A Pattern-based Method for Establishing a Cloud-specific Information Security Management System Establishing Information Security Management Systems for Clouds Considering Security, Privacy, and Legal Compliance
نویسندگان
چکیده
Assembling an Information Security Management System (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation. Assembling an ISMS consists of several difficult tasks, e.g., asset identification, threat and risk analysis and security reasoning. Moreover, the standard demands consideration of laws and regulations, as well as privacy concerns. These demands present multi-disciplinary challenges for security engineers. Cloud computing provides scalable IT resources and the challenges of establishment an ISMS increases, because of the significant number of stakeholders and technologies involved and the distribution of clouds among many countries. Kristian Beckers University of Duisburg-Essen, paluno The Ruhr Institute for Software Technology Oststrasse 99, 47057 Duisburg, Germany E-mail: [email protected] Isabelle Côté ITESYS Institute for technical Systems GmbH Emil-Figge-Str. 76, 44227 Dortmund, Germany E-mail: [email protected] Stephan Faßbender University of Duisburg-Essen, paluno The Ruhr Institute for Software Technology Oststrasse 99, 47057 Duisburg, Germany E-mail: [email protected] Maritta Heisel University of Duisburg-Essen, paluno The Ruhr Institute for Software Technology Oststrasse 99, 47057 Duisburg, Germany E-mail: [email protected] Stefan Hofbauer Amadeus Data Processing GmbH Network Integration Services Department Berghamer Straße 6, 85435 Erding, Germany E-mail: [email protected] We analysed the ISO 27001 demands for these multidisciplinary challenges and for cloud computing systems. Based on these insights, we provide a method that relies upon existing requirements engineering methods and patterns for several security tasks, e.g., context descriptions, threat analysis and policy definition. These can ease the effort of establishing an ISMS and can produce the necessary documentation for an ISO 27001 compliant ISMS. We illustrate our approach using the example of an online bank.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کامل