3 SOLUTION
BSI (the German authority regarding IT security)
(BSI, 2009) suggests a framework compatible to the
requirements of the ISO 27001 in which a layered ap-
proach is used to simplify the problem of referencing
safeguards to categories of information security man-
agement relevant objects. Those layers are (1) inter-
sectoral aspects, (2) infrastructure, (3) IT systems, (4)
networks and (5) applications. The approach starts
with a layer that deals with general security man-
agement requirements for an organisation and is then
followed by layers beginning from physical to logi-
cal object categories. We argue that BSI’s approach
fits single organisations information security needs
but not federated processes, as for that purpose a top
down approach would be necessary which begins at
the level of processes, not at the level of infrastruc-
ture. Generally the layered approach seems appropri-
ate to be pursued towards that problem.
As a conceptual model, we therefore argue that
a layered model shall be used that uses the basis of
the descriptive model presented by BSI but replaces
the intersectoral layer by a process layer and inverts
the order of the other layers. The requirements of
that process layer are the same as the requirements
presented in BSI’s layer 1 (intersectoral aspects), but
refers to the process, not the organisation. Thererfore,
several organisations would have to implement safe-
guards identified for that process.
We now argue that BSI’s remaining layers shall
be used in opposite order, to receive a top down secu-
rity management approach. In particular, the process
layer (1) shall be followed by applications (2), net-
works (3), IT systems (4) and infrastructure (5), see
figure 4
2
.
Furthermore, due to the same structure of organisa-
tions supporting business processes and organisations
using personal data of a person registered at a social
network; we conclude that a business process and a
personal data usage process are to be handled in the
same way regarding security management.
In addition, we propose that the safeguards that
need to be implemented according to ISO/BSI shall
be extended by the following two constructs:
(1) For the purpose of an individual’s privacy eval-
uation (Heidisch and Pohlmann, 2012) has presented
the idea of a “data letter” where each web entity that
processes personal data (e.g. a social network) regu-
larly has to inform the user about which kind of infor-
mation is stored and processed about him. As a result,
2
The figure was developed using Fugu Icons designed
by Yusuke Kamiyamane.
Figure 4: Proposed IS security management layers.
the user may request change and deletion of the infor-
mation presented.
(2) Based on the idea of the data letter, we propose
the introduction of an IT security letter (ITSL) that
informs the user about the actual security measures
that were implemented at the level of a providers (IT)
infrastructure. This ITSL could be voluntary, thereby
serving as a competitive advantage at the market.
The content of the ITSL shall include references
to the implemented safegaurd categories as defined
in the ISO 27001. The broad guidelines defined in
that standard would form both a solid and individu-
ally formable frame of which the user can get an im-
pression of how its stored and processed information
is guarded against attacks and failure.
The actual safeguards to be implemented for those
layers shall stay the same as defined in ISO 2700x
and/or BSI IT-Grundschutz.
Following the proposed model, both federated
business processes and personal data usage processes
are secured towards threats against integrity, avail-
ability and confidentiality – especially those of per-
sonal data within social networks.
4 OUTLOOK
Future research shall both conduct further evidence of
the presented problem and deliver an evualuation of
the effectiveness of the proposed model. The common
view and methodology shall be refined and further
investigation be progressed regarding explicit safe-
guards serving the security of federated business pro-
cessed. In the end, a measurement model shall be de-
veloped to assess both the effectiveness and efficiency
of those safeguards.
TowardsProcessCenteredInformationSecurityManagement-ACommonViewforFederatedBusinessProcessesand
PersonalDataUsageProcesses
191