An applied methodology for information security and assurance: A study case for cloud computing

TítuloAn applied methodology for information security and assurance: A study case for cloud computing
Tipo de publicaciónConference Paper
Year of Publication2014
AutoresVillalon-Fonseca, R, Solano-Rojas, BJ, Marin-Raventos, G
Conference NameInternet Technology and Secured Transactions (ICITST), 2014 9th International Conference for
Date Published12/2014
Palabras clavecloud computing, Computational modeling, Hardware, information security, Servers, Standards
Resumen

Information security is one of the main concerns in many fields of computer and information technologies, and even more on new emerging technologies such as cloud computing. Current security standards and models usually focus on "what" has to be done about security, but they do not propose "how" to deal with the inherent complexity of assuring modern infrastructures. Security standards usually produce large check lists describing security countermeasures, but they lack a comprehensive and complete process to define the security requirements of information being managed. As a consequence, security implementations may miss important security controls, and they cannot guarantee a consistent and in-depth security implementation at the different layers of the system. We propose a methodology with a novel hierarchical approach to guide a comprehensive and complete assurance process. Real use cases are shown, by applying our methodology to assure a private cloud being developed at the Universidad de Costa Rica (UCR).

DOI10.1109/ICITST.2014.7038851