7 research outputs found
Compliance framework for change management in cloud environments
Mención Internacional en el título de doctorThe Governance, Risk and Compliance (GRC) area is one of the critical management areas for
every organization. This is particularly the case for information technology (IT) departments
where both human resources and technical infrastructures (software and hardware) need to
work seamlessly in order to provide the expected benefits. The study of the literature shows
that sound GRC methods are key to running and maintaining secure and compliant computing
infrastructures.
An important and particularly challenging aspect of the IT landscape is its constant and
perpetual evolution in order to keep pace with new and emerging technologies that find their
way faster and faster into the organizational infrastructure. Since assessments of risks and
compliance aspects always refer to a certain (more or less static) situation, such frequent
changes pose a real danger to the overall relevance of these assessments in the mid and longterm
perspective. So, a sound approach to ensuring compliance not only punctually (both in
time and space) but holistically – considering the complete IT landscape in a continuous way –
needs to integrate with the change management function of the organization.
Another important development in the last eight to ten years was the emergence of Cloud
Computing (CC) as a straightforward and efficient way of providing IT functionality to
organizations. While it poses many various challenges to IT management in general, CC is
particularly relevant for GRC as it makes an IT provision approach that was previously
sometimes applied – outsourcing – to a predominant approach to provide infrastructure (called
Infrastructure‐as‐a‐Service or IaaS), platforms (called Platform‐as‐a‐Service or PaaS), and
software (called Software‐as‐a‐Service or SaaS) within an organization.
CC and outsourcing entail wider challenges for GRC as it involves the inclusion of an external
party as a service provider within an organization reflecting specific aspects of provider
selection, contract management, service level agreements (SLAs), and monitoring. They
become even more challenging in the context of frequent and interdependent changes.
Therefore, this thesis is aimed at the definition and validation of a Compliance Framework for
Change Management in Cloud Environments (short: CFC MCC). The proposed solution of the
problem has been approached from a multidisciplinary point of view taking in consideration
aspects from computer science, IT management and IT governance, but also such aspects as
legal and cultural dimensions. The proposed solution provides a framework to support the
solicitation of requirements from different subject areas (e.g., organizational, technological,
cultural) and their subsequent consideration within the change management process of
established IT management frameworks such as ITIL. It can be tailored to the specific situation
of most organizations and provides a consistent approach to address GRC aspects in rapidly
evolving cloud‐based organizational IT landscapes.
The scientific discourse within the thesis has been structured following best academic practices
and recommendations. In the last phase of the research methodology an empirical validation
has been performed to verify the applicability of the framework. The data obtained from the
validation indicate that the application of the framework for ensuring compliance in CC
environments constitutes a relevant improvement of the change management process.El área de gobernanza, riesgo y cumplimiento (por sus siglas en inglés GRC) es una de las áreas
de gestión clave en todas las organizaciones. En el caso de los departamentos de Tecnología de
la Información (por sus siglas en inglés IT de Information Technology) el área cuenta con una
importancia igualmente crucial. Estos departamentos deben orquestar los recursos de capital
intelectual y las infraestructuras hardware y software para contribuir a la generación de
beneficios empresariales. La literatura ha demostrado que un conjunto de procedimientos en
el área GRC es clave para prestar el servicio de forma eficiente a partir del mantenimiento de
una infraestructura tecnológica segura y compatible.
Un aspecto importante y particularmente retador en el entorno IT es su constante evolución
con el propósito de habilitar la adopción de nuevas tecnologías en apoyo de los procesos
corporativos. Dado que la evaluación de riesgos y los aspectos de cumplimiento se refieren a
una determinada situación que se puede considerar más o menos estática, los continuos
cambios en el entorno IT representan una amenaza para la incorporación de nuevas tecnologías
en ámbitos corporativos desde el punto de vista GRC. Por ello, un enfoque sólido para garantizar
el cumplimiento no sólo de forma puntual en tiempo y espacio sino de forma integral,
considerando el entorno IT en una forma continua e integrada con la gestión del cambio
corporativa.
Otro desarrollo importante y modificador de la situación actual es la emergencia de la
computación en la nube (CC, siglas en inglés de Cloud Computing) como una forma efectiva y
eficaz de proporcionar la función IT en las organizaciones. Pese a que CC suscita diversos
desafíos para la administración IT, es en particular relevante para GRC ya que habilita la
externalización del servicio como una aproximación predominante para proporcionar
infraestructura (llamado Infraestructure‐as‐a‐Service o IaaS), plataformas (llamado Platformas‐
a‐Service o PaaS) y software (llamado Software‐as‐a‐Service o SaaS) dentro de una
organización.
CC y la externalización suponen retos más amplios para GRC, ya que implican la inclusión de un
proveedor de servicios externo dentro de una organización. Esta circunstancia aflora
cuestiones relativas a la selección de proveedores, la gestión de contratos, los acuerdos de nivel
de servicio (por sus siglas en inglés SLA), y el seguimiento de las relaciones y los servicios
prestados. Estos aspectos, se convierten en un reto aún mayor en el contexto de los cambios
frecuentes e interdependientes en el ámbito IT. Por lo tanto, esta tesis está dirigida a la
definición y validación de un marco de cumplimiento para la gestión del cambio en entornos
relativos a la nube (abreviatura: CFC MCC). La solución propuesta del problema ha sido
abordada desde un punto de vista multidisciplinar, tomando en consideración aspectos de la
informática, la gestión de IT y el gobierno de IT pero incorporando también aspectos tales como
las dimensiones legales y culturales. La solución propuesta proporciona un marco para apoyar
la solicitud de requisitos de diferentes áreas (por ejemplo, organizativos, tecnológicos,
culturales) y su posterior consideración en el proceso de gestión del cambio de los marcos
establecidos de gestión de TI como pueda ser ITIL. EL marco puede ser adaptado a la situación
específica de las organizaciones y proporciona un enfoque coherente para abordar los aspectos
de GRC en rápida evolución entornos de TI de la organización basados en la nube.
El discurso científico dentro de la tesis se ha estructurado siguiendo las prácticas académicas y
recomendaciones de investigación. En la última fase de la metodología de la investigación
empírica una validación se ha realizado para verificar la aplicabilidad del marco. Los datos
obtenidos de la validación indican que la aplicación del marco para garantizar el cumplimiento
en entornos CC constituye una mejora relevante del proceso de gestión del cambio de las
organizaciones.Programa Oficial de Doctorado en Ciencia y Tecnología InformáticaPresidente: Antonio de Amescua Seco.- Secretario: José Antonio Manzano Calvo.- Vocal: Ahmed Barnaw
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization\u27s information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. Based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened
Governance, risk, and compliance in cloud scenarios
Cloud computing is changing the way organizations approach technology and its infrastructure. However, in spite of its attractiveness, cloud computing can be seen as a threat in terms of compliance. Given its intrinsic distributed nature, regulations and laws may differ and customers and cloud providers must find a way to balance increasing compliance pressures with cloud computing benefits. In this paper, the authors present a framework aimed to help organizations to cope with compliance aspects in their cloud-oriented environments. Built upon current literature on the topic and qualitative approaches, the framework has been implemented in two organizations. Results from its contribution are encouraging, leading to adopter organizations to less reported compliance violations and higher contribution of cloud computing to overall quality of service and organizational compliance management.publishedVersio
Proposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector.
Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed.
The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources
Governance, Risk, and Compliance in Cloud Scenarios
Cloud computing is changing the way organizations approach technology and its infrastructure. However, in spite of its attractiveness, cloud computing can be seen as a threat in terms of compliance. Given its intrinsic distributed nature, regulations and laws may differ and customers and cloud providers must find a way to balance increasing compliance pressures with cloud computing benefits. In this paper, the authors present a framework aimed to help organizations to cope with compliance aspects in their cloud-oriented environments. Built upon current literature on the topic and qualitative approaches, the framework has been implemented in two organizations. Results from its contribution are encouraging, leading to adopter organizations to less reported compliance violations and higher contribution of cloud computing to overall quality of service and organizational compliance management
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. It is based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened
Security Management Standards: A Mapping
AbstractAdjustment and cost-effectiveness are key elements of a successful Information Security Management System (ISMS). ISMS-Processes, as basic elements of every ISMS, need to be aligned to the organization and its mission. As of today, a specific ISMS process framework does not exist. ISMS processes are not in focus of current research. This article aims to fill this research gap by presenting results of a process mapping study regarding ISMS processes in the most important and widely accepted international standards for Information Security Management. Authors propose a set of ISMS processes within an ISMS process framework which should be implemented at an individually appropriate maturity level