Automating Information Security Policy Compliance Checking

被引:0
作者
Mandal, Debashis [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Compliance; Log Records; Logs; Information Security Policy; Automation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Security Policies are used for expressing the high level objectives of Security of an enterprise. The different IT assets are configured to protect the enterprise from attackers. The configured assets generate log records as description of the events happening in the system. Published literature focuses on the behavioral aspects of the users in complying with the policies. This paper presents a novel idea of checking the compliance with Information Security Policies from the log records. The paper presents a formal description of compliance and goes on to describe the representation of the different entities like Policies, Rules, Events and Logs for the automatic Compliance checker.
引用
收藏
页数:4
相关论文
共 12 条
[1]  
Al-Omari Ahmad, 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3317, DOI 10.1109/HICSS.2012.516
[2]   Insider threat Detection using Log analysis and Event Correlation [J].
Ambre, Amruta ;
Shekokar, Narendra .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :436-445
[3]  
Bing M, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P101
[4]  
Brunel J, 2007, FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, P31
[5]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[6]   Organizational power and information security rule compliance [J].
Kolkowska, Ella ;
Dhillon, Gurpreet .
COMPUTERS & SECURITY, 2013, 33 :3-11
[7]  
Oliner A., 2011, ADV CHALLENGES LOG A, P30
[8]  
ScienceDirect, 2017, WHAT MAK EFF INF SEC
[9]  
Shenk J., 2014, Ninth log management survey report
[10]  
Syukur E., 2005, METHODS POLICY CONFL