【24h】

Automating Information Security Policy Compliance Checking

机译:自动化信息安全策略合规性检查

获取原文
获取原文并翻译 | 示例

摘要

Information Security Policies are used for expressing the high level objectives of Security of an enterprise. The different IT assets are configured to protect the enterprise from attackers. The configured assets generate log records as description of the events happening in the system. Published literature focuses on the behavioral aspects of the users in complying with the policies. This paper presents a novel idea of checking the compliance with Information Security Policies from the log records. The paper presents a formal description of compliance and goes on to describe the representation of the different entities like Policies, Rules, Events and Logs for the automatic Compliance checker.
机译:信息安全策略用于表达企业安全的高级目标。配置了不同的IT资产以保护企业免受攻击者的侵害。配置的资产生成日志记录,作为对系统中发生的事件的描述。公开的文献着重于用户遵守政策的行为方面。本文提出了一种从日志记录中检查是否符合信息安全策略的想法。本文提供了对合规性的正式描述,并继续描述了自动合规性检查器的不同实体(如策略,规则,事件和日志)的表示形式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号