Cargando…

Constructing an architecture-based cybersecurity solution for a system

Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a systemic and exhaustive risk management process. The architecture approach pro...

Descripción completa

Detalles Bibliográficos
Autores principales: Alejandro, Mora-Castro, Andrés, González-Herrera, Ricardo, Villalón-Fonseca
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10326440/
https://www.ncbi.nlm.nih.gov/pubmed/37424761
http://dx.doi.org/10.1016/j.mex.2023.102010
_version_ 1785069428866547712
author Alejandro, Mora-Castro
Andrés, González-Herrera
Ricardo, Villalón-Fonseca
author_facet Alejandro, Mora-Castro
Andrés, González-Herrera
Ricardo, Villalón-Fonseca
author_sort Alejandro, Mora-Castro
collection PubMed
description Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a systemic and exhaustive risk management process. The architecture approach produces an integral set of security policies and controls that can be fully maintained during the entire system life-cycle. Furthermore, architecture models support automation and high scalability, thus providing an innovative way for constructing and maintaining the cybersecurity for very large systems or even for system of systems. This work describes details, technical aspects, and examples for the risk management process of the architecture, including the establishment of the system representation, the security goals, going through risk identification and analysis, up to the policies and control definition. Some highlighting points of the methodology follow. • System representation is simple because it focuses only on aspects relevant to security purposes. • Security objectives behave as an end-to-end guidance of the security, for the whole system and also during its life-cycle. • Risk management can be done with existing methods and standards, but additionally supported with the comprehensive capability provided by the system representation and the security objectives.
format Online
Article
Text
id pubmed-10326440
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-103264402023-07-08 Constructing an architecture-based cybersecurity solution for a system Alejandro, Mora-Castro Andrés, González-Herrera Ricardo, Villalón-Fonseca MethodsX Computer Science Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a systemic and exhaustive risk management process. The architecture approach produces an integral set of security policies and controls that can be fully maintained during the entire system life-cycle. Furthermore, architecture models support automation and high scalability, thus providing an innovative way for constructing and maintaining the cybersecurity for very large systems or even for system of systems. This work describes details, technical aspects, and examples for the risk management process of the architecture, including the establishment of the system representation, the security goals, going through risk identification and analysis, up to the policies and control definition. Some highlighting points of the methodology follow. • System representation is simple because it focuses only on aspects relevant to security purposes. • Security objectives behave as an end-to-end guidance of the security, for the whole system and also during its life-cycle. • Risk management can be done with existing methods and standards, but additionally supported with the comprehensive capability provided by the system representation and the security objectives. Elsevier 2023-01-09 /pmc/articles/PMC10326440/ /pubmed/37424761 http://dx.doi.org/10.1016/j.mex.2023.102010 Text en © 2023 The Author(s) https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Computer Science
Alejandro, Mora-Castro
Andrés, González-Herrera
Ricardo, Villalón-Fonseca
Constructing an architecture-based cybersecurity solution for a system
title Constructing an architecture-based cybersecurity solution for a system
title_full Constructing an architecture-based cybersecurity solution for a system
title_fullStr Constructing an architecture-based cybersecurity solution for a system
title_full_unstemmed Constructing an architecture-based cybersecurity solution for a system
title_short Constructing an architecture-based cybersecurity solution for a system
title_sort constructing an architecture-based cybersecurity solution for a system
topic Computer Science
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10326440/
https://www.ncbi.nlm.nih.gov/pubmed/37424761
http://dx.doi.org/10.1016/j.mex.2023.102010
work_keys_str_mv AT alejandromoracastro constructinganarchitecturebasedcybersecuritysolutionforasystem
AT andresgonzalezherrera constructinganarchitecturebasedcybersecuritysolutionforasystem
AT ricardovillalonfonseca constructinganarchitecturebasedcybersecuritysolutionforasystem