A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

被引:0
|
作者
Beckers K. [1 ]
Côté I. [2 ]
Faßbender S. [1 ]
Heisel M. [1 ]
Hofbauer S. [3 ]
机构
[1] Paluno, The Ruhr Institute for Software Technology, University of Duisburg-Essen, Oststrasse 99
[2] ITESYS Institute for Technical Systems GmbH, Emil-Figge-Str. 76
[3] Network Integration Services Department, Amadeus Data Processing GmbH, Berghamer Straße 6
关键词
Asset identification privacy; Cloud computing security; Control selection; Information security management system; ISO; 27001; Legal compliance; Security policies; Threat analysis;
D O I
10.1007/s00766-013-0174-7
中图分类号
学科分类号
摘要
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishing an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. We analyzed the ISO 27001 demands for these multi-disciplinary challenges and cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank. © 2013 Springer-Verlag London.
引用
收藏
页码:343 / 395
页数:52
相关论文
共 50 条
  • [1] A pattern-based method for establishing a cloud-specific information security management system
    Beckers, Kristian
    Cote, Isabelle
    Fassbender, Stephan
    Heisel, Maritta
    Hofbauer, Stefan
    REQUIREMENTS ENGINEERING, 2013, 18 (04) : 343 - 395
  • [2] Erratum to: A pattern-based method for establishing a cloud-specific information security management system
    Kristian Beckers
    Isabelle Côté
    Stephan Faßbender
    Maritta Heisel
    Stefan Hofbauer
    Requirements Engineering, 2013, 18 (4) : 397 - 397
  • [3] ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
    Beckers, Kristian
    Heisel, Maritta
    Solhaug, Bjørnar
    Stølen, Ketil
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 315 - 344
  • [4] Towards a Pattern-Based Security Methodology to Build Secure Information Systems
    Ortiz, Roberto
    Moral-Rubio, Santiago
    Garzas, Javier
    Fernandez-Medina, Eduardo
    WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 59 - +
  • [5] INTELLIGENT MANAGEMENT OF THE LEGAL REGIME OF ACCESS IN THE INFORMATION SECURITY SYSTEM
    Askerov, Ziyafet
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL. 1, 2020, : 131 - 133
  • [6] Introducing the Information Security Management System in Cloud Computing Environment
    Tot, Laslo
    Grubor, Gojko
    Marta, Takacs
    ACTA POLYTECHNICA HUNGARICA, 2015, 12 (03) : 147 - 166
  • [7] Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems
    Guarda, Paolo
    Ranise, Silvio
    Siswantoro, Hari
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 247 - 254
  • [8] Method for assessing efficiency of the information security management system
    Kiedrowicz, Maciej
    Stanik, Jerzy
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
  • [9] An enhanced smartphone security model based on information security management system (ISMS)
    Jong Hyuk Park
    Ki Jung Yi
    Young-Sik Jeong
    Electronic Commerce Research, 2014, 14 : 321 - 348
  • [10] An enhanced smartphone security model based on information security management system (ISMS)
    Park, Jong Hyuk
    Yi, Ki Jung
    Jeong, Young-Sik
    ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) : 321 - 348