A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

被引:0
|
作者
Beckers K. [1 ]
Côté I. [2 ]
Faßbender S. [1 ]
Heisel M. [1 ]
Hofbauer S. [3 ]
机构
[1] Paluno, The Ruhr Institute for Software Technology, University of Duisburg-Essen, Oststrasse 99
[2] ITESYS Institute for Technical Systems GmbH, Emil-Figge-Str. 76
[3] Network Integration Services Department, Amadeus Data Processing GmbH, Berghamer Straße 6
关键词
Asset identification privacy; Cloud computing security; Control selection; Information security management system; ISO; 27001; Legal compliance; Security policies; Threat analysis;
D O I
10.1007/s00766-013-0174-7
中图分类号
学科分类号
摘要
Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishing an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. We analyzed the ISO 27001 demands for these multi-disciplinary challenges and cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank. © 2013 Springer-Verlag London.
引用
收藏
页码:343 / 395
页数:52
相关论文
共 50 条
  • [41] Reliability Analysis of Business Continuity Based on SPN in Information System Security Management
    Pan Ping
    Mao Xinyue
    Yang Ping
    Zhou Huiling
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 232 - 236
  • [42] The Design and Implementation of the Information Remote Monitoring and Security Management System based on Internet
    He Chunlin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1414 - 1417
  • [43] The Design of Teaching Management Information System Based on Oracle Security Audit Technology
    Xia Sailian
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 687 - 689
  • [44] AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE ISO/IEC 27001 STANDARD
    de la Rosa Martin, Tonyse
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2021, 13 (05): : 495 - 506
  • [45] Study of information system boundaries security management based on artificial immune algorithm
    Zhang, Litao
    Wang, Xia
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13 : 91 - 95
  • [46] XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments
    Moussa, Bishoy
    Mostafa, Mahmoud
    El-Khouly, Mahmoud
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (09) : 74 - 82
  • [47] CC-SEMS: A CC based information system security evaluation management system
    Bang, Young-Whan
    Kang, Yeun-Hee
    Lee, Gang-Soo
    APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 964 - 973
  • [48] Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
    Bai, Heju
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [49] A Quantitative Method for Multicriteria Analysis of the Assets of a Critical System in the Management Process of Information Security
    Firoiu, Marian
    Bacivarov, Ioan C.
    QUALITY-ACCESS TO SUCCESS, 2019, 20 (173): : 138 - 144
  • [50] Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
    Gupta, Brij B.
    Gaurav, Akshat
    Panigrahi, Prabin Kumar
    JOURNAL OF BUSINESS RESEARCH, 2023, 162