Security governance as a service on the cloud

被引:3
|
作者
Bryce, Ciaran [1 ]
机构
[1] Univ Appl Sci & Arts Western Switzerland, Geneva Sch Business Adm HES SO, CH-1227 Geneva, Switzerland
关键词
Security; Security as a service; Compliance; Cloud; Process modeling; Burden of proofs;
D O I
10.1186/s13677-019-0148-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Small companies need help to detect and to respond to increasing security related threats. This paper presents a cloud service that automates processes that make checks for such threats, implement mitigating procedures, and generally instructs client companies on the steps to take. For instance, a process that automates the search for leaked credentials on the Dark Web will, in the event of a leak, trigger processes that instruct the client on how to change passwords and perhaps a micro-learning process on credential management. The security governance service runs on the cloud as it needs to be managed by a security expert and because it should run on an infrastructure separated from clients. It also runs as a cloud service for economy of scale: the processes it runs can service many clients simultaneously, since many threats are common to all. We also examine how the service may be used to prove to independent auditors (e.g., cyber-insurance agents) that a company is taking the necessary steps to implement its security obligations.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Security as a Service for Public Cloud Tenants(SaaS)
    Hawedi, Mohamed
    Talhi, Chamseddine
    Boucheneb, Hanifa
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 1025 - 1030
  • [32] An Initiation for Testing the Security of a Cloud Service Provider
    Ajay, D. M.
    Umamaheswari, E.
    PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON BIG DATA AND CLOUD COMPUTING CHALLENGES (ISBCC - 16'), 2016, 49 : 33 - 41
  • [33] Leveraging countermeasures as a service for VoIP security in the cloud
    Dabbebi, Oussema
    Badonnel, Remi
    Festor, Olivier
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2014, 24 (01) : 70 - 84
  • [34] Credential and Security Issues of Cloud Service Models
    Dewangan, Bhupesh Kumar
    Agarwal, Amit
    Venkatadri
    Pasricha, Ashutosh
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 888 - 892
  • [35] A Service Scheduling Security Model for a Cloud Environment
    Sheikh, Abdullah
    Munro, Malcolm
    Budgen, David
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 1 - 9
  • [36] CLOUD COMPUTING SECURITY: AMAZON WEB SERVICE
    Narula, Saakshi
    Jain, Arushi
    Prachi
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 501 - 505
  • [37] Security Model for Cloud Database as a Service (DBaaS)
    Munir, Kashif
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 127 - 131
  • [38] Security and service assurance issues in Cloud environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Abraham A.
    International Journal of System Assurance Engineering and Management, 2018, 9 (1) : 194 - 207
  • [39] Assessing the Security Posture of Cloud Service Providers
    Rivera, Jorge
    Yu, Huiming
    Williams, Ken
    Zhan, Justin
    Yuan, Xiaohong
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON IS MANAGEMENT AND EVALUATION (ICIME 2015), 2015, : 103 - 110
  • [40] Security as a Service using Data Steganography in Cloud
    Ramachandran, Anitha Balaji
    Paramjothi, Pradeepan
    Mukherjee, Saswati
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 81 - 90