Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements?

Bob Duncan, Mark Whittington, Martin Gilje Jaatun, Alfredo Ramiro Reyes Zuniga

Research output: Chapter in Book/Report/Conference proceedingChapter

44 Downloads (Pure)

Abstract

In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.
Original languageEnglish
Title of host publicationEnterprise Security
EditorsVictor Chang, Muthu Ramachandran, Robert J Walters , Gary Wills
PublisherSpringer
Pages19-39
Number of pages22
ISBN (Electronic)978-3-319-54380-2
ISBN (Print)978-3-319-54379-6
DOIs
Publication statusPublished - 2017
EventSecond International Workshop: ES 2015 - Vancouver, BC, Canada
Duration: 30 Nov 20153 Dec 2015

Publication series

NameLecture Notes in Computer Science
PublisherSpringer International Publishing AG
Volume10131
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceSecond International Workshop
CountryCanada
CityVancouver, BC
Period30/11/153/12/15

Keywords

  • cloud
  • requirements
  • measurement
  • assurance
  • outsourcing
  • incident response
  • security

Fingerprint Dive into the research topics of 'Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements?'. Together they form a unique fingerprint.

Cite this