ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing

被引:6
作者
Mackita, Masky [1 ]
Shin, Soo-Young [2 ]
Choe, Tae-Young [3 ]
机构
[1] ING Bank, B-1040 Brussels, Belgium
[2] Kumoh Natl Inst Technol, Dept IT Convergence Engn, Gumi 39177, South Korea
[3] Kumoh Natl Inst Technol, Dept Comp Engn, Gumi 39177, South Korea
来源
FUTURE INTERNET | 2019年 / 11卷 / 09期
关键词
risk management; ERM; OCTAVE; cloud computing; Microsoft Azure;
D O I
10.3390/fi11090195
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized. However, traditional risk management methods cannot be applied directly to cloud computing when data are transmitted and processed by external providers. When they are directly applied, risk management processes can fail by ignoring the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix this backdrop, this paper introduces a new risk management method, Enterprise Risk Management for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management methods by combining each component with another processes for comprehensive perception of risks. In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives and strategies, critical assets, and risk measurement criteria.
引用
收藏
页数:21
相关论文
共 34 条
  • [1] Alberts C., 2003, TECHNICAL REPORT
  • [2] [Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
  • [3] [Anonymous], 2013, PRIVACY SECURITY CLO
  • [4] Badger L., 2012, NIST SPEC PUBL
  • [5] Bediako T., 2014, P ISACAS IT AUD INF
  • [6] Behnia A., 2012, The Smart Computing Review, V2, P79, DOI [10.6029/smartcr.2012.01.007, DOI 10.6029/SMARTCR.2012.01.007]
  • [7] Brunschwiler C., 2013, Lean risk assessment based on OCTAVE Allegro
  • [8] Canalys, CLOUD INFR SERV SPEN
  • [9] CATTEDDU D, 2009, CLOUD COMPUTING BENE, V72, P17
  • [10] Chappell D., 2010, Introducing Windows Azure Platform