首页> 外文会议>Defense transformation and net-centric systems 2011 >A novel approach to implementing digital policy management as an enabler for a dynamic secure information sharing in a cloud environment
【24h】

A novel approach to implementing digital policy management as an enabler for a dynamic secure information sharing in a cloud environment

机译:一种实现数字策略管理以实现云环境中动态安全信息共享的新方法

获取原文
获取原文并翻译 | 示例

摘要

The traditional way of approaching the management and enforcement of information systems Policy in enterprise environments is to manually translate laws and regulations into a form that can be interpreted and enforced by enterprise devices. In other words we create system commands for routers, bridges, and firewalls to force data transfers and system access to comply with the current policies and approved rules in order to control access and protect private, sensitive, and classified information. As operational needs and threat levels change, the rules are modified to accommodate the required response. It then falls on System Administrators to manually change the configuration of the devices they manage to adapt their operations accordingly. As our user communities continue to rely more heavily on mission information, and the enterprise systems and networks that provide it, our enterprise needs to progress to more automated techniques that enable authorized managers to dynamically update and manage policies in digital formats. Automated management of access rules that control privileges for accessing secure information and enterprise resources, enabled by Digital Policy and other Enterprise Security Management (ESM) capabilities provides the means for system administrators to dynamically respond to changing user needs, threat postures and other environmental factors. With the increased popularity of virtual environments and advent of cloud enterprise services, IA management concepts need to be reexamined. Traditional ESM solutions may be subjected to new classes of threats as physical control of the assets that implement those services are relinquished to virtual environments. Additional operational factors such as invoking critical processing, controlling access to information during processing, ensuring adequate protection of transactions within virtual environments and executing ESM provisions are also affected. The paper describes the relationships among relevant ESM enterprise services as they impact the ability to share and protect enterprise information. Central to this is the ability to adopt and manage digital policies within the enterprise environment. It describes the management functions that have to be supported, and the challenges that have to be addressed to ensure an effective implementation. Since the adoption of cloud services is becoming an important consideration for the evolution of enterprise architectures, the paper also explores the implications of shifting from traditional to virtual enterprise environments
机译:在企业环境中处理信息系统策略的传统方法是将法律法规手动转换为企业设备可以解释和执行的形式。换句话说,我们为路由器,网桥和防火墙创建系统命令,以强制数据传输和系统访问遵守当前策略和批准的规则,从而控制访问并保护私有,敏感和机密信息。随着操作需求和威胁级别的变化,规则也会进行修改以适应所需的响应。然后由系统管理员手动更改他们管理的设备的配置,以相应地调整其操作。随着我们的用户社区继续更加依赖任务信息以及提供任务信息的企业系统和网络,我们的企业需要逐步采用更加自动化的技术,以使授权管理人员能够动态更新和管理数字格式的策略。数字策略和其他企业安全管理(ESM)功能支持对访问规则进行自动管理,以控制访问安全信息和企业资源的权限,从而为系统管理员提供了动态响应不断变化的用户需求,威胁态势和其他环境因素的方法。随着虚拟环境的日益普及和云企业服务的出现,IA管理概念需要重新审视。传统的ESM解决方案可能会面临新的威胁类别,因为实施这些服务的资产的物理控制权被放到了虚拟环境中。其他操作因素,如调用关键处理,在处理过程中控制对信息的访问,确保在虚拟环境中确保对交易的充分保护以及执行ESM规定等,也会受到影响。本文描述了相关ESM企业服务之间的关系,因为它们影响共享和保护企业信息的能力。对此的核心是在企业环境中采用和管理数字策略的能力。它描述了必须支持的管理功能,以及为确保有效实施而必须解决的挑战。由于采用云服务已成为企业体系结构发展的重要考虑因素,因此本文还探讨了从传统企业环境过渡到虚拟企业环境的意义。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号