|
|
1 | (10) |
|
|
1 | (4) |
|
|
5 | (2) |
|
|
7 | (4) |
|
|
8 | (3) |
|
|
11 | (26) |
|
|
11 | (1) |
|
|
11 | (6) |
|
2.2.1 The ISO 27000 Series of Standards |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
2.3 Safety Standard ISO 26262 |
|
|
17 | (1) |
|
2.4 A Conceptual Framework for Security Requirements Engineering |
|
|
18 | (2) |
|
2.5 Security Requirements Engineering Methods |
|
|
20 | (13) |
|
|
20 | (3) |
|
|
23 | (6) |
|
2.5.3 Problem Frame-Based Methods |
|
|
29 | (4) |
|
|
33 | (4) |
|
|
33 | (4) |
|
|
37 | (14) |
|
|
37 | (1) |
|
3.2 Coverage of Knowledge Areas |
|
|
38 | (2) |
|
3.3 An Overview of the PEERESS Framework |
|
|
40 | (5) |
|
3.4 Application of Our PEERESS Framework |
|
|
45 | (2) |
|
|
47 | (4) |
|
|
48 | (3) |
|
4 The CAST Method for Comparing Security Standards |
|
|
51 | (34) |
|
|
51 | (1) |
|
4.2 A Method for Comparing Security Standards |
|
|
52 | (1) |
|
4.3 CAST Step 1: Define a Common Terminology |
|
|
53 | (1) |
|
4.4 CAST Step 2: Analyze Existing Work |
|
|
54 | (3) |
|
|
55 | (1) |
|
4.4.2 NIST SP 800-30 Standard |
|
|
56 | (1) |
|
4.5 CAST Step 3: Define a Conceptual Model |
|
|
57 | (5) |
|
4.6 CAST Step 4: Instantiate Template with Standards |
|
|
62 | (11) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (5) |
|
4.6.4 The Common Criteria |
|
|
69 | (4) |
|
4.7 CAST Step 5: Compare Standards |
|
|
73 | (8) |
|
|
81 | (1) |
|
|
81 | (4) |
|
|
82 | (3) |
|
5 Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods |
|
|
85 | (24) |
|
|
85 | (2) |
|
5.2 Relating ISO 27001 to Security Requirements Engineering Methods |
|
|
87 | (11) |
|
|
98 | (6) |
|
5.4 Practical Application of Our Results |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (3) |
|
|
107 | (2) |
|
6 Supporting ISO 27001 Compliant ISMS Establishment with Si* |
|
|
109 | (30) |
|
|
109 | (1) |
|
6.2 A Method for Goal-Based ISMS Establishment |
|
|
110 | (5) |
|
6.3 Application of Our Method to a Smart Grid Scenario |
|
|
115 | (17) |
|
|
132 | (1) |
|
|
133 | (2) |
|
6.5.1 Techniques that support ISO 27001 compliant ISMS Establishment |
|
|
133 | (1) |
|
6.5.2 Goal-based Requirements Engineering for Security Analysis |
|
|
134 | (1) |
|
|
135 | (4) |
|
|
135 | (4) |
|
7 Supporting ISO 27001 Establishment with CORAS |
|
|
139 | (56) |
|
|
139 | (2) |
|
7.2 The ISMS-CORAS Method |
|
|
141 | (8) |
|
7.3 Application of Our Method |
|
|
149 | (39) |
|
|
188 | (3) |
|
|
191 | (4) |
|
|
192 | (3) |
|
8 Supporting Common Criteria Security Analysis with Problem Frames |
|
|
195 | (34) |
|
|
195 | (1) |
|
8.2 Supporting Common Criteria Using Problem Frames |
|
|
196 | (1) |
|
8.3 UML Profile for Problem-Based and Common Criteria-Compliant Security Analysis |
|
|
197 | (3) |
|
8.4 A Method for a Systematic Security Analysis and Documentation |
|
|
200 | (6) |
|
8.5 Application of Our Method |
|
|
206 | (12) |
|
|
218 | (2) |
|
8.7 Discussion of Our Results with Practicioners |
|
|
220 | (2) |
|
|
222 | (3) |
|
|
225 | (4) |
|
|
226 | (3) |
|
9 Supporting ISO 26262 Hazard Analysis with Problem Frames |
|
|
229 | (18) |
|
|
229 | (1) |
|
9.2 Challenges in an ISO 26262 Hazard Analysis |
|
|
230 | (1) |
|
9.3 A Hazard Analysis and Risk Assessment Method |
|
|
231 | (6) |
|
|
237 | (2) |
|
|
239 | (4) |
|
|
243 | (1) |
|
|
244 | (3) |
|
|
245 | (2) |
|
10 A Catalog of Context-Patterns |
|
|
247 | (34) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
10.4 Cloud System Analysis Pattern |
|
|
251 | (11) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (3) |
|
|
257 | (2) |
|
|
259 | (3) |
|
10.5 Peer-to-Peer System Analysis Pattern |
|
|
262 | (4) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
10.6 Service-Oriented Architecture Pattern |
|
|
266 | (6) |
|
10.6.1 Graphical Patterns |
|
|
266 | (3) |
|
|
269 | (1) |
|
|
269 | (3) |
|
|
272 | (5) |
|
10.7.1 Graphical Patterns |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (4) |
|
|
277 | (4) |
|
|
278 | (3) |
|
11 Initiating a Pattern Language for Context-Patterns |
|
|
281 | (18) |
|
|
281 | (1) |
|
11.2 A Template for Pattern Languages |
|
|
282 | (8) |
|
11.2.1 Viewpoints of Pattern Languages |
|
|
282 | (2) |
|
11.2.2 A Template for Describing a Pattern Language |
|
|
284 | (1) |
|
11.2.3 Software Engineering Definitions of a Pattern Language |
|
|
285 | (3) |
|
11.2.4 A Pattern Language for Context-Patterns |
|
|
288 | (2) |
|
11.3 A Meta-Model for Context-Pattern |
|
|
290 | (2) |
|
11.4 Relations Between Existing Context-Patterns |
|
|
292 | (5) |
|
|
297 | (2) |
|
|
297 | (2) |
|
12 Supporting the Establishment of a Cloud-Specific ISMS According to ISO 27001 Using the Cloud System Analysis Pattern |
|
|
299 | (94) |
|
|
299 | (1) |
|
12.2 Governance, Risk, and Compliance for Clouds |
|
|
300 | (3) |
|
12.3 Motivation for a Cloud-Specific ISMS Establishment Method |
|
|
303 | (3) |
|
12.4 Overview of Our PACTS Method |
|
|
306 | (3) |
|
12.5 PACTS Step 1: Get Management Commitment |
|
|
309 | (4) |
|
12.6 PACTS Step 2: Define ISMS Scope |
|
|
313 | (9) |
|
12.6.1 The Extended Cloud Pattern |
|
|
313 | (5) |
|
12.6.2 Instantiate the Extended Cloud Pattern with Our Running Example |
|
|
318 | (4) |
|
12.7 PACTS Step 3: Identify Assets |
|
|
322 | (8) |
|
12.8 PACTS Step 4: Analyze Threats |
|
|
330 | (14) |
|
12.8.1 Cloud Security Alliance---Top Threats to Cloud Computing |
|
|
331 | (1) |
|
12.8.2 Gartner's Cloud Security Risks Assessment |
|
|
332 | (2) |
|
12.8.3 Relations Between Threats and the Cloud Pattern |
|
|
334 | (2) |
|
12.8.4 Cloud Threat Patterns |
|
|
336 | (4) |
|
12.8.5 A Method for Pattern-Based Threat Analysis for Clouds |
|
|
340 | (4) |
|
12.9 PACTS Step 5: Conduct Risk Assessment |
|
|
344 | (3) |
|
12.10 PACTS Step 6: Create Security Policies and Reason About Controls |
|
|
347 | (14) |
|
12.10.1 Controls in the ISO 27001 Standard |
|
|
349 | (1) |
|
12.10.2 A Method for Establishing ISO 27001 Policies |
|
|
349 | (3) |
|
12.10.3 Cloud Security Alliance: Cloud Controls Matrix |
|
|
352 | (3) |
|
12.10.4 Application of Our ISO 27001 Policy Method to Our Running Example |
|
|
355 | (2) |
|
12.10.5 Consistency Checks |
|
|
357 | (2) |
|
12.10.6 Policy Change Pattern |
|
|
359 | (2) |
|
12.11 PACTS Step 7: Design ISMS Specification |
|
|
361 | (1) |
|
12.12 Considering Legal Compliance in the PACTS Method |
|
|
362 | (13) |
|
12.12.1 Overview on Compliance Issues of Clouds |
|
|
364 | (2) |
|
12.12.2 PACTS Step 8: Identify Relevant Laws and Regulations |
|
|
366 | (2) |
|
|
368 | (3) |
|
12.12.4 PACTS Step 9: Define Compliance Controls |
|
|
371 | (2) |
|
|
373 | (2) |
|
12.13 Considering Privacy in the PACTS Method |
|
|
375 | (10) |
|
12.13.1 A Method for Considering Privacy in an ISMS |
|
|
376 | (1) |
|
12.13.2 Pacts Step 10: Instantiate Privacy Patterns |
|
|
376 | (5) |
|
12.13.3 Pacts Step 11: Analyze Privacy Threats |
|
|
381 | (1) |
|
12.13.4 Example of Our Privacy Method |
|
|
381 | (4) |
|
|
385 | (3) |
|
|
388 | (5) |
|
|
389 | (4) |
|
13 Validation and Extension of Our Context-Pattern Approach |
|
|
393 | (22) |
|
|
393 | (2) |
|
13.2 The ClouDAT Framework |
|
|
395 | (1) |
|
13.3 A Catalog for Cloud Security Requirements Patterns |
|
|
396 | (2) |
|
13.4 Representing Cloud Security Requirements Patterns |
|
|
398 | (6) |
|
13.5 Discussion and Analysis |
|
|
404 | (1) |
|
|
405 | (4) |
|
13.7 Discussions with Practitioners |
|
|
409 | (2) |
|
|
411 | (4) |
|
|
412 | (3) |
|
|
415 | (9) |
|
|
415 | (1) |
|
|
415 | (5) |
|
14.2.1 Security-Requirements-Engineering-Based Establishment of Security Standards |
|
|
416 | (2) |
|
14.2.2 Knowledge Transfer of Our Results to the Establishment of Safety Standards |
|
|
418 | (1) |
|
14.2.3 Structured Elicitation of the Environment with Context Patterns |
|
|
419 | (1) |
|
14.3 Answers to Our Research Questions |
|
|
420 | (2) |
|
14.4 Directions for Future Research |
|
|
422 | (2) |
|
14.4.1 Ontology-Based Support for Identifying Knowledge Objects to Support Security Standard Establishment |
|
|
422 | (1) |
|
14.4.2 Investigating the Relations Between SRE and Security Testing |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
References |
|
424 | (3) |
Appendix A OCL-Expressions for Validation and Security Reasoning |
|
427 | (30) |
Appendix B Comparing ISO 27001 and ISO 31000 |
|
457 | (8) |
Appendix C Comparing Annex A of ISO 27001 and ISO 27001:2013 |
|
465 | (8) |
Appendix D Template for Security Standards |
|
473 | |