Automating Information Security Policy Compliance Checking

被引:0
作者
Mandal, Debashis [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Compliance; Log Records; Logs; Information Security Policy; Automation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Security Policies are used for expressing the high level objectives of Security of an enterprise. The different IT assets are configured to protect the enterprise from attackers. The configured assets generate log records as description of the events happening in the system. Published literature focuses on the behavioral aspects of the users in complying with the policies. This paper presents a novel idea of checking the compliance with Information Security Policies from the log records. The paper presents a formal description of compliance and goes on to describe the representation of the different entities like Policies, Rules, Events and Logs for the automatic Compliance checker.
引用
收藏
页数:4
相关论文
共 12 条
[11]  
Wies Rene, 1996, POLICY DEFINITION CL
[12]   Factors influencing information security management in small- and medium-sized enterprises: A case study from Turkey [J].
Yildirim, Ebru Yeniman ;
Akalp, Gizem ;
Aytac, Serpil ;
Bayram, Nuran .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2011, 31 (04) :360-365