Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2020, Issue 19, volume 2, Pages 383–411
DOI: https://doi.org/10.15622/sp.2020.19.2.6
(Mi trspy1103)
 

This article is cited in 1 scientific paper (total in 1 paper)

Information Security

Method for evaluating security of Cloud IT-components based on estandards criteria

I. Livshitz

ITMO University (Saint Petersburg National Research University of Information Technologies, Mechanics and Optics)
Abstract: The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered.
An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services.
A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria — assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT-components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.
Keywords: management system, risk, information technology, IT-security, audit, standard, expertise, assessment.
Received: 25.09.2019
Document Type: Article
UDC: 004.094
Language: Russian
Citation: I. Livshitz, “Method for evaluating security of Cloud IT-components based on estandards criteria”, Tr. SPIIRAN, 19:2 (2020), 383–411
Citation in format AMSBIB
\Bibitem{Liv20}
\by I.~Livshitz
\paper Method for evaluating security of Cloud IT-components based on estandards criteria
\jour Tr. SPIIRAN
\yr 2020
\vol 19
\issue 2
\pages 383--411
\mathnet{http://mi.mathnet.ru/trspy1103}
\crossref{https://doi.org/10.15622/sp.2020.19.2.6}
Linking options:
  • https://www.mathnet.ru/eng/trspy1103
  • https://www.mathnet.ru/eng/trspy/v19/i2/p383
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:263
    Full-text PDF :275
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024