US 11,755,717 B2
Security compliance for a secure landing zone
Adam Robert Geiger, Cary, NC (US); Nataraj Nagaratnam, Cary, NC (US); Dinakaran Joseph, Apex, NC (US); Michael S. Law, Morrisville, NC (US); Priyank Narvekar, St. John's (CA); and Hillery Hunter, Chappaqua, NY (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Mar. 18, 2021, as Appl. No. 17/205,814.
Prior Publication US 2022/0300603 A1, Sep. 22, 2022
Int. Cl. G06F 21/52 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/52 (2013.01) [G06F 21/6209 (2013.01); G06F 2221/032 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for configuring a provisioned computing environment, the method comprising: identifying, by a computer system, a pattern from a pattern catalog, wherein each pattern in the pattern catalog comprises information for a configuration of the provisioned computing environment to comply with a security policy to run an application in the provisioned computing environment; creating, by the computer system, a configuration profile based on the pattern, for the provisioned computing environment that is to be deployed in which the provisioned computing environment meets the security policy to run the application in the provisioned computing environment; determining, by the computer system, whether the configuration profile for the provisioned computing environment meets the security policy for running the application in the provisioned computing environment; and deploying, by the computer system, the configuration profile for the provisioned computing environment to configure the provisioned computing environment for the application in response to the configuration profile meeting the security policy.