Security Policy Alignment: A Formal Approach

被引:14
作者
Pieters, Wolter [1 ]
Dimkov, Trajce [2 ]
Pavlovic, Dusko [3 ,4 ]
机构
[1] Delft Univ Technol, Fac Technol Policy & Management, Energy & Ind Grp, NL-2600 Delft, Netherlands
[2] Deloitte, Secur & Privacy Grp, NL-1183 Amstelveen, Netherlands
[3] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
[4] Univ Twente, Fac Elect Engn Math & Comp Sci, Distributed & Embedded Secur Grp, NL-7500 Enschede, Netherlands
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 02期
关键词
Attack trees; security logics; security policies; security policy alignment; security policy refinement; socio-technical systems; system models; ATTACK; FOUNDATIONS;
D O I
10.1109/JSYST.2012.2221933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks, firewalls and employee behavior, and this refinement should be correct with respect to the original policy. Although alignment of security policies in socio-technical systems has been discussed in the literature, especially in relation to business goals, there has been no formal treatment of this topic so far in terms of consistency and completeness of policies. Wherever formal approaches are used in policy alignment, these are applied to well-defined technical access control scenarios instead. Therefore, we aim at formalizing security policy alignment for complex socio-technical systems in this paper, and our formalization is based on predicates over sequences of actions. We discuss how this formalization provides the foundations for existing and future methods for finding security weaknesses induced by misalignment of policies in socio-technical systems.
引用
收藏
页码:275 / 287
页数:13
相关论文
共 36 条
  • [31] PFIRES: A policy framework for information security
    Rees, J
    Bandyopadhyay, S
    Spafford, EH
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (07) : 101 - 106
  • [32] Sannella D, 2012, EATCS MONOGRAPHS THE
  • [33] Schneier B, 1999, DR DOBBS J, V24, P21
  • [34] Solhaug B., 2011, INT J SOFTWARE INFOR, V5, P139
  • [35] Stasiukonis Steve., 2006, SOCIAL ENG USB WAY
  • [36] Risk-Based Cost-Benefit Analysis for Security Assessment Problems
    Wyss, Gregory D.
    Clem, John F.
    Darby, John L.
    Dunphy-Guzman, Katherine
    Hinton, John P.
    Mitchiner, Kim W.
    [J]. 44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 286 - 295