Flows) again to decide new security treatments.
Fourth part, during the ”Operation Management”
and “Termination” phases. After the successful
completion of the system go-live test, operational
procedures should be delivered to end users. Then,
this system is going to the normal operation status of
security management process. Before the application
phases out, employees should have the termination
guideline or procedure on hand. Therefore, the data
can completely and without harm be moved back to
the internal system or to other systems.
5 CONCLUSIONS
Although security policy is only one of the security
controls, this is the fundamental base for building a
secure public SaaS system development life cycle.
To solve the problem of confidentiality breaches in
public SaaS solutions, a company needs to have
multiple layers of defense and strategies against
potential threats. These strategies must be consistent
with the business needs, be well defined in the
security policy and be effectively published for
every employee to comply. Based on the process and
the methods shown in this paper, companies can
proceed step by step and build their policy
systematically even under tight resource conditions.
Therefore, the customer data, employee data and
confidential business information will be better
protected during the whole SaaS system
development life cycle. Our on-going work is to
build an automatic data protection tool based on the
enterprises’ data classification policy. This control is
independent from the support of public SaaS
providers; thus, the tool can enforce the security
policy requirements and help to avoid confidentiality
breaches. To sum up, although there are many
security control objects, having a good tailored
security policy set is the first priority for enterprises
before using SaaS applications. Based on the well-
defined and executed security policies, companies
will not only take advantage of using an SaaS
solution, but will also protect their data on the
business battlefield.
REFERENCES
BSI, 2008, Information security management systems
(ISMS), BSI-Standard 100-1, v 1.5. German
Information Security Agency, Bonn.
BSI, 2010, Minimum security requirements for Cloud
Computing providers, draft BSI Standard (in German),
German Information Security Agency, Bonn.
Calder, A., Watkins S. and Watkins S.G., 2010,
Information security risk management for ISO27001
/ISO27002, IT Governance Ltd, UK.
Chou, Y., Levina, O., and Oetting, J., 2011, ‘Enforcing
confidentiality in a SaaS cloud environment’
Proceedings of the 2011 19th Telecommunications
Forum (TELFOR), 22-24 Nov. 2011, pp. 90-93, IEEE
Digital Library, IEEE Portal.
CSI, 2007, Computer crime and security survey 2007,
Computer Security Institute, viewed 20 Oct. 2011, <
http://www. gocsi.com/forms/csi_ sur vey.jhtml >
Diver S., 2007, Information security policy –a
development guide for large and small companies,
SANS Institute, viewed 28 February 2012, <
http://www.sans.org/reading_room/whitepapers/policy
issues/information-security-policy-development-
guide-large-small-companies_1331 >
ENISA (European Network and Information Security
Agency), 2009, Cloud Computing: benefits, risks and
recommendations for information security.
Guel, M. D., 2007, A short primer for developing security
policies, SANS Institute.
Hickey, A. R., 2010, Cloud computing security policies,
procedures lacking, CRN, viewed 28 February 2012,
<http://www.crn.com/news/security/224201359/cloud-
computing-security-policies-procedures-lacking.htm>
ISO/IEC 2005, Information technology – security
techniques – information security management
systems – requirements, ISO/ IEC 27001 Standard.
Jaeger, P., Lin J., and Grimes, J., 2008, ‘Cloud Computing
and information policy: computing in a policy
Cloud?’, Journal of Information Technology Politics ,
vol. 5, no.3, pp. 269-283.
Kee, C. K., 2001, Security policy roadmap - process for
creating security policies, NANS Institute.
Martin, E., 2011, ‘What’s wrong with security?’
Information Security, vol.13, no. 9, November, pp.8-
10.
NIST, 2009, Recommended security controls for federal
information systems and organizations, NIST SP 800-
53 v3 Standard.
Oracle, 2009, Securing data at the source: a guide to oracle
database security, viewed 28 February 2012, <
http://media.techtarget.com/Syndication/SECURITY/
SecuringDataSource.pdf>
OWASP, 2011, Mobile top 10 risk, viewed 28 February
2012,<https://www.owasp.org/index.php/OWASP_M
obile_Security_Project#tab=Top_Ten_Mobile_Risks >
Predd, J., Pfleeger, S. L., Hunker, J. and Bulford, C., 2008.
‘Insiders behaving badly’, Journal of IEEE Security &
Privacy, vol. 6, no. 4, July/August, pp. 66 – 70.
Rasmussen, M., 2011, Accountability in Policy
Management, Corporate Integrity, viewed 28 February
2012, < http://www.corp-integrity.com/compliance-
management/accountability-in-policy-management>
Tipton, H. F. and Henry, K., 2007. Official (ISC)
2
Guide
to the CISSP CBK, Auerbach Publications, New York.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
232