Claims
- 1. A method for providing security for an intrusion detection system in a provisionable network, said method comprising:
evaluating the system security of said provisionable network; and applying a system lockdown in said provisionable network in accordance with results of said evaluating.
- 2. The method for providing security described in claim 1 wherein said intrusion detection system is implemented as a host intrusion detection system.
- 3. The method for providing security described in claim 2 wherein said host intrusion detection system is implemented as software resident in a utility data center.
- 4. The method for providing security described in claim 1 wherein said intrusion detection system is implemented as a network intrusion detection system.
- 5. The method for providing security described in claim 1 wherein said provisionable network comprises a utility data center.
- 6. The method for providing security described in claim 1 wherein said provisionable network comprises a resource pool.
- 7. The method for providing security described in claim 1 wherein said provisionable network comprises a resource manager.
- 8. The method for providing security described in claim 1 wherein said provisionable network comprises a network intrusion detection system.
- 9. The method for providing security described in claim 1 wherein said intrusion detection system comprises a dedicated hardware device.
- 10. The method for providing security described in claim 1 wherein said intrusion detection system comprises software resident in said provisionable network.
- 11. The method for providing security described in claim 1 wherein said evaluating said system security comprises determining the portions of said provisionable network necessary to the functioning of said intrusion detection system.
- 12. The method for providing security described in claim 1 wherein said applying said system lockdown comprises disabling unused provisionable services.
- 13. The method for providing security described in claim 1 wherein said applying said system lockdown comprises disabling unused non-provisionable services.
- 14. The method for providing security described in claim 1 wherein said applying said system lockdown comprises protecting files and directories critical to the operating system.
- 15. The method for providing security described in claim 1 wherein said applying said system lockdown comprises protecting files and directories critical to intrusion detection sensor software.
- 16. The method for providing security described in claim 1 wherein said applying said system lockdown comprises disabling an administrative user login.
- 17. The method for providing security described in claim 16 wherein said disabling an administrative user login comprises disabling a root directory.
- 18. The method for providing security described in claim 1 wherein said applying said system lockdown comprises disabling a change to a system registry entry.
- 19. The method for providing security described in claim 1 wherein said applying said system lockdown comprises performing a change to a system registry entry.
- 20. The method for providing security described in claim 1 wherein said applying said system lockdown comprises disabling communication on a selected communication port.
- 21. A system for providing security for an intrusion detection system in a provisionable network, comprising:
a local area network comprising a server; an intrusion detection system manager communicatively coupled with said local area network; and an intrusion detection system sensor enabled to detect and respond to an intrusion in said local area network.
- 22. The system described in claim 21 wherein said local area network comprises an operations center of said provisionable network.
- 23. The system described in claim 21 wherein said intrusion detection system comprises a host intrusion detection system.
- 24. The system described in claim 23 wherein said host intrusion detection system comprises software resident in a hardware device.
- 25. The system described in claim 21 wherein said intrusion detection system comprises a network intrusion detection system.
- 26. The system described in claim 25 wherein said network intrusion detection system comprises a dedicated hardware device.
- 27. The system described in claim 21 wherein said provisionable network comprises a utility data center.
- 28. The system described in claim 21 wherein said provisionable network comprises a resource pool.
- 29. The system described in claim 21 wherein said provisionable network comprises a resource manager.
- 30. The system described in claim 21 wherein said intrusion detection system sensor is enabled to detect an intrusion directed to said intrusion detection system.
- 31. The system described in claim 21 wherein said intrusion detection system is enabled to initiate a response to a risk of intrusion, said response comprising applying a system lockdown.
- 32. The system described in claim 31 wherein said applying said system lockdown comprises disabling unused provisionable services.
- 33. The system described in claim 31 wherein said applying said system lockdown comprises protecting files and directories critical to the operating system.
- 34. The system described in claim 31 wherein said applying said system lockdown comprises protecting files and directories critical to the intrusion detection sensor software.
- 35. The system described in claim 31 wherein said applying said system lockdown comprises disabling a change to a system registry entry.
- 36. The system described in claim 31 wherein said applying said system lockdown comprises performing a change to a system registry entry.
- 37. The system described in claim 31 wherein said applying said system lockdown comprises disabling communication on a selected communication port.
- 38. The system described in claim 31 wherein said applying said system lockdown comprises disabling an administrative user login.
- 39. The system described in claim 38 wherein said disabling an administrative user login comprises disabling a root directory.
- 40. An intrusion detection system enabled to detect an intrusion in a provisionable network, comprising:
intrusion detection software resident in a network device; a trust hierarchy enabled to communicate with said software and to cause evaluation of a detected intrusion; an intrusion detection sensor; and a network device enabled to generate a response to a detected intrusion.
- 41. The intrusion detection system described in claim 40 wherein said system is resident in an operations center local area network.
- 42. The intrusion detection system described in claim 40 wherein said trust hierarchy is configurable.
- 43. The intrusion detection system described in claim 40 wherein said intrusion detection system sensor is a hardware device.
- 44. The intrusion detection system described in claim 40 wherein said intrusion detection system sensor is implemented as software resident in a hardware device.
- 45. The intrusion detection system described in claim 40 wherein said response to a detected intrusion comprises a system lockdown.
RELATED U.S. APPLICATION
[0001] This application incorporates herein by reference the co-pending patent application, Attorney Docket Number HP-200209593-1, entitled “A System For Protecting Security Of A Provisionable Network,” filed concurrently herewith, and assigned to the assignee of the present application.