
In the remainder of the paper we evaluated meth-
ods for two aspects of a corresponding tool: control
selection and control prioritization. We showed that
we could automate the selection of controls by NLP
mechanisms. However, future work should analyse
whether the selected controls are complete or whether
some controls were missing, and the number of erro-
neously selected controls should be further reduced.
Additionally, mechanisms should be developed that
are applicable to the controls that are not covered by
the IT-asset based approach.
For the control prioritization we showed that con-
trols can be prioritized based on the currently ob-
served threats. In our implementation we used a man-
ual threat assessment, this work could be continued to
automate the treat assessment when appropriate threat
intelligence information is available.
In order to obtain a tool that covers all aspects
of the proposed architecture, the two elements con-
trol selection and control prioritization need to be in-
tegrated and additional topics need to be addressed.
This includes the development of a digital twin of an
organization that is more specific than an asset inven-
tory, and the development of possibilities that auto-
matically assess whether a control is implemented.
We expect that a tool implementing all building
blocks of the architecture would provide a significant
step forward in supporting small and medium sized
organization with their efforts towards securing their
organization.
REFERENCES
Barnard, L. and von Solms, R. (2000). A formalized ap-
proach to the effective selection and evaluation of in-
formation security controls. Computers and Security,
19(2):185–194.
Bettaieb, S., Shin, S., Sabetzadeh, M., Briand, L., Garceau,
M., and Meyers, A. (2020). Using machine learning
to assist with the selection of security controls during
security assessment. Empirical Software Engineering,
25.
Blei, D. M., Ng, A. Y., and Jordan, M. I. (2003). La-
tent dirichlet allocation. J. Mach. Learn. Res.,
3(null):993–1022.
BSI (2023). Bsi it-grundschutz kompendium. https:
//www.bsi.bund.de/DE/Themen/Unternehmen-und-
Organisationen/Standards-und-Zertifizierung/IT-
Grundschutz/IT-Grundschutz-Kompendium/it-
grundschutz-kompendium node.html. Accessed:
2023-10-19.
CIS (2021). Cis critical security controls. https://www.
cisecurity.org/controls. Accessed: 2023-10-19.
CISA (2018). Cybersecurity resources road map - a guide
for critical infrastructure - small and midsize busi-
nesses. https://www.cisa.gov/sites/default/files/c3vp/
smb/DHS-SMB-Road-Map.pdf. Accessed: 2023-10-
19.
Commission, E. (2022). Flash eurobarometer 496: Smes
and cybercrime. https://europa.eu/eurobarometer/
surveys/detail/2280. Accessed: 2023-10-19.
FCC (2023). Cyberplanner. https://www.fcc.gov/
cyberplanner. Accessed: 2023-10-19.
ISO (2022). Iso/iec 27001:2022 - information security, cy-
bersecurity and privacy protection. https://www.iso.
org/standard/27001. Accessed: 2023-10-19.
KeyBERT (2023). Keybert. https://maartengr.github.io/
KeyBERT/index.html. Accessed: 2023-10-19.
La, S. (2023). Prioritizing cybersecurity controls based on
the coverage of attack techniques and attack probabil-
ities. Technical report, ETHZ.
Li, T. (2017). Identifying security requirements based on
linguistic analysis and machine learning. In 2017
24th Asia-Pacific Software Engineering Conference
(APSEC), pages 388–397.
Llans
´
o, T. (2012). Ciam: A data-driven approach for se-
lecting and prioritizing security controls. In 2012
IEEE International Systems Conference SysCon 2012,
pages 1–8.
Neubauer, T., Ekelhart, A., and Fenz, S. (2008). Interac-
tive selection of iso 27001 controls under multiple ob-
jectives. In Jajodia, S., Samarati, P., and Cimato, S.,
editors, Proceedings of The Ifip Tc 11 23rd Interna-
tional Information Security Conference, pages 477–
492, Boston, MA. Springer US.
NIST (2018). Nist cyber security framework. https://www.
nist.gov/cyberframework. Accessed: 2023-10-19.
NIST (2023). Small business cybersecurity corner. https:
//www.nist.gov/itl/smallbusinesscyber. Accessed:
2023-10-19.
Rajaraman, A., Leskovec, J., and Ullman, J. (2014). Mining
of Massive Datasets.
rake nltk (2023). rake-nltk. https://csurfer.github.io/rake-
nltk/ build/html/index.html. Accessed: 2023-10-19.
sai360 (2023). sai360 - an integrated approach to gover-
nance, risk and compliance. https://www.sai360.com/
solutions/integrated-grc. Accessed: 2023-10-19.
scikit (2023). scikit. https://scikit-learn.org/stable/. Ac-
cessed: 2023-10-19.
servicenow (2023). servicenow - governance, risk and
compliance. https://www.servicenow.com/products/
governance-risk-and-compliance.html. Accessed:
2023-10-19.
spacy (2023). spacy. https://spacy.io/. Accessed: 2023-10-
19.
textrazor (2023). textrazor. https://www.textrazor.com/. Ac-
cessed: 2023-10-19.
Transparency, C. (2023). Certificate trasparecy. https:
//certificate.transparency.dev/howctworks/. Accessed:
2023-10-19.
yake (2023). yake. http://yake.inesctec.pt/. Accessed:
2023-10-19.
Yevseyeva, I., Fernandes, V. B., van Moorsel, A., Jan-
icke, H., and Emmerich, M. (2016). Two-stage se-
curity controls selection. Procedia Computer Science,
100:971–978. CENTERIS/ProjMAN / HCist 2016.
Towards Automated Information Security Governance
127