Reference Hub2
A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems

A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems

Azadeh Alebrahim, Denis Hatebur, Stephan Fassbender, Ludger Goeke, Isabelle Côté
Copyright: © 2015 |Volume: 6 |Issue: 1 |Pages: 23
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466678651|DOI: 10.4018/ijsse.2015010102
Cite Article Cite Article

MLA

Alebrahim, Azadeh, et al. "A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems." IJSSE vol.6, no.1 2015: pp.24-46. http://doi.org/10.4018/ijsse.2015010102

APA

Alebrahim, A., Hatebur, D., Fassbender, S., Goeke, L., & Côté, I. (2015). A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems. International Journal of Secure Software Engineering (IJSSE), 6(1), 24-46. http://doi.org/10.4018/ijsse.2015010102

Chicago

Alebrahim, Azadeh, et al. "A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems," International Journal of Secure Software Engineering (IJSSE) 6, no.1: 24-46. http://doi.org/10.4018/ijsse.2015010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To benefit from cloud computing and the advantages it offers, obstacles regarding the usage and acceptance of clouds have to be cleared. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using clouds. The ISO 27001 standard provides general concepts for establishing information security in an organization. Risk analysis is an essential part in the ISO 27001 standard for achieving information security. This standard, however, contains ambiguous descriptions. In addition, it does not stipulate any method to identify assets, threats, and vulnerabilities. In this paper, the authors present a method for cloud computing systems to perform risk analysis according to the ISO 27001. The authors' structured method is tailored to SMEs. It relies upon patterns to describe context and structure of a cloud computing system, elicit security requirements, identify threats, and select controls, which ease the effort for these activities. The authors' method guides companies through the process of risk analysis in a structured manner. Furthermore, the authors provide a model-based tool for supporting the ISO 27001 standard certification. The authors' tool consists of various plug-ins for conducting different steps of their method.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.