@inbook{d85a4c0eed3346dfbba3619cbb6dcdac,
title = "Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements?",
abstract = "In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.",
keywords = "cloud, requirements, measurement, assurance, outsourcing, incident response, security",
author = "Bob Duncan and Mark Whittington and Jaatun, {Martin Gilje} and Zuniga, {Alfredo Ramiro Reyes}",
year = "2017",
doi = "10.1007/978-3-319-54380-2_2",
language = "English",
isbn = "978-3-319-54379-6",
series = "Lecture Notes in Computer Science",
publisher = "Springer ",
pages = "19--39",
editor = "Victor Chang and Muthu Ramachandran and {Walters }, {Robert J} and Gary Wills",
booktitle = "Enterprise Security",
note = "Second International Workshop : ES 2015 ; Conference date: 30-11-2015 Through 03-12-2015",
}