Security governance as a service on the cloud

被引:3
作者
Bryce, Ciaran [1 ]
机构
[1] Univ Appl Sci & Arts Western Switzerland, Geneva Sch Business Adm HES SO, CH-1227 Geneva, Switzerland
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2019年 / 8卷 / 01期
关键词
Security; Security as a service; Compliance; Cloud; Process modeling; Burden of proofs;
D O I
10.1186/s13677-019-0148-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Small companies need help to detect and to respond to increasing security related threats. This paper presents a cloud service that automates processes that make checks for such threats, implement mitigating procedures, and generally instructs client companies on the steps to take. For instance, a process that automates the search for leaked credentials on the Dark Web will, in the event of a leak, trigger processes that instruct the client on how to change passwords and perhaps a micro-learning process on credential management. The security governance service runs on the cloud as it needs to be managed by a security expert and because it should run on an infrastructure separated from clients. It also runs as a cloud service for economy of scale: the processes it runs can service many clients simultaneously, since many threats are common to all. We also examine how the service may be used to prove to independent auditors (e.g., cyber-insurance agents) that a company is taking the necessary steps to implement its security obligations.
引用
收藏
页数:14
相关论文
共 19 条
  • [1] Achieving GDPR Compliance of BPMN Process Models
    Agostinelli, Simone
    Maggi, Fabrizio Maria
    Marrella, Andrea
    Sapio, Francesco
    [J]. INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019, 2019, 350 : 10 - 22
  • [2] Towards Automation in Information Security Management Systems
    Brunner, Michael
    Sillaber, Christian
    Breu, Ruth
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 160 - 167
  • [3] Towards safer information sharing in the cloud
    Casassa-Mont, Marco
    Matteucci, Ilaria
    Petrocchi, Marinella
    Sbodio, Marco Luca
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) : 319 - 334
  • [4] Cedric Xing B, 2016, INTELA SOFTWARE GUAR, V06, P1
  • [5] Chabanoles N, 2015, BPM DEMOS, P21
  • [6] A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards
    Gikas, Constantine
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (03): : 132 - 141
  • [7] Government OpenAccess, 2019, SME OWN STILL DARK G
  • [8] Enterprise Modeling for Business Agility
    Horkoff, Jennifer
    Jeusfeld, Manfred A.
    Ralyte, Jolita
    Karagiannis, Dimitris
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 1 - 2
  • [9] Lins Fernando A. A., 2018, International Journal of Web Engineering and Technology, V13, P3
  • [10] Mendling J, 2012, LECT NOTES BUSINESS, V125