Modeling Dependencies of ISO/IEC 27002:2013 Security Controls

被引:1
|
作者
Sengupta, Anirban [1 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Ctr Distributed Comp, Kolkata, India
关键词
Control dependence; ISO/IEC 27002:2013; Security controls; Security standard;
D O I
10.1007/978-3-319-22915-7_33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security controls like policies, procedures, laws and regulations, or security tools and techniques help in mitigating risks to enterprise information systems. There are several security standards that provide guidance on the implementation of security controls. ISO/IEC 27002:2013 is one of the most widely accepted security standards; it has been adopted by the Indian government for implementation in critical sector enterprises. The controls of ISO/IEC 27002:2013 are inter-dependent and they consist of several types of implementation-specific tasks. Lack of proper research on these aspects makes it extremely difficult for enterprises to implement a comprehensive and correct control implementation programme. The present study analyses the controls of ISO/IEC 27002:2013, categorizes the implementation tasks and details the dependencies among controls and relationships among categories of tasks.
引用
收藏
页码:354 / 367
页数:14
相关论文
共 50 条
  • [1] From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 645 - 662
  • [2] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257
  • [3] A Comparative Review of Cloud Security Proposals with ISO/IEC 27002
    Rebollo, Oscar
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    [J]. WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 3 - 12
  • [4] ISO/IEC 27001与ISO/IEC 27002标准的演变
    谢宗晓
    王静漪
    [J]. 中国质量与标准导报, 2015, (07) : 48 - 52
  • [5] A Database System for Effective Utilization of ISO/IEC 27002
    Iqbal, Ahmad
    Horie, Daisuke
    Goto, Yuichi
    Cheng, Jingde
    [J]. FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 607 - 612
  • [6] Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams
    Fabien, Sechi
    Axel, Bjorn Gran
    Per-Arne, Jorgensen
    Oleh, Kilyukh
    [J]. 3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 49 - 56
  • [7] ISO/IEC 27002:2022的改版要点分析
    谢宗晓
    甄杰
    董坤祥
    [J]. 中国质量与标准导报, 2022, (03) : 11 - 15
  • [8] Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard
    Josefina Gutiérrez-Martínez
    Marco Antonio Núñez-Gaona
    Heriberto Aguirre-Meneses
    [J]. Journal of Digital Imaging, 2015, 28 : 481 - 491
  • [9] Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard
    Gutierrez-Martinez, Josefina
    Antonio Nunez-Gaona, Marco
    Aguirre-Meneses, Heriberto
    [J]. JOURNAL OF DIGITAL IMAGING, 2015, 28 (04) : 481 - 491
  • [10] On Scalable Security Audit for Web Application According to ISO 27002
    Bylica, Wojciech
    Ksiezopolski, Bogdan
    [J]. COMPUTER NETWORKS, 2011, 160 : 289 - 297