Skip to main content

Managing business compliance using model-driven security management

  • Chapter
Book cover ISSE 2008 Securing Electronic Business Processes
  • 459 Accesses

Abstract

Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Common Criteria Portal website, www.commoncriteriaportal.org, 2008

    Google Scholar 

  2. Eclipse project web site, www.eclipse.org

    Google Scholar 

  3. Eclipse Modeling Framework website, www.eclipse.org/modeling/emf

    Google Scholar 

  4. Gartner: Tear Down Application Authorization Silos With Authorization Management Solutions (G00147801), 31 May 2007

    Google Scholar 

  5. Gartner: Model-Driven Security: Enabling a Real-Time, Adaptive Security Infrastructure (G00151498), 21 September 2007

    Google Scholar 

  6. Gartner: Hype Cycle for Information Security, 2007 (G00150728), 4 September 2007

    Google Scholar 

  7. Gartner: Cisco Buys Securent for Policy Management, and Relevance (G00153181), 5 November 2007

    Google Scholar 

  8. Gartner website, www.gartner.com, 2008

    Google Scholar 

  9. Gartner: Cool Vendors in Application Security and Authentication, 2008 (G00156005), 4 April 2008

    Google Scholar 

  10. Gartner: Hype Cycle for Identity and Access Management Technologies, 2008 (G00158499), 30 June 2008

    Google Scholar 

  11. Gartner: Hype Cycle for Context-Aware Computing, 2008 (G00158162), 1 July 2008

    Google Scholar 

  12. IT Governance Institute: COBIT 4.1 Excerpt, Executive Summary, 2007

    Google Scholar 

  13. Public Law 104–191: Health Insurance Portability and Accountability Act of 1996, 21. Aug 1996

    Google Scholar 

  14. Health Level Seven web site, www.hl7.org

    Google Scholar 

  15. Intalio product web site, www.intalio.com, 2008

    Google Scholar 

  16. Lang, Ulrich and Schreiner, Rudolf: Integrated IT Security: Air-Traffic Management Case Study. ISSE 2005 Conference Budapest, Springer, 2005

    Google Scholar 

  17. Model Driven Security web site, www. modeldrivensecurity.org, 2008

    Google Scholar 

  18. OASIS Consortium: Web Services Business Process Execution Language, 11 Apr 2007

    Google Scholar 

  19. OASIS Consortium: XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0, 1 Feb 2005

    Google Scholar 

  20. Object Management Group, MDA web site, www.omg.org/mda

    Google Scholar 

  21. ObjectSecurity: OpenPMF 2.0 Model Driven Security Management product website, www.openpmf.com, 2008

    Google Scholar 

  22. ObjectSecurity website: Customer list with case studies and endorsements, www.objectsecurity.com, 2008

    Google Scholar 

  23. Schreiner, R, Lang, U, Ritter, T, Reznik, J, Building Secure and Interoperable ATC Systems, Eurocontrol INO Workshop 2006

    Google Scholar 

  24. ObjectSecurity: SecureMiddleware website, www.securemiddleware.org, 2008

    Google Scholar 

  25. House of Representatives, Sarbanes-Oxley Act of 2002, 24 Jul 2002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Lang, U., Schreiner, R. (2009). Managing business compliance using model-driven security management. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_24

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics