Affiliation:
1. University of Innsbruck , 6020 Innsbruck , Technikerstrasse 21a , Austria
2. University of Applied Sciences FH Kufstein Tirol , 6330 Kufstein , Austria
Abstract
Abstract
As the IT landscape of organizations increasingly needs to comply with various laws and regulations, organizations manage a plethora of security-related data and have to verify the adequacy and effectiveness of their security controls through internal and external audits. Existing Governance, Risk and Compliance (GRC) approaches provide little support for auditors or are tailored to the needs of auditors and do not fully support required management activities of the auditee. To address this gap and move towards a holistic solution, a data-driven approach is proposed. Following the design science research paradigm, a data-driven approach for audit data management and analytics that addresses organizational needs as well as requirements for audit data analytics was developed. We contribute workflow support and associated data models to support auditing and security decision making processes. The evaluation shows the viability of the proposed IT artifact and its potential to reduce costs and complexity of security management processes and IT security audits. By developing a model and associated decision support workflows for the entire IT security audit lifecycle, we present a solution for both the auditee and the auditor. This is useful to developers of GRC tools, vendors, auditors and organizational decision makers.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Systematic Literature Review of Security Control Assessment Challenges;2022 IEEE 12th International Conference on Control System, Computing and Engineering (ICCSCE);2022-10-21
2. Information System Audit for Mobile Device Security Assessment;2021 3rd International Cyber Resilience Conference (CRC);2021-01-29
3. Enabling change-driven workflows in continuous information security management;Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing;2019-04-08