A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

被引:0
|
作者
Beckers K. [1 ]
Côté I. [2 ]
Faßbender S. [1 ]
Heisel M. [1 ]
Hofbauer S. [3 ]
机构
[1] Paluno, The Ruhr Institute for Software Technology, University of Duisburg-Essen, Oststrasse 99
[2] ITESYS Institute for Technical Systems GmbH, Emil-Figge-Str. 76
[3] Network Integration Services Department, Amadeus Data Processing GmbH, Berghamer Straße 6
关键词
Asset identification privacy; Cloud computing security; Control selection; Information security management system; ISO; 27001; Legal compliance; Security policies; Threat analysis;
D O I
10.1007/s00766-013-0174-7
中图分类号
学科分类号
摘要
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishing an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. We analyzed the ISO 27001 demands for these multi-disciplinary challenges and cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank. © 2013 Springer-Verlag London.
引用
收藏
页码:343 / 395
页数:52
相关论文
共 50 条
  • [21] A New Method for the Identification of Proactive Information Security Management System Metrics
    Hajdarevic, Kemal
    Allen, Pat
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1121 - 1126
  • [22] Data Privacy Implications for Security Information and Event Management Systems and Other Meta-Systems
    Khan, Herah
    Hutchison, Andrew
    CYBER SECURITY AND PRIVACY, 2013, 182 : 79 - 90
  • [23] An Ontology-Based Security Risk Management Model for Information Systems
    Arogundade, Oluwasefunmi T.
    Abayomi-Alli, Adebayo
    Misra, Sanjay
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (08) : 6183 - 6198
  • [24] Deep Learning Based Security Management of Information Systems: A Comparative Study
    Cebi, Cem B.
    Bulut, Fatma S.
    Firat, Hazal
    Sahingoz, Ozgur Koray
    Karatas, Gozde
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2020, 11 (03) : 135 - 142
  • [25] An Ontology-Based Security Risk Management Model for Information Systems
    Oluwasefunmi T. Arogundade
    Adebayo Abayomi-Alli
    Sanjay Misra
    Arabian Journal for Science and Engineering, 2020, 45 : 6183 - 6198
  • [26] A Collaborative Process Based Risk Analysis for Information Security Management Systems
    Karabacak, Bilge
    Ozkan, Sevgi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 182 - 192
  • [27] An information security risk assessment method for cloud systems based on risk contagion
    Li, Ziqian
    Tang, Zhenying
    Lv, Jingxian
    Li, Huiqin
    Han, Wei
    Zhang, Zhimin
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 83 - 87
  • [28] Research on Network Information Security Management System Based on Face Recognition
    Cheng, Yun-Li
    Meng, Hai-Nie
    Chen, Yu-Qiang
    Tan, Y. an -Xian
    Guo, Jian -Lan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (04) : 839 - 854
  • [29] The Security Management Information System of Subgrade and Pavement Based on Grid GIS
    Zhou, Ji
    Zhang, Xiekui
    Tian, Qiong
    Chen, Mingfang
    Rui, Yongqin
    GEO-INFORMATICS IN RESOURCE MANAGEMENT AND SUSTAINABLE ECOSYSTEM, 2016, 569 : 222 - 227
  • [30] Construction information security management system based on data sharing algorithm
    Zhao, Lihui
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (04): : 2775 - 2788