Information security requirements - Interpreting the legal aspects

被引:21
作者
Gerber, Mariana [1 ]
von Solms, Rossouw [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, ZA-6031 Port Elizabeth, South Africa
基金
新加坡国家研究基金会;
关键词
Information security; Information security management; ISO/IEC; 17799; 27002; Information security requirements; Legal requirements; Compliance;
D O I
10.1016/j.cose.2008.07.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With information security being the focal point of business in the media and in legislatures around the world, organisations face complex requirements to comply with security and privacy standards and regulations. The escalating magnitude of national and international laws and regulations, such as Sarbanes-Oxley, Gramm-Leach-Bliley and Basel 11, caused organisations to become increasingly aware of the importance of legal compliance and the obligations that arise from it. The challenge of meeting these obligations has become a complex web of requirements that grows exponentially as organisations cross international boundaries. This paper attempts to provide an interpretation of the legal aspects, as a starting point for clarifying compliance issues, as referred to by ISO/IEC 27002 (ISO/IEC 27002, 2005; previously known as ISO/IEC 17799, 2005). ISO/IEC 27002 further mentions three sources from which information security requirements can be derived, of which one will be focused on within this paper, namely the legal requirements. The interpretation of the legal aspects thus forms the foundation for motivating a proposed model for determining legal requirements, which in turn, indicates relevant information security controls from the list provided in ISO/IEC 27002, to satisfy the identified legal requirements. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:124 / 135
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2005, 27002 ISOIEC
[2]  
*ARTICSOFT, 2005, COMPL CORP GOV IT SE
[3]  
Baldwin R., 1998, READER REGULATION
[4]  
BREWER D, 2004, FAST TRACK ISMS CERT
[5]  
CASPER C, 2004, COMPLICATED COMPLIAN
[6]  
CHETTY KD, 2004, LEGAL PRINCIPLES CON
[7]  
FOUCHE MA, 2004, LEGAL PRINCIPLES CON, P33
[8]  
*GAMMA, 2006, HIST 27000
[9]   Management of risk in the information age [J].
Gerber, M ;
von Solms, R .
COMPUTERS & SECURITY, 2005, 24 (01) :16-30
[10]  
Hahlo H., 1973, The South African Legal System and its Background