Eliciting a Security Architecture Requirements Baseline from Standards and Regulations

被引:1
|
作者
Rouland, Quentin [1 ]
Gjorcheski, Stojanche [1 ]
Jaskolka, Jason [1 ]
机构
[1] Carleton Univ, Syst & Comp Engn, 1125 Colonel Dr, Ottawa, ON KIS 5B6, Canada
关键词
requirements; standards; compliance; security; architecture design; systems engineering;
D O I
10.1109/REW57809.2023.00045
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, numerous security standards, laws, and regulations have been issued to address growing security concerns for critical systems. As a result, assuring that a system software architecture complies with security standards and regulations has become a top priority, critical to an organization's success. This study focuses on a SCADA system use case to identify the practical challenges in eliciting adequate security requirements to ensure that a system software architecture complies with security standards and accommodate the evolving nature of both the standards and the systems. To address these challenges, a systemic and iterative process for eliciting security requirements is proposed. The findings shed light on improving the effectiveness and efficiency of the security requirements elicitation process, ensuring compliance with standards, policies, and regulations in system software architecture.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 50 条
  • [2] Experiences in eliciting security requirements
    CERT, Software Engineering Institute
    不详
    CrossTalk, 2006, 12 (14-19):
  • [3] Eliciting security requirements with misuse cases
    Guttorm Sindre
    Andreas L. Opdahl
    Requirements Engineering, 2005, 10 : 34 - 44
  • [4] Eliciting security requirements with misuse cases
    Sindre, G
    Opdahl, AL
    REQUIREMENTS ENGINEERING, 2005, 10 (01) : 34 - 44
  • [5] Eliciting Security Requirements - An Experience Report
    Trentinaglia, Roman
    Merschjohann, Sven
    Fockel, Markus
    Eikerling, Hendrik
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
  • [6] Eliciting security requirements by misuse cases
    Sindre, G
    Opdahl, AL
    37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
  • [7] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
  • [8] Eliciting security requirements through misuse activities
    Braz, Fabricio A.
    Ferriandez, Eduardo B.
    VanHilst, Michael
    DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
  • [9] Eliciting Usable Security Requirements with Misusability Cases
    Faily, Shamal
    Flechais, Ivan
    2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
  • [10] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
    Matulevicius, Raimundas
    Ahmed, Naved
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230