A compliance assessment system for Incident Management process

被引:0
作者
Palma, Alessandro [1 ]
Acitelli, Giacomo [1 ]
Marrella, Andrea [1 ]
Bonomi, Silvia [1 ]
Angelini, Marco [2 ]
机构
[1] Sapienza Univ Rome, Dept Comp Control Management Engn Antonio Ruberti, Via Ariosto 25, I-00185 Rome, Italy
[2] Link Campus Univ, Via Casale San Pio V 44, I-00165 Rome, Italy
关键词
Incident management; Security governance; Process compliance assessment; Cost model; Trace alignment;
D O I
10.1016/j.cose.2024.104070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Incident Management (IM) process is one of the core activities for increasing the overall security level of organizations and better responding to cyber attacks. Different security frameworks (such as ITIL and ISO 27035) provide guidelines for designing and properly implementing an effective IM process. Currently, assessing the compliance of the actual process implemented by an organization with such frameworks is a complex task. The assessment is mainly manually performed and requires much effort in the analysis and evaluation. In this paper, we first propose a taxonomy of compliance deviations to classify and prioritize the impacts of non-compliant causes. We combine trace alignment techniques with a new proposed cost model for the analysis of process deviations rather than process traces to prioritize interventions. We put these contributions into use in a system that automatically assesses the IM process compliance with a reference process model (e.g., the one described in the chosen security framework). It supports the auditor with increased awareness of process issues to make more focused decisions and improve the process's effectiveness. We propose a benchmark validation for the model, and we show the system's capability through a usage scenario based on a publicly available dataset of a real IM log. The source code of all components, including the code used for benchmarking, is publicly available as open source on GitHub.
引用
收藏
页数:16
相关论文
共 83 条
  • [1] Accorsi R, 2012, P 27 ANN ACM S APPL, P1709, DOI DOI 10.1145/2245276.2232051
  • [2] Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
    Accorsi, Rafael
    [J]. IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC, 2009, : 94 - 110
  • [3] Context-Aware Trace Alignment with Automated Planning
    Acitelli, Giacomo
    Angelini, Marco
    Bonomi, Silvia
    Maggi, Fabrizio M.
    Marrella, Andrea
    Palma, Alessandro
    [J]. 2022 4TH INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2022), 2022, : 104 - 111
  • [4] Adriansyah A., 2011, 2011 11th International Conference on Application of Concurrency to System Design (ACSD), P57, DOI 10.1109/ACSD.2011.19
  • [5] The drivers of cyber risk
    Aldasoro, Inaki
    Gambacorta, Leonardo
    Giudici, Paolo
    Leach, Thomas
    [J]. JOURNAL OF FINANCIAL STABILITY, 2022, 60
  • [6] Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
    Alfaadhel, Afnan
    Almomani, Iman
    Ahmed, Mohanned
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [7] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [8] Amaral Claudio A. L., 2019, Information Technology for Management Emerging Research and Applications. 15th Conference (AITM 2018) and 13th Conference (ISM 2018). Held as Part of FedCSIS. Revised and Extended Selected Papers. Lecture Notes in Business Information Processing (LNBIP 346), P3, DOI 10.1007/978-3-030-15154-6_1
  • [9] Angelini M, 2022, Arxiv, DOI arXiv:2207.03269
  • [10] [Anonymous], 2013, ISO/IEC 27035:2013 (E)