Author:
Montesino Raydel,Fenz Stefan,Baluja Walter
Abstract
PurposeThe purpose of this paper is to propose a framework for security controls automation, in order to achieve greater efficiency and reduce the complexity of information security management.Design/methodology/approachThis research reviewed the controls recommended by well known standards such as ISO/IEC 27001 and NIST SP 800‐53; and identified security controls that can be automated by existing hard‐and software tools. The research also analyzed the Security Information and Event Management (SIEM) technology and proposed a SIEM‐based framework for security controls automation, taking into account the automation potential of SIEM systems and their integration possibilities with several security tools.FindingsAbout 30 per cent of information security controls can be automated and they were grouped in a list of ten automatable security controls. A SIEM‐based framework can be used for centralized and integrated management of the ten automatable security controls.Practical implicationsBy implementing the proposed framework and therefore automating as many security controls as possible, organizations will achieve more efficiency in information security management, reducing also the complexity of this process. This research may also be useful for SIEM vendors, in order to include more functionality to their products and provide a maximum of security controls automation within SIEM platforms.Originality/valueThis paper delimits the boundaries of information security automation and defines what automation means for each security control. A novel framework for security controls automation is proposed. This research provides an automation concept that goes beyond what it is normally described in previous works and SIEM solutions.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference27 articles.
1. Agoulmine, N. (2010), Autonomic Network Management Principles: From Concepts to Applications, Academic Press, London.
2. Al‐Ayed, A., Furnell, S.M., Zhao, D. and Dowland, P.S. (2005), “An automated framework for managing security vulnerabilities”, Information Management & Computer Security, Vol. 13 No. 2, pp. 156‐66.
3. Chuvakin, A. (2010), “SIEM: moving beyond compliance”, White Paper for RSA.
4. Edwards, W.K., Poole, E.S. and Stoll, J. (2008), “Security automation considered harmful?”, Proceedings of the 2007 Workshop on New Security Paradigms, pp. 33‐42.
5. Hamdi, H., Bouhoula, A. and Mosbah, M. (2007), “A software architecture for automatic security policy enforcement in distributed systems”, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), Valencia, Spain, pp. 187‐92.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献