Authors
Kristian Beckers, Holger Schmidt, Jan-Christoph Kuster, Stephan Faßbender
Publication date
2011/8/22
Conference
2011 Sixth International Conference on Availability, Reliability and Security
Pages
327-333
Publisher
IEEE
Description
The ISO 27000 is a well-established series of information security standards. The scope for applying these standards can be an organisation as a whole, single business processes or even an IT application or IT infrastructure. The context establishment and the asset identification are among the first steps to be performed. The quality of the results produced when performing these steps has a crucial influence on the subsequent steps such as identifying loss, vulnerabilities, possible attacks and defining countermeasures. Thus, a context analysis to gather all necessary information in the initial steps is important, but is not offered in the standard. In this paper, we focus on the scope of cloud computing systems and present a way to support the context establishment and the asset identification described in ISO 27005. A cloud system analysis pattern and different kinds of stakeholder templates serve to understand and …
Total citations
201220132014201520162017201820192020202120222023202468101054273331
Scholar articles
K Beckers, H Schmidt, JC Kuster, S Faßbender - 2011 Sixth International Conference on Availability …, 2011