首页> 外文期刊>Requirements Engineering >A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance
【24h】

A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance

机译:一种基于模式的方法,用于建立特定于云的信息安全管理系统:考虑安全性,隐私和法律合规性,为云建立信息安全管理系统

获取原文
       

摘要

Assembling an information security management system (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishing an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. We analyzed the ISO 27001 demands for these multi-disciplinary challenges and cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank.
机译:根据ISO 27001标准组装信息安全管理系统(ISMS)非常困难,因为该标准仅对系统开发和文档提供了很少的支持。组装ISMS包括几个困难的任务,例如资产识别,威胁和风险分析以及安全推理。此外,该标准要求考虑法律法规以及隐私问题。这些需求给安全工程师带来了多学科挑战。云计算提供了可扩展的IT资源,并且由于所涉及的大量利益相关者和技术以及云在许多国家之间的分布,因此建立ISMS的挑战也增加了。我们分析了针对这些多学科挑战和云计算系统的ISO 27001要求。基于这些见解,我们提供了一种方法,该方法依赖于现有的需求工程方法和模式来执行多种安全任务,例如,上下文描述,威胁分析和策略定义。这些可以简化建立ISMS的工作,并可以为符合ISO 27001的ISMS提供必要的文档。我们以网上银行为例说明我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号