Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659711
|View full text |Cite
|
Sign up to set email alerts
|

Compliance with standards, assurance and audit

Abstract: Managing information security is a challenge. Traditional checklist approaches to meeting standards may well provide compliance, but do not guarantee to provide security assurance. The same might be said for audit. The complexity of IT relationships must be acknowledged and explicitly managed by recognising the implications of the self-interest of each party involved. We show how tensions between these parties can lead to a misalignment of the goals of security and what needs to be done to ensure this does not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(28 citation statements)
references
References 14 publications
0
26
0
1
Order By: Relevance
“…There is not a complete cloud security standard because cloud technology is evolving far faster than standards [53]. Therefore, creating a set of security domains just based on the current security standards is not adequate to take into account emerging issues and attack surfaces.…”
Section: Cscmm Domainsmentioning
confidence: 99%
“…There is not a complete cloud security standard because cloud technology is evolving far faster than standards [53]. Therefore, creating a set of security domains just based on the current security standards is not adequate to take into account emerging issues and attack surfaces.…”
Section: Cscmm Domainsmentioning
confidence: 99%
“…Since the evolution of cloud computing, a number of cloud security standards have evolved, but there is still no standard which offers complete security, which is a limitation. Even compliance with all standards will not guarantee complete security, which, presents another disadvantage (Duncan and Whittington, 2014).…”
Section: The Challengesmentioning
confidence: 99%
“…We have argued that companies need to take account of these gaps in the standards when addressing issues of compliance. In (Duncan and Whittington, 2014), we have addressed the question of whether compliance with standards, assurance and audit can provide security, and in (Duncan and Whittington, 2015d), we have addressed one of the fundamental weaknesses of the standards compliance process.…”
Section: The Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach on this problem is often by using technical means alone frequently being expressed as policies authorising some action. But the business architecture of an enterprise comprises people, process and technology [PWC, 2012], not technology alone, thus such solutions are generally doomed to failure, as suggested by [Duncan et al, 2013][ Duncan and Whittington, 2014] [Duncan and Whittington, 2015d] [Duncan and Whittington, 2015b], who note such approaches ignore the impact of people and process on security.…”
Section: Introductionmentioning
confidence: 99%