (2006.01); G06F 11/30 (2006.01); G06Q 50/26 (2012.01); H04L 9/40 (2022.01)
CPC H04L 63/1425 (2013.01) [G06Q 50/265 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01)] 10 Claims
OG exemplary drawing
 
1. A collaborative workflow method for functional and technical teams to proactively improve cyber security of a computer network for a plurality of user groups sharing web applications over the computer network, the collaborative workflow method comprises:
providing network traffic monitoring tools to each user group of the plurality of user groups, through which each team of the functional and technical teams independently defines a set of access rules indicative of at least one normal event for each of said shared web application for each user groups
linking each set of access rules with error and audit tables of an associated shared web application, wherein the error and audit tables are configured to be compartmentalized by the shared web applications;
creating one or more allowed and normal usage baselines for each user group by comparing network traffic against each set of access rules defined by the user group; and
defining one or more firewall rules on a user-group basis based on the one or more allowed and normal usage baselines.