Skip to main content
  • 978 Accesses

Abstract

Recent developments in information technology operations have shown two distinct trends. Firstly, products and services have become increasingly commoditised, thus leading to successive waves of outsourcing and offshoring. Secondly, the introduction of intelligent end-point devices and direct accessibility of webbased services has blurred the boundaries of traditional companies and their perimeter. As a result, the “cloud computing” paradigm creates new challenges for security management, including the business value and cost-benefit considerations.

Traditional security models often fail to address this new universe, inasmuch as they are based upon the axiomatic idea of a “closed” corporate IT environment. Practical difficulties in outsourcing or third-party situations are therefore, at best, treated as a business issue that is addressed at the contractual or legal level. In many instances, this causes legal and technical problems, as service level agreements and contracts are flawed instruments for describing a fully de-perimeterised IT environment and its practical requirements. This in turn increases the risk of systemic failures, operational damage, and legal ramifications.

The ISACA Business Model for Information Security (BMIS) provides a systemic foundation for managing cloud-based products and services in terms of their security aspects. The paper shows how the general model is applied and how the use of BMIS enhances the overall security level. It is further shown how aspects of governance, risk and compliance (GRC) may be included in order to align operational information security management with business requirements. The paper addresses practical steps towards securing a heavily clouded environment using recognised frameworks such as COBIT or the ISO 27000 series. Recommendations are given to enable direct use of the BMIS in day-to-day security management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

von Rössing, R. (2011). Applying BMIS to Cloud Security. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2010 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9788-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9788-6_10

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-1438-8

  • Online ISBN: 978-3-8348-9788-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics