Abstract: A second communication unit ( 411) of a security management apparatus (201) exterally receives dependency infrmation (412) indicating a dependence relation between infrmation assets individually held by a frst system and a second system. Then, a selection unit (415) of the security management apparatus (201) selects a security measure to be implemented, fom among candidates fr a security measure against a threat to an infrmation asset held by the fst system, in accordance with a dependence relation indicated by the dependency infrmation (412) received by the second comunication unit ( 411 ).
We Claim:
[Claim I]
A security management apparatus comprising:
a communication unit to exterally receive dependency infrmation indicating a dependence relation among infrmation assets idividually held by a fst system and one or more second systems diferent fom the fst system; and
a selection unit to select a security measure to be implemented fom candidates fr a security measure against a threat to an infrmation asset held by the frst system, in accordance with a dependence relation indicated by the dependency infrmation received by the comunication unit.
[Claim 2]
The security management apparatus according to claim l, wherein the selection unit selects, as a security measure to be implemented, a security measure that is to limit an access source to a frst infrmation asset that is an infrmation asset held by the frst system, to a second system holding a second infrmation asset that is an infrmation asset dependent on the frst infrmation asset.
[Claim 3]
The security management apparatus according to claim 1 or 2, frher compnsmg:
a generation unit to generate a relation tree that is data to defne the dependence relation in a tree strcture, fom the dependency infrmation, wherein
the selection unit refrs to a relation tree generated by the generation unit to specify the dependence relation.
[Claim 4]
The security management apparatus according to any one of claims 1 to 3, wherein
the dependency information includes information indicating an importance of an information asset held by the first system with respect to an information asset of a dependent source,
the security management apparatus further comprises a calculation unit to calculate an evaluation value of the candidates from an importance indicated with the dependency information, and
the selection unit selects a security measure to be implemented in accordance with not only the dependence relation, but also an evaluation value calculated by the calculation unit.
[Claim 5]
The security management apparatus according to any one of claims 1 to 4, further comprising an extraction unit to extract, for each security measure, an index value of each of the candidates from a database storing an index values for selecting a security measure, wherein
the selection unit selects, as a security measure to be implemented, a security measure whose index value extracted by the extraction unit satisfies a condition.
[Claim 6]
The security management apparatus according to claim 5, wherein the communication unit externally receives information indicating the
condition.
[Claim 7]
The security management apparatus according to any one of claims 1 to 6, further comprising a detection unit to detect a change in a configuration of the first system, wherein
the selection unit selects a security measure to be implemented in accordance with not only the dependence relation, but also a change detected by the detection unit.
[Claim 8]
The security management apparatus according to any one of claims 1 to 7, wherein
the security management apparatus is included in the first system, and shares the dependency information with other security management apparatus included in the one or more second systems.
[Claim 9]
A central security management apparatus for aggregating the dependency information from the security management apparatus according to any one of claims 1 to 7 included in the first system, and from other security management apparatus included in the one or more second systems.
[Claim 10]
A security management method comprising:
externally receiving, by a communication unit, dependency information
indicating a dependence relation among information assets individually held by a first system and one or more second systems different from the first system; and
selecting, by a selection unit, a security measure to be implemented from candidates for a security measure against a threat to an information asset held by the first system, in accordance with a dependence relation indicated by the dependency information received by the communication unit.
[Claim 11]
A security management program for causing
a computer to execute:
processing for externally receiving dependency information indicating a dependence relation among information assets individually held by a first system and one or more second systems different from the first system; and
processing for selecting a security measure to be implemented from candidates for a security measure against a threat to an information asset held by the first system, in accordance with a dependence relation indicated by the dependency information.
| # | Name | Date |
|---|---|---|
| 1 | 201847042378-FER.pdf | 2021-10-17 |
| 1 | 201847042378-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [12-11-2018(online)].pdf | 2018-11-12 |
| 2 | 201847042378-FORM 3 [12-04-2019(online)].pdf | 2019-04-12 |
| 2 | 201847042378-STATEMENT OF UNDERTAKING (FORM 3) [12-11-2018(online)].pdf | 2018-11-12 |
| 3 | 201847042378-REQUEST FOR EXAMINATION (FORM-18) [12-11-2018(online)].pdf | 2018-11-12 |
| 3 | 201847042378-AMMENDED DOCUMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 4 | 201847042378-PROOF OF RIGHT [12-11-2018(online)].pdf | 2018-11-12 |
| 4 | 201847042378-FORM 13 [19-11-2018(online)].pdf | 2018-11-19 |
| 5 | 201847042378-POWER OF AUTHORITY [12-11-2018(online)].pdf | 2018-11-12 |
| 5 | 201847042378-MARKED COPIES OF AMENDEMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 6 | 201847042378-RELEVANT DOCUMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 6 | 201847042378-FORM 18 [12-11-2018(online)].pdf | 2018-11-12 |
| 7 | Correspondence by Agent_Form1_15-11-2018.pdf | 2018-11-15 |
| 7 | 201847042378-FORM 1 [12-11-2018(online)].pdf | 2018-11-12 |
| 8 | 201847042378.pdf | 2018-11-13 |
| 8 | 201847042378-DRAWINGS [12-11-2018(online)].pdf | 2018-11-12 |
| 9 | 201847042378-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [12-11-2018(online)].pdf | 2018-11-12 |
| 9 | 201847042378-DECLARATION OF INVENTORSHIP (FORM 5) [12-11-2018(online)].pdf | 2018-11-12 |
| 10 | 201847042378-COMPLETE SPECIFICATION [12-11-2018(online)].pdf | 2018-11-12 |
| 11 | 201847042378-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [12-11-2018(online)].pdf | 2018-11-12 |
| 11 | 201847042378-DECLARATION OF INVENTORSHIP (FORM 5) [12-11-2018(online)].pdf | 2018-11-12 |
| 12 | 201847042378-DRAWINGS [12-11-2018(online)].pdf | 2018-11-12 |
| 12 | 201847042378.pdf | 2018-11-13 |
| 13 | 201847042378-FORM 1 [12-11-2018(online)].pdf | 2018-11-12 |
| 13 | Correspondence by Agent_Form1_15-11-2018.pdf | 2018-11-15 |
| 14 | 201847042378-FORM 18 [12-11-2018(online)].pdf | 2018-11-12 |
| 14 | 201847042378-RELEVANT DOCUMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 15 | 201847042378-MARKED COPIES OF AMENDEMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 15 | 201847042378-POWER OF AUTHORITY [12-11-2018(online)].pdf | 2018-11-12 |
| 16 | 201847042378-FORM 13 [19-11-2018(online)].pdf | 2018-11-19 |
| 16 | 201847042378-PROOF OF RIGHT [12-11-2018(online)].pdf | 2018-11-12 |
| 17 | 201847042378-AMMENDED DOCUMENTS [19-11-2018(online)].pdf | 2018-11-19 |
| 17 | 201847042378-REQUEST FOR EXAMINATION (FORM-18) [12-11-2018(online)].pdf | 2018-11-12 |
| 18 | 201847042378-FORM 3 [12-04-2019(online)].pdf | 2019-04-12 |
| 19 | 201847042378-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [12-11-2018(online)].pdf | 2018-11-12 |
| 19 | 201847042378-FER.pdf | 2021-10-17 |
| 1 | 2021-01-2113-09-19E_21-01-2021.pdf |