Evolution of security policies
نویسنده
چکیده
Organizational security involves assuring data confidentiality, integrity and availability. These security principles have been captured by standards like ISO 17799 [1] which provides guidelines in the format of objectives to be achieved and controls to be implemented. Each organization interprets and selects applicable controls according to their culture, infrastructure and business to define its security policies. Cobit [2] provides orientations for enterprise security governance and considers control over information and technology (IT) as a core factor for the alignment between business objectives, IT goals and IT processes. In the format of control objectives Cobit aims to assure that i) ”business objectives are achieved, undesired events are prevented or detected and corrected”, ii) a measure of the security level and improvements required are in place. It is again up to individual organizations to define their overall security policies based on the Cobit best practices. However, security policies must be somehow enforced as these standards are at the paperwork level of security. This means that security policies have to be translated or refined to different domains either by means of human expertise or by means of tools. I assume that this refinement process is already in place and focus on the three key points of control defined by Cobit: i) business objectives enforced, ii) events monitored and iii) measures integrating objectives and events implemented. The IPID1 project [3] aims to link these three factors by establishing a feed forward management loop and a feed backward compliance loop. The latter loop is the main focus of my research since it is absent in large organizations while, as prescribed by Cobit, it represents a key element of IT governance. This paper claims that goal-driven requirements which are subject to continuous evolution when triggered by correlated security events (detected by several security devices) achieve the feed backward loop. In order to meet this claim I propose an approach consisting of the following ingredients. 1IPID stands for Integrated Policy-based Intrusion Detection. 1. A method to formalize security policies as goal-driven requirements. This formalism should also allow the formalization of events in a comparable way to facilitate the relationship between security policies and events. 2. A model of the policy evolution process. 3. A method to correlate events and extract information to be used as triggers to the evolution process. 4. A method to actually trigger the evolution process. The first, third and fourth items of our approach are design problems. Thus, I will focus on the analysis of related work in the literature to either extract the requirements of the solution and identify opportunities to reuse existing approaches. After this initial stage, I will propose a framework which incorporates each of these modules as building blocks. The second item, however, is a knowledge problem and a case study will be used as an exploratory method [4] to provide insights about the state-of-affairs of the evolution process in the real world. I believe that currently, this process is not triggered by security events. Therefore, the model to be built is prescriptive rather than a descriptive model of the security policy evolution process.
منابع مشابه
Gender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملBiopharmaceutical Innovation System in China: System Evolution and Policy Transitions (Pre-1990s-2010s)
Background: This article sets up the initial discussion of the evolution of biopharmaceutical innovation in China through the perspective of sectoral innovation system (SIS).Methods: Two data sources including archival documentary data and field interviews were used in this study. Archival documentary data was collected from China Food and Drug Administration (CFDA) and Chinese National Knowled...
متن کاملThe Evolution of Cyberinsurance
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to early cyber-risk insurance policies to current comprehensive cyberinsurance products. We find that increasing Internet security risk in combination with the need for compliance with recent corporate legislation has contr...
متن کاملModel-Driven Extraction and Analysis of Network Security Policies
Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critica...
متن کامل