Cybersecurity service level agreements: understanding government data confidentiality requirements

Author:

Nugraha Yudhistira12ORCID,Martin Andrew3ORCID

Affiliation:

1. Jakarta Smart City, Department of Communications, Informatics, and Statistics , Jl. Medan Merdeka Sel. No.8-9, Jakarta Pusat, DKI Jakarta 10110, Indonesia

2. School of Computing, Telkom University , Jl. Telekomunikasi No. 1, Terusan Buahbatu, Kabupaten Bandung, Jawa Barat 40257, Indonesia

3. Department of Computer Science, University of Oxford , Robert Hooke Building, Parks Road, Oxford, the United Kingdom OX1 3PP, UK

Abstract

Abstract Cybersecurity requirements, such as data security, are often used as evidence for the Government's relationship with external service providers to process, store and transmit sensitive government data. However, cybersecurity researchers have not profoundly studied the practical application of government data security requirements (e.g. data confidentiality) in service level agreements (SLAs) in the context of an outsourced scenario. The relationships with external service providers are usually established through SLAs as trust-enhancing instruments. However, there is a concern that existing SLAs mainly focus on the system availability and performance aspects but overlook cybersecurity requirements (e.g. data security) in SLAs. Such an understanding is essential to develop government SLA data confidentiality requirements into the formulation of security-related SLAs. We seek to provide insights by developing and conducting a grounded adaptive Delphi method (GADM) with 35 government participants through group discussions and individual sessions. The work on the Indonesian Government's data confidentiality requirements was used as a case study. This paper provides insights into three understandings of the increasing considerations of the Government's data confidentiality requirements in SLA definitions. The three perceptions of security-related SLAs are the target of protection, the data confidentiality risks and the government SLA data confidentiality requirements. Our findings play important implications for a better understanding of how to incorporate data confidentiality requirements according to perceived threats for government data classification in security-SLAs. Based on these findings, we recommend that the Government and service providers improve existing security-related SLAs and future research lines.

Publisher

Oxford University Press (OUP)

Subject

Law,Computer Networks and Communications,Political Science and International Relations,Safety, Risk, Reliability and Quality,Social Psychology,Computer Science (miscellaneous)

Reference63 articles.

1. An adaptive wideband Delphi method to study state cyber-defence requirements;Nugraha;IEEE Trans EmergTop Comput,2016

2. A test-based security certification scheme for web services;Anisetti;Proc ACM Trans Web,2013

3. Monitoring cloud computing by layer, part 1;Spring;IEEE Secur Priv Mag,2011

4. Security SLAs for federated cloud services;Bernsmed,2011

5. Security SLAs–an idea whose time has come?;Jaatun,2012

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business;Sustainability;2024-07-10

2. Security in Cloud-Native Services: A Survey;Journal of Cybersecurity and Privacy;2023-10-26

3. Information Security of the National Economy Based on an Effective Data Control Method;Journal of International Commerce, Economics and Policy;2023-09-19

4. Shaping the Digital Future of Civil Service: An Assessment of Digital Transformation and Data Science Competencies;2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS);2023-08-25

5. Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe;International Cybersecurity Law Review;2023-07-27

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3