{"title":"Towards the Intelligent Application of Security Controls","authors":"George Yee","doi":"10.1109/RAMS48030.2020.9153668","DOIUrl":null,"url":null,"abstract":"Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortunately all too common. In response to these attacks the organization applies security controls (e.g., encryption) to secure its vulnerabilities. However, these controls are often applied haphazardly, without any idea of their reliability, or any guidance on how they should be applied to account for the priority of the vulnerabilities or a security control’s effect on the overall security posture of the organization. This work derives a mathematical model linking the reliability of the security controls to the overall security level of the organization. The paper then combines this model with a method to prioritize vulnerabilities, allowing the organization to more intelligently apply security controls and reach its desired security level goal within negotiated budgetary constraints. The paper illustrates this approach using an application example.","PeriodicalId":360096,"journal":{"name":"2020 Annual Reliability and Maintainability Symposium (RAMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Annual Reliability and Maintainability Symposium (RAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAMS48030.2020.9153668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today, attacks on sensitive data held by organizations and the resulting data breaches are unfortunately all too common. In response to these attacks the organization applies security controls (e.g., encryption) to secure its vulnerabilities. However, these controls are often applied haphazardly, without any idea of their reliability, or any guidance on how they should be applied to account for the priority of the vulnerabilities or a security control’s effect on the overall security posture of the organization. This work derives a mathematical model linking the reliability of the security controls to the overall security level of the organization. The paper then combines this model with a method to prioritize vulnerabilities, allowing the organization to more intelligently apply security controls and reach its desired security level goal within negotiated budgetary constraints. The paper illustrates this approach using an application example.