2 THE NORMATIVE
FRAMEWORK
The following paragraphs show the steps necessary
for risk analysis and mitigation. These have been
described in different level of detail but with the
same general intention in ISO/IEC FDIS 27001,
ISO/IEC 15408 and ASIS.
Figure 1 gives an overview over the procedure
the steps are embedded in.
Figure 1: Process, which the tool has to support.
Step 1: Risk Analysis
Assets, their value and their owners are
identified.
Vulnerabilities of the assets as well as threat
agents, which might exploit the
vulnerabilities, are identified.
For the resulting risks possible countermeasures
are identified and the appropriate ones are
selected.
Step 2: Definition of Mitigation Measures
Development of security policies
Analysis of relevant international, national and
corporate legal and technical standards
relevant for the situation.
Development of procedures and guidelines,
designing the way the security policies shall
actually be realized.
Step 3: Integration into Service/Infrastructure
architecture (not shown in figure 1)
Design of infrastructure with selected security
measures
Design of applications according to selected
security measures
Step 4: Verification (not shown in figure 1)
Selection of appropriate Assurance Level
Development of Evaluation Assurance Level
Criteria corresponding to the Assurance Level
selected
The following subsections give an idea about the
legal and technical recommendations the tool (or
tool-set) will have to be able to abide to. They
represent additional, project external constraints.
2.1 International Legal, Procedural
and Technical Standards
There are many international legal standards, which
have to be considered as important when treating
IT/Telco security. Some examples are:
Treaties of the European Union,
European Convention for the Protection of
Human Rights and Fundamental Freedoms,
European Directives
To show one important European standard in the
area of Identity Management:
The European Directive 95/46/CE: deals with
data protection, is aimed at giving to the data subject
(owner of data) the most control possible on its own
identity and personal data, posing a series of
requirements on recipients, controllers, processors
and even third parties. Art. 2, letter a), giving a
definition of "personal data", says: "identifiable
person is one who can be identified, directly or
indirectly, in particular by reference to an
identification number or to one or more factors
specific to his physical, physiological, mental,
economic, cultural or social identity".
There are also quite some procedural (non-
technical) international standards, which will play a
role when planning security measures. Two
examples are:
ISO/IEC FDIS 27001: This International
Standard specifies the requirements for
establishing, implementing, operating,
monitoring, reviewing, maintaining and
improving an IT security management plan
focussing on the overall business risks of the
organization the plan is made for.
COBIT: The Control Objectives for
Information and related Technology (COBIT)
provides a set of generally accepted measures,
indicators, processes and best practices to
assist
o in maximizing the benefits
derived through the use of
information technology and
o developing appropriate IT
governance and control in a
company
ICE-B 2008 - International Conference on e-Business
108