Cybersecurity compliance analysis as a service: Requirements specification and application scenarios

被引:4
作者
Furfaro, Angelo [1 ]
Gallo, Teresa [1 ]
Garro, Alfredo [1 ]
Sacca, Domenico [1 ]
Tundis, Andrea [1 ]
机构
[1] Univ Calabria, Dept Informat Modeling Elect & Syst Engn, P Bucci 41C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
cloud computing; compliance analysis; cybersecurity; goal-oriented methodology; requirements engineering; SecaaS; FRAMEWORK; METHODOLOGY;
D O I
10.1002/cpe.4289
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybersecurity compliance analysis is the process of assessing whether the behavior of an IT system or application conforms to the cybersecurity rules and regulations in force. This assessment can be offered as a service by exploiting available cloud technologies, and, indeed, it is one of the services classified by the Cloud Security Alliance (CSA) as part of the security information and event management (SIEM) category of the SecaaS (security as a service) domain. The definition and implementation of this typology of cloud services are challenging activities due to the complexity of both the reference business domain and the compliance analysis services to be provided themselves. The paper exploits a recently proposed requirements methodology, called GOReM (goal-oriented requirements methodology), to support the conceptualization and subsequent implementation of cybersecurity compliance analysis services. In particular, two different application scenarios regarding compliance analysis of an existing or under development IT system/application are presented and discussed. In both the scenarios, GOReM allows to grasp and understand the many and complex issues to address for providing secure cloud services to worldwide customers, also due to the numerous, different and ever changing legal aspects, which have to be taken into account by service providers.
引用
收藏
页数:20
相关论文
共 52 条
  • [1] Reasoning with contextual requirements: Detecting inconsistency and conflicts
    Ali, Raian
    Dalpiaz, Fabiano
    Giorgini, Paolo
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (01) : 35 - 57
  • [2] Andrieux A, 2011, BUSINESS PROCESS MOD
  • [3] [Anonymous], 2009, 2009 2 INT WORKSHOP
  • [4] [Anonymous], CIISE
  • [5] [Anonymous], 2014, AGILE GOOD HYPE UGLY, DOI DOI 10.1007/978-3-319-05155-0_11
  • [6] [Anonymous], 2011, TECHNICAL REPORT
  • [7] [Anonymous], 2015, TECHNICAL REPORT
  • [8] BPIE, 2011, EUROPE'S BUILDINGS UNDER THE MICROSCOPE A country-by-country review of the energy performance of buildings
  • [9] Tropos: An agent-oriented software development methodology
    Bresciani, P
    Perini, A
    Giorgini, P
    Giunchiglia, F
    Mylopoulos, J
    [J]. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2004, 8 (03) : 203 - 236
  • [10] Buccafurri F., 2015, P 8 INT C SEC INF NE, P46, DOI [10.1145/2799979.2800007, DOI 10.1145/2799979.2800007]