A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

被引:0
|
作者
Beckers K. [1 ]
Côté I. [2 ]
Faßbender S. [1 ]
Heisel M. [1 ]
Hofbauer S. [3 ]
机构
[1] Paluno, The Ruhr Institute for Software Technology, University of Duisburg-Essen, Oststrasse 99
[2] ITESYS Institute for Technical Systems GmbH, Emil-Figge-Str. 76
[3] Network Integration Services Department, Amadeus Data Processing GmbH, Berghamer Straße 6
关键词
Asset identification privacy; Cloud computing security; Control selection; Information security management system; ISO; 27001; Legal compliance; Security policies; Threat analysis;
D O I
10.1007/s00766-013-0174-7
中图分类号
学科分类号
摘要
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishing an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. We analyzed the ISO 27001 demands for these multi-disciplinary challenges and cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank. © 2013 Springer-Verlag London.
引用
收藏
页码:343 / 395
页数:52
相关论文
共 50 条
  • [31] A Web Based Security Monitoring and Information Management System for Nursing Homes
    Li, Ying
    Xu, Ying
    Lv, Yi
    Wang, Junchen
    INTELLIGENT ROBOTICS AND APPLICATIONS, ICIRA 2019, PT III, 2019, 11742 : 72 - 81
  • [32] The Study of Security of Network Management Information System Based on Electronic Commerce
    Geng Di
    Yang Dan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2009, : 963 - +
  • [33] Research on the Construction of Legal System of Network Security Management under the Background of Information Age
    Yu Yueyang
    2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 675 - 678
  • [34] On Designing the Security System for LAN-based Educational Management Information System
    Guo, Fangming
    Song, Hua
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 323 - 326
  • [35] The 2006 survey of legal developments in data management, privacy, and information security: The continuing evolution of data governance
    Power, E. Michael
    Trope, Roland L.
    BUSINESS LAWYER, 2006, 62 (01): : 251 - 294
  • [36] Security Policies Based On Security Requirements Of City Emergency Management Information System Multi-layer Structure
    Yan Hai
    Zhao Chong
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 351 - 354
  • [37] A web-enabled enterprise security management framework based on a unified model of Enterprise Information System Security
    Sengupta, A
    Mukhopadhyay, A
    Ray, K
    Roy, AG
    Aich, D
    Barik, MS
    Mazumdar, C
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 328 - 331
  • [38] Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis
    Chen, Qunlin
    2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185
  • [39] A checklist based evaluation framework to measure risk of information security management systems
    Mortazavi S.A.R.
    Safi-Esfahani F.
    International Journal of Information Technology, 2019, 11 (3) : 517 - 534
  • [40] Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001
    Proenca, Diogo
    Borbinha, Jose
    BUSINESS INFORMATION SYSTEMS (BIS 2018), 2018, 320 : 102 - 114