Skip to main content

Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?

  • Conference paper
  • First Online:
Enterprise Security (ES 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10131))

Included in the following conference series:

  • 926 Accesses

Abstract

In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Ahmad, A., Maynard, S.B., Shanks, G.: A case analysis of information systems and security incident responses. Int. J. Inf. Manag. 35(6), 717–723 (2015)

    Article  Google Scholar 

  • Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, vol. 50. Wiley, Hoboken (2008)

    Google Scholar 

  • Arjoon, S.: Corporate governance: an ethical perspective. J. Bus. Ethics 61(4), 343–352 (2012)

    Article  Google Scholar 

  • Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  • Baldwin, A., Beres, Y., Mont, M.C., Shiu, S., Duggan, G., Johnson, H., Middup, C.: An experiment in decision making WEIS 2011. In: WEIS, pp. 1–28 (2011)

    Google Scholar 

  • Beautement, A., Pym, D.: Structured systems economics for security management. In: WEIS, pp. 1–20 (2010)

    Google Scholar 

  • Boyd, J.R.: Organic design for command and control. A discourse on winning and losing (1987)

    Google Scholar 

  • Chang, V., Ramachandran, M., Yao, Y., Kuo, Y.H., Li, C.S.: A resiliency framework for an enterprise cloud. Int. J. Inf. Manag. 36(1), 155–166 (2016)

    Article  Google Scholar 

  • Chapin, F.S., Kofinas, G.P., Folke, C.: Principles of Ecosystem Stewardship: Resilience-Based Natural Resource Management in a Changing World. Springer, Heidelberg (2009)

    Google Scholar 

  • Doelitzscher, F., Ruebsamen, T., Karbe, T., Reich, C., Clarke, N.: Sun behind clouds - on automatic cloud security audits and a cloud audit policy language. Int. J. Adv. Netw. Serv. 6(1&2) (2013)

    Google Scholar 

  • Duncan, B., Pym, D.J., Whittington, M.: Developing a conceptual framework for cloud security assurance. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, vol. 2, pp. 120–125. IEEE (2013)

    Google Scholar 

  • Duncan, B., Whittington, M.: Compliance with standards, assurance and audit: does this equal security? In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, pp. 77–84. ACM (2014)

    Google Scholar 

  • Duncan, B., Whittington, M.: Company management approaches stewardship or agency: which promotes better security in cloud ecosystems? In: Cloud Computing, Nice, pp. 154–159. IEEE (2015a)

    Google Scholar 

  • Duncan, B., Whittington, M.: Enhancing cloud security and privacy: broadening the service level agreement. In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015), Helsinki, Finland, pp. 1088–1093 (2015b)

    Google Scholar 

  • Duncan, B., Whittington, M.: Information security in the cloud: should we be using a different approach? In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, pp. 1–6 (2015c)

    Google Scholar 

  • Duncan, B., Whittington, M.: Reflecting on whether checklists can tick the box for cloud security. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, Singapore, vol. 2015-February, pp. 805–810. IEEE (2015d)

    Google Scholar 

  • Duncan, B., Whittington, M.: The importance of proper measurement for a cloud security assurance model. In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, pp. 1–6 (2015e)

    Google Scholar 

  • Duncan, B., Whittington, M.: Enhancing cloud security and privacy: the power and the weakness of the audit trail. In: Submitted to Cloud Computing, Rome, pp. 1–6. IEEE (2016)

    Google Scholar 

  • EU: Unleashing the Potential of Cloud Computing in Europe (2012)

    Google Scholar 

  • EU: Cloud service level agreement standardisation guidelines. Technical report, EU Commission, Brussels (2014)

    Google Scholar 

  • EU: Reform of EU data protection rules (2016)

    Google Scholar 

  • Frøystad, C., Gjære, E.A., Tøndel, I.A., Jaatun, M.G.: Security incident information exchange for cloud services. In: Proceedings of International Conference on Internet of Things and Big Data (2016)

    Google Scholar 

  • Gill, A.: Corporate governance as social responsibility: a research agenda. Berkeley J. Int. Law 26(2), 452–478 (2008)

    Google Scholar 

  • Harrington, H.J.: Measurement. CIO, 19 September 1999

    Google Scholar 

  • Huse, M.: Accountability and creating accountability: a framework for exploring behavioural perspectives of corporate governance. Br. J. Manag. 16(S1), S65–S79 (2005)

    Article  Google Scholar 

  • Ioannidis, C., Pym, D., Williams, J.: Sustainability in information stewardship: time preferences: externalities and social co-ordination. In: WEIS 2013, pp. 1–24 (2013)

    Google Scholar 

  • Jaatun, M.G., Nyre, Å.A., Alapnes, S., Zhao, G.: An approach to confidentiality control in the cloud. In: Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless Vitae Chennai 2011) (2011)

    Google Scholar 

  • Jaatun, M.G., Pearson, S., Gittler, F., Leenes, R., Niezen, M.: Enhancing accountability in the cloud. Int. J. Inf. Manag. (2016, to appear)

    Google Scholar 

  • Jaatun, M.G., Tøndel, I.A.: How much cloud can you handle? In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 467–473 (2015)

    Google Scholar 

  • Kao, R.: Stewardship Based Economics. World Scientific, Singapore (2007)

    Book  Google Scholar 

  • Kaspersky: Global Corporate IT Security Risks. Technical report, May 2013

    Google Scholar 

  • Kolk, A.: Sustainability, accountability and corporate governance: exploring multinationals’ reporting practices. Bus. Strateg. Environ. 17(1), 1–15 (2008)

    Article  Google Scholar 

  • Neumann, P.G.: Computer-Related Risks. Addison-Wesley, Reading (1995)

    Google Scholar 

  • OED: Oxford English Dictionary (1989)

    Google Scholar 

  • Pallas, F.: An agency perspective to cloud computing. In: Altmann, J., Vanmechelen, K., Rana, O.F. (eds.) GECON 2014. LNCS, vol. 8914, pp. 36–51. Springer, Heidelberg (2014). doi:10.1007/978-3-319-14609-6_3

    Google Scholar 

  • Parker, D.B., Crime, F.C.: Fighting Computer Crime: A New Framework for Protecting Information. Wiley, Hoboken (1998)

    Google Scholar 

  • Pearson, S., Charlesworth, A.: Accountability as a way forward for privacy protection in the cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 131–144. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_12

    Chapter  Google Scholar 

  • PWC: UK Information Security Breaches Survey. Technical report, London, April 2012

    Google Scholar 

  • Reyes, A.: Outsourced incident management services (2015)

    Google Scholar 

  • Reyes, A., Jaatun, M.G.: Passing the buck: outsourcing incident response management. In: IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 503–508 (2015)

    Google Scholar 

  • Schneier, B.: The future of incident response. IEEE Secur. Priv. 12(5), 96–96 (2014)

    Article  Google Scholar 

  • Tøndel, I.A., Line, M.B., Jaatun, M.G.: Information security incident management: current practice as reported in the literature. Comput. Secur. 45, 42–57 (2014)

    Article  Google Scholar 

  • Willingmyre, G.T.: Standards at the crossroads. StandardView 5(4), 190–194 (1997)

    Article  Google Scholar 

Download references

Acknowledgements

The research in this paper has partly been supported by the European Commission (A4Cloud project, grant no. 317550).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bob Duncan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Duncan, B., Whittington, M., Jaatun, M.G., Zúñiga, A.R.R. (2017). Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?. In: Chang, V., Ramachandran, M., Walters, R., Wills, G. (eds) Enterprise Security. ES 2015. Lecture Notes in Computer Science(), vol 10131. Springer, Cham. https://doi.org/10.1007/978-3-319-54380-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54380-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54379-6

  • Online ISBN: 978-3-319-54380-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics