| CPC G06F 21/577 (2013.01) [G06F 2221/034 (2013.01)] | 20 Claims |

|
1. A method for controlling access to resources in a zero-trust computing environment, the method comprising:
tracking requests for access to a plurality of resources of the zero-trust computing environment, wherein the tracking comprises monitoring determinations to grant access to a first of the plurality resource and monitoring determinations to deny access to the first resource;
based on the tracked requests, calculating an identity tenant trust score for the first resource based on users that request access to the first resource and further based on a number of granted requests and a number of denied requests by users to access the first resource;
based on the tracked requests, calculating a hardware tenant trust score for the first resource based on hardware that request access to the first resource and further based on a number of granted requests and a number of denied requests by hardware to access the first resource;
based on the tracked requests, calculating a software tenant trust score for the first resource based on software applications that request access to the first resource and further based on a number of granted requests and a number of denied requests by software applications to access the first resource;
aggregating the identity tenant trust score, hardware tenant trust score and software tenant trust score to generate a trust score for the first resource;
receiving a request from a first user for access to the first resource; and
evaluating the request from the first user based on one or more policies of the zero-trust computing environment that govern access to the first resource, where a first policy grants access to the first resource based in part on the trust score of the first resource.
|