Information Technology Reference
In-Depth Information
Fig. 3. SO population process with security knowledge
V. Present the security requirements to management and security expert(s) for e-
valuation ; if necessary, perform adjustments and/or corrections to security re-
quirements. This step will help towards to the refinement and training of the
information extraction process. The database of security and assurance stan-
dards may be used for enriching the security requirements, in case the informa-
tion contained in the policy documents is deemed insufficient.
3. Security Actions Definition
VI. Associate the security requirements with specific security controls; this step
performs the linking of requirements with deployable security controls (Data-
base of Technical Controls), customized for the concept instance under ques-
tion. In this task, valuable help will be utilized from the infrastructure data col-
lected during step I.
VII. Transform the controls identified into a Ponder-compatible input; this step in-
volves the transformation of the controls (actions) specified in step VI into a
form that can be piped into Ponder rules. The Database of Technical Controls
is not a part of Ponder or CIM framework, but rather an enabling repository of
Search WWH ::




Custom Search