Abstract
Level 4 in the Hierarchy of Security Standards plays an important role since it serves both as directives for ICT production and delivery (provider’s side) and as a source of information for the user organization (customer’s side). This level comprises all security aspects that are relevant for the security of ICT services. Both the ICT services and the security aspects are diverse. An ordering schema is required and the individual security measures are assigned to separate ICT Security Standards in order to allow the efficient extraction of information required by user organizations. Such a structure or ordering schema, referred to below as taxonomy, is also required to enable the ICT Service Provider to produce and maintain the documentation of security measures. There are several conditions or requirements to be met by the taxonomy. These are identified and analyzed first (Sect. 5.1). Then the taxonomy is presented and explained step by step; first by explaining the three groups in the whole map, then by dividing up the whole map into six clusters (Sect. 5.2) and, finally, by briefly defining each ICT Security Standard in the context of its cluster (Sect. 5.3). After having defined the organization of security measures and standards, a structure is defined that organizes the internal content of all standards (Sect. 5.4). This does not really belong to the taxonomy itself, but further binding conditions are formulated along the primary parameters for ESARIS: hierarchical approach, modularity and standardization. A brief summary of the procedure and result is provided at the end of this chapter (Sect. 5.5).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Behnsen, W., von Faber, E. (2012). ESARIS Security Taxonomy. In: Secure ICT Service Provisioning for Cloud, Mobile and Beyond. Edition <kes>. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00069-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-658-00069-1_5
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00068-4
Online ISBN: 978-3-658-00069-1
eBook Packages: Computer ScienceComputer Science (R0)