vide a step by step procedure as CRAMM, but a set
of criteria that has to be met to conform to the OC-
TAVE methodology. This provides great adaptability
and more flexibility than CRAMM to address specific
organizational needs. For easier access, three specific
application methods have been developed to choose
from, suited for different sizes of organizations. On
the other hand, it is self-directed, meaning that the
OCTAVE methodology has to be wholly exercisable
by the organization’s internal staff in a workshop en-
vironment, thus not relying on external experts. Fi-
nally, OCTAVE is focused on organizational risks,
whereas CRAMM concentrates more on technical is-
sues, and OCTAVE generally does not take threat
likelihood into consideration (except for OCTAVE S
which provides basic means for including threat like-
lihood in the evaluation).
While the risk assessment methodologies evaluate
security technologies on their effectiveness to miti-
gate risks, the POSeM framework deals with informa-
tion security in a different way. The Process-Oriented
Security Model (POSeM) framework developed at the
University of Z¨ı¿
1
2
rich by R¨ı¿
1
2
hrig (R¨ohrig, 2002) is
a methodology to define security requirements and to
derive security measures by using process models as
the basis for the analysis. In this proposal, the four
security objectives confidentiality, integrity, availabil-
ity, and accountability are used to measure the secu-
rity levels of each process component (actor, artifact,
activity), and suitable security measures are derived
via rule bases. It takes into consideration that as-
sets do not generate business value themselves, but
participate in business processes that produce utility,
and therefore the methodologies rely on business pro-
cesses as the basis for their analysis. It also ignores
specific harmful events (e.g., threats), but concentrate
on eliciting security requirements and deriving appro-
priate security measures. The POSeM approach con-
sists of five steps: Definition of General Security Ob-
jectives, SEPL Model, Consistency Analysis, Deriva-
tion of Generic Security Measures, and an optional
Implementation Phase. The strengths of the POSeM
approach lie in the usage of business process mod-
els as the basis for the security evaluation and the
definition of organization specific rule sets for the
consistency checks and safeguard derivation. Using
process models seems to be a logical step in today’s
process-centered world. As processes are continually
improved (or completely restructured with BPR tech-
niques), the security status should be evaluated and
improved in line with the business processes. Relying
on the well established CIA properties also enhances
the insight into security-related matters of processes,
especially by assigning them to the individual process
components (participant, data, activity). By defining
organization-specific rules, the particularities of the
organization and its main processes can be taken into
consideration, thus reaching a high level of adaptabil-
ity of the POSeM process. These rules can be spec-
ified once and stored for further uses, which signifi-
cantly reduces the amount of time needed for the (re-
)evaluation. And the formal description methods of
SPEL, SMDL, and SCRL allow a high degree of au-
tomation, thus further reducing the workload. As em-
phasized by R¨ı¿
1
2
hrig, this framework is mainly in-
tended to elicit the requirements for safeguards, but
not to decide which specific safeguards to choose. As
a matter of fact, it is not suited as a standalone deci-
sion making method. The outcome of the evaluation
is solely a list that is suitable for implementing the
required security levels of the process components.
This is underpinned by the fact that the economical
factors of safeguards, namely their costs in monetary
or time units, are completely neglected and only the
technical aspect of security measures are evaluated.
Furthermore, POSeM ignores any specific negative
factors influencing business processes such as threats
and vulnerabilities, which are integral parts of risk as-
sessment practices. No harmful events (such as a viral
infection of the information system) are considered
and therefore no safeguards can be defined to counter
that specific problem. This is a major disadvantage of
a framework that is specifically designed to be a secu-
rity evaluation process.
The CORAS Framework is a tool-supported and
model-based risk analysis methodology, the result
of the EU-funded CORAS project. The frame-
work is founded on four pillars: Risk Documen-
tation Framework, Risk Management Process, Inte-
grated Risk Management Process and System Devel-
opment Process, and Platform for Tool Inclusion. The
CORAS framework that also applies UML for mod-
eling security-related issues, is centered around a tra-
ditional risk assessment process with asset, vulner-
ability, threat identification and evaluation and safe-
guard derivation. In order to model the risk entities, a
UML profile has been developed. Unlike the other
methods, CORAS incorporates techniques of other
frameworks to realize its risk identification process
(e.g., HAZard and OPerability study (HazOp) and
Fault Tree Analysis). This ensures a thorough analy-
sis of the problem, but also requires participants pro-
ficient with these techniques to pick the most appro-
priate. The main pillar of interest, the risk manage-
ment process, is based on the Australian/New Zealand
Standard AS/NZS 4360:1999: Risk Management and
ISO/IEC 17799: 2000 Information technology - Code
of practice for information security management. In
ICEIS 2009 - International Conference on Enterprise Information Systems
322