How to Assess Confidentiality Requirements of Corporate Assets?
Confidentiality is an important property that organizations relying on information technology have to preserve. The purpose of this work is to provide a structured approach for identifying confidentiality requirements. A key step in the information security risk management process is the determination of the impact level arisen from a loss of confidentiality, integrity or availability. We deal here with impact level determination regarding confidentiality by proposing a method to calculate impact levels based on the different kind of consequences typically arisen from threats. The proposed approach assesses the impact arisen from confidentiality losses on different areas separately and uses a parameterized model that allows organizations to adjust it according to their specific needs. A validation of the developed approach has been conducted in a small software development company.
KeywordsBusiness Process Business Process Model Impact Level Security Breach Risk Management Process
- Accorsi, R., Wonnemann, C.: Strong non-leak guarantees for workflow models. In: Proceedings of the 2011 ACM Symposium on Applied Computing, New York, USA, pp. 308–314 (2011)Google Scholar
- Barker W., Stine K., Kissel R., Fahlsing J., Gulick J.: Volume I: Guide for mapping types of information and information systems to security categories. In: NIST Special Publication 800-60 Volume I Revision 1, NIST, Gaithersburg, MD 20899-8930 (2008a) Google Scholar
- Barker, W., Stine, K., Kissel, R., Fahlsing, J., Lee, A.: Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories” in NIST Special Publication 800-60 Volume II Revision 1, Gaithersburg, MD 20899-8930 (2008b)Google Scholar
- Club for the Security of Information in France (CLUSIF). Method for Harmonized Analysis of Risk (Mehari) (2010)Google Scholar
- Department for business innovation and skills, United Kingdom. Information security breaches survey.Technical report (2013)Google Scholar
- ISO/IEC, ISO/IEC 27001:2013, Information technology - Security techniques -Information security risk management (2013)Google Scholar
- Lehmann, A., Fahland, D.: Information flow security for business process models -just one click away. In: Lohmann, N., Moser, S. (eds.) Proceedings of the Demo Track of the 10th International Conference on Business Process Management 2012, Tallinn, Estonia (2012)Google Scholar
- McCallister, E., Grance, T., Scarfone, K.: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) in NIST Special Publication 800-122, NIST Gaithersburg, MD 20899-8930 (2010)Google Scholar
- National Institute of Standards and Technology, Standards for Security Categorization of Federal Information and Information Systems. In: Federal Information Processing Standards Publication 199, NIST, Gaithersburg, MD 20899-8930 (2004)Google Scholar
- National Institute of Standards and Technology, Guide for conducting risk assessment in NIST Special Publication 800-30 Revision 1, NIST, Gaithersburg, MD 20899-8930 (2012)Google Scholar
- Spanish Ministry for Public Administrations, Methodology for Information Systems Risk Analysis and Management (MAGERIT) v2 (2006)Google Scholar