Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

Matthew L. Hale, Rose F. Gamble

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various federal and industry regulatory standards, such as the NIST Special Publication on Security Controls for Federal Information Systems (NIST SP-800-53), or the Common Criteria (ISO 15408-2). Such organizations operate business or mission critical systems where a lack of or lapse in security protections translates to serious confidentiality, integrity, and availability risks that, if exploited, could result in information disclosure, loss of money, or, at worst, loss of life. To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems, which may exist outside of the information system enclave as web or cloud services also implement appropriate security measures consistent with organizational expectations. This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations to use in conjunction with formal methods and service agreements for accreditation. The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents. Accuracy, applicability, consistency, and efficacy of the approach were evaluated using controlled qualitative and quantitative methods in two separate studies.

Original languageEnglish (US)
Pages (from-to)365-402
Number of pages38
JournalRequirements Engineering
Volume24
Issue number3
DOIs
StatePublished - Sep 1 2019

Keywords

  • Accreditation
  • Certification
  • Regulatory compliance
  • Requirement extraction
  • Security control standards
  • Security policy
  • Security requirements
  • Semantic hierarchy

ASJC Scopus subject areas

  • Software
  • Information Systems

Fingerprint

Dive into the research topics of 'Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards'. Together they form a unique fingerprint.

Cite this