YOMEDIA
![](images/graphics/blank.gif)
ADSENSE
Khung bảo mật để điều chỉnh yêu cầu người dùng cho nhiều cấp độ ứng dụng
8
lượt xem 0
download
lượt xem 0
download
![](https://tailieu.vn/static/b2013az/templates/version1/default/images/down16x21.png)
Bài viết này phân tích kết quả rà soát bảo mật cho toàn bộ quá trình từ lập kế hoạch đến vận hành hệ thống và dịch vụ đang vận hành, đồng thời đề xuất kế hoạch rà soát, tiến hành phù hợp theo quan điểm của người thực hiện bảo mật.
AMBIENT/
Chủ đề:
Bình luận(0) Đăng nhập để gửi bình luận!
Nội dung Text: Khung bảo mật để điều chỉnh yêu cầu người dùng cho nhiều cấp độ ứng dụng
- KHUNG BẢO MẬT ĐỂ ĐIỀU CHỈNH YÊU CẦU NGƯỜI DÙNG CHO NHIỀU CẤP ĐỘ ỨNG DỤNG Ngô Hải Anh1*, Lê Anh Tú2 1 Viện Công nghệ thông tin, Viện Hàn lâm Khoa học và Công nghệ Việt Nam 2 Phòng Đào tạo, Trường Đại học Hạ Long * Email: ngohaianh@gmail.com Ngày nhận bài: 13/11/2023 Ngày nhận bài sửa sau phản biện: 14/12/2023 Ngày chấp nhận đăng: 22/12/2023 TÓM TẮT Các doanh nghiệp vừa và nhỏ (SME) có thể vận hành các dịch vụ mới nếu họ đáp ứng các tiêu chuẩn đánh giá bảo mật trước khi xây dựng và triển khai dịch vụ mới. Các nhà cung cấp dịch vụ, bao gồm cả các công ty SME, tiến hành đánh giá bảo mật của riêng họ trước khi mở dịch vụ, nhưng thực tế có những hạn chế trong việc đáp ứng các yêu cầu chi tiết của từng bộ phận trong tổ chức và các thay đổi môi trường khác nhau đối với tài sản của công ty như đám mây. Hầu hết các nghiên cứu hiện tại tập trung cải thiện các mục trong danh sách kiểm tra đánh giá bảo mật và xác minh tính hiệu quả, mà có ít nghiên cứu phân tích và tổng hợp các kết quả trường hợp thực tế. Vì vậy, bài viết này phân tích kết quả rà soát bảo mật cho toàn bộ quá trình từ lập kế hoạch đến vận hành hệ thống và dịch vụ đang vận hành, đồng thời đề xuất kế hoạch rà soát, tiến hành phù hợp theo quan điểm của người thực hiện bảo mật. Từ khóa: chính sách bảo mật, cấp độ bảo mật, đánh giá bảo mật, khung bảo mật SECURITY FRAMEWORK FOR ADAPTING USER REQUIREMENTS FOR MULTIPLE APPLICATION LEVELS ABSTRACT Small and medium-sized enterprises (SMEs) were able to operate new services if they met the standards after receiving security reviews before building new services and implementing services. Before launching services, service providers—including small and medium-sized enterprises—conduct their own security reviews. However, due to various environmental changes and practical constraints, it is not always possible to meet all of the specific requirements of every department within the company, including the cloud. Existing studies have been conducted to improve the items of the security review checklist and verify its effectiveness, but there are insufficient studies to analyze and synthesize actual case results. Therefore, this paper analyses the results of the security review for the entire process from planning to operation of the system and service in operation and proposes an appropriate review and proceeding plan from the security practitioner’s point of view. Keywords: security policy, security framework, security levels, security review 124 Số 11 (2023): 124 – 130
- KHOA HỌC TỰ NHIÊN 1. INTRODUCTION addition or improvement of review items, check items were suggested to solve the Small and medium-sized enterprises problem that it is difficult to conduct a (SMEs) had to undergo security deliberations security review realistically due to the lack of from related agencies before establishing manpower and resources within the actual new electronic financial services and company. The effectiveness was verified implementing related services. However, as through expert tests based on service security the number of subjects to be deliberated standards and OWASP Mobile TOP 10 (Yoo, increased due to the revitalization of the 2017). In addition, to prevent accidents fintech business, the security review was (personal information leakage) that occur changed to proceed with the company itself through collaboration between malicious and maintain the security level on its own. attackers and insiders, the item on preventing Therefore, each company conducts its insider information leakage was presented as security review for new services, and if it is an in-house management plan (Jang-Su et al., difficult to make its judgment, it contacts the 2014, 2015). relevant institution (the FSS – Financial Supervisory Service) for answers through a In the study on the establishment of “non-action statement”. However, changes in security level standards, the CIAPP security the internal environment as technology level was proposed by adding the advances exist as a value that a company authentication (P) and personal information must continuously address and supplement, (P) indicators to the CIA-based security level and there have been practical limitations in to prepare the security level and standards for meeting various security requirements from electronic financial transactions (Kil-Young the interests of each organization and from & In-Seok, 2018). In particular, for the the perspective. In this regard, existing addition of security level indicators, the studies often changed or added checklists and importance of authentication and personal important items to improve security review, information, the necessity of introduction, and the effectiveness was reviewed, and the and actual cases are shown. In the case of analysis and review of actual service cases personal information, the indicators are were insufficient. divided into economic aspects and privacy In this paper, we analyse the results of the protection aspects. security review of various systems and In the study on deriving security services in operation and define the process requirements, we analysed actual attack from initial planning to final service opening according to the work area of each department. vulnerabilities to ensure vehicle cyber security, identified asset threats, derived The composition of this paper briefly security goals, and derived security introduces the existing studies in Section 2, requirements that must be applied to vehicles analyses the results of the security review of based on risk assessment (Yun et al., 2019). the actual operation service in Section 3, In order to prevent the leakage of internal suggests an appropriate review plan, and information, by having the user explain the concludes in Section 4. security violation caused by an insider’s 2. SECURITY REVIEW ANALYSIS mistake while the security solution is being operated, clearly explain what purpose or task 2.1. Existing Research the user violated the security behaviour for Existing studies on security review can be within the company and request approval broadly divided into the addition or from the superior By doing so, the facts of improvement of review items, establishment access to information and the basis for risky of security level standards, and derivation of behaviour were also prepared (Irdin et al, security requirements. In the study on the 2023; Jouini & Rabai, 2019 ). Số 11 (2023): 124 – 130 125
- Table 1. Security review actual case analysis and summary No Main field Key review items 1 Server Network: AD server zone configuration separately configured Communication Control: IP and Port Control through Firewall 2 Sales purpose External communications: Product information outbound restrictions, specific IP restrictions transmission Transmission interval security: encryption, using SFT 3 Other Service External communication: Interworking Outbound restrictions APIs Transmission interval encryption 4 Data Pipeline Network: Configure a separate Improvement security area, An AWS Direct (IDC → Cloud) connection, VPC Peering 5 Build and improve business Communication: Restricting access to internal systems messengers from external devices Terminal: External device (cell phone and mobile device) 6 Consignment of Documentation of consignment business to an external work (personal information) company Specifying legal liability for Damages 7 Provide member Purpose and consent of personal information of information collection affiliated company Security when providing personal information: encryption 8 Evidence functions to Contract confirmation, consent to personal information: prevent service collection of documentation evidence cancellation fee Encrypting Personal Information deduction Files: A Secure Meth 9 Expansion of Destruction and separate storage non-membership of personal information purchases Consignment of personal information and provision to third parties Encrypt personal information 10 Access to internal system of Secure connection: VPN external Enable device security and static Dispatched workers IP Accountability tracking: Access record storage and review Apply additional authentication methods (OTP) File security check and personal information retention check Limit usage and server connection time Delete Unnecessary Files 126 Số 11 (2023): 124 – 130
- KHOA HỌC TỰ NHIÊN 2.2. Security review real case analysis and In the business messenger development, arrangement files were shared only for business purposes, In this section, based on the results of such as prohibiting file downloads from conducting security reviews of systems and personal mobile devices other than the in-house services operated by various companies, core PC, and external exposure was restricted. review areas are summarized into a total of In consignment and provision of personal 10 cases as shown in Table 1. In the field of information, when entrusting a member’s review, various departments, such as service (user) personal information to a third party planning, development, operation, and legal for business purposes, the contract is affairs, requested review from the security concluded through a separate document for department for the past 3 years, checked personal information protection other than security issues, and selected from about 50 the original contract. In the case of cases that drew results. Duplicate cases due to similarities were excluded. In addition, transmitting personal information to the cases in which results were derived but were outside, the information of the information not constructed or given up in the middle subject is protected (encryption, etc.). were excluded. In the case of evidence for the prevention Major items derived from the review of fee deduction, if the service cannot be results include network and communication, used due to company circumstances after terminal and system, responsibility tracking, payment, in order to prevent disadvantages personal information, compliance and to the member (user), the consent of the contract, data security, and assignment of information subject is obtained and responsibility in case of violation. encryption is obtained in the process of Some of the main review items are as follows. collecting the documentary evidence. In the server configuration, it is necessary In the case of non-member purchases, to review the network, communication only members previously used the service, control, system security, access control, but when the purpose of the service was access history, and access restriction to achieved while expanding to non-members, it important information. was guided to delete the information of non- members or keep them separately in a In the case of product information separate system. transmission, external communication is restricted and encrypted communication is In accessing the internal system of made to maintain security in the transmission dispatched workers, internal employees must section (Chauhan & Stavros, 2023). maintain their work through the company In interworking with other services, system when dispatched overseas, so they communication to the outside is restricted, use a terminal to which security policy has consent from the information subject is been applied to access through a secure required when providing personal means of access. information (members), and vulnerabilities of As a result of analysing actual cases of APIs built to prevent direct communication security review, the subject of security review with external systems are checked. is as shown in Table 2 when developing new In the data transfer from IDC to AWS, a services, adding or changing functions to dedicated line (AWS Direct Connect) and existing services, linking with external cleaning of important information (personal services, and personal information There information) are required to secure the were a total of 4 cases of collecting or communication section. changing exposure. Số 11 (2023): 124 – 130 127
- Table 2. Classification of security review In addition, as shown in Table 3, the main targets categories that security practitioners should No. Target Contents review were derived from a total of 7 I New service In case of new categories: network and communication, development development other than terminal and system, responsibility tracking, the existing service personal information, compliance and II Additions and When it takes a long contract, data security, and assignment of changes to major time to develop or add responsibility in case of violation. The main service functions functions to an existing service contents to be reviewed for each category are III External service When internal as follows. linkage information such as In network and communication (A), it is personal information, checked whether there is communication financial information, with an external system, communication and sensitive direction (unidirectional or bidirectional), information is linked and security (encrypted communication) in with third-party services the communication section is guaranteed. In IV Collection, When personal the terminal and system (B), it is checked alteration, and information is whether there are any vulnerabilities in the disclosure of collected (initially, terminal itself or whether the security settings personal changed, expanded) or such as the host firewall are appropriate. In information the method of use is accountability tracking (C), it is checked changed whether the authorized user performed work activities at the permitted location and at the Table 3. Main categories and review contents of security review appropriate time. No. Target Contents In the case of personal information (D), A Network and External according to the personal information life Communication communication, cycle (collection, storage, use, provision, and transmission section, destruction), the consent of the information zone configuration subject, storage and use are matched with the and separation, initial purpose of collection, and destruction connection means, is checked when the purpose is achieved. In manganese communication compliance and contract (E), it is checked B Terminals and Vulnerability, whether the contents of the contract include systems vaccine, security reviewing whether the business scope is clear setting, access before the security check. control, additional In data security (F), it is checked whether authentication appropriate measures are taken to prevent C Accountability Saving Access and Behaviour Logs leakage or exposure of confidential and D Privacy Collection, Save, important information within the company. use, provision, In case of violation (G), the responsibility destruction of the company's executives and employees E Compliance and Service Contracts, or subcontractors’ employees in case of Contracts Damages breach of contract, negligence, or violation of Compensation security regulations is made clear. F Data Security Encryption, access restriction In the case of personal information (D), G Grant responsibility Information according to the personal information life for violations Protection Pledge, cycle (collection, storage, use, provision, and Agreement, Audit destruction), the consent of the information 128 Số 11 (2023): 124 – 130
- KHOA HỌC TỰ NHIÊN subject, storage and use are matched with the applicable. From the results of the existing initial purpose of collection, and destruction case analysis, it was found that the is checked when the purpose is achieved. classification of security review targets In compliance and contract (E), it is involves adding functions to existing services checked whether the contents of the contract or reviewing personal information-related include reviewing whether the business scope services, and the main categories of security is clear before the security check. review are Network and Communication (A) and Privacy (D). In data security (F), it is checked whether appropriate measures are taken to prevent leakage or exposure of confidential and important information within the company. In case of violation (G), the responsibility of the company's executives and employees or subcontractors’ employees in case of breach of contract, negligence, or violation of security regulations is made clear. Based on the review results, the category is related to work by department and requires Figure 1. Service and Security Review cooperation to take supplementary measures Process (A, B, E, G). It can be divided into repeated 3. SECURITY REVIEW PLAN cases (C, D, F) and cases in which This section suggests a plan for more complementary activities are continuously effective security review from the required in the management aspect (E, G). perspective of security practitioners. First, in Table 4 is the combined result of the order to effectively conduct a security review, above review, and it provides a it is necessary to clarify the role with the comprehensive overview of Security Review relevant departments in the field and secure a Actual Case Analysis and Summary in Table process from the beginning of the initial 1, Classification of Security Review Targets review to the end of the review. in Table 2, and Security Review Main Figure 1 summarizes the general security Categories and Review Contents in Table 3. review process. First, when the purpose of building or changing a new system for service Table 4. Integration of real case result improvement arises from a customer or analysis in security review management, the service planning No. Classification of Main Categories and department devises a specific plan according Security Review Review Contents of [Table 1] Targets [Table 2] Security Review [Table 3] to the purpose. . In addition, from the I II III IV A B C D E F G prepared plan, the security department guides 7 ● ● ○ the reviewed issues to the relevant 8 ● ● ○ ○ ○ departments such as development and 9 ● ● ○ ○ ○ system, and based on this, security 10 ● ○ ○ ○ ○ implementation measures are completed For example, item 5 in Table 4 is the field before the service is opened. Finally, make of business messenger construction and sure it has been removed. improvement. As for the security review Next, after establishing the security target, it is a new construction related to review process, the security practitioner personal information and falls into Ⅰ and Ⅳ. checks the main categories and contents of Network and Communication (A), Terminals the security review to see if there is anything and systems (B), Accountability (C), and to review, and checks the main items of the Grant responsibility for violations (G) are corresponding category. Số 11 (2023): 124 – 130 129
- For example, the security review of the current organization and situation. customer service through the linkage of third- ACKNOWLEDGEMENT party services in Figure 2 is as follows. The security practitioner first checks the direction The Vietnam Academy of Science of communication between the external (VAST) supported this research under the system and the internal system and restricts project numbered “VAST01.09/22-23”. unnecessary access. Currently, it prevents REFERENCES outsiders from directly accessing the internal Chauhan, M., & Stavros, S. (2023). An system and prepares supplementary measures Analysis of Cloud Security Frameworks, such as additional authentication means. Problems and Proposed Solutions. When major information such as customer Network 3, No.3, 422-450. information of another company is stored in the internal system, the data is encrypted, and Irdin, P., Raffaela, G., Thomas, W., Jubril, a security pledge for the fulfilment of G., A., Alexander, R., Michael, F., & responsibilities and obligations is requested. Matthias, T. (2023). A systematic review In addition, a system should be established so on security and safety of self-adaptive that personnel participating in development systems. Journal of Systems and and operation can check when and what Software, Volume 203, 2023, 111716. actions were performed, and security matters Jang-Su, P., Yong-Suk, K., & Im-Yeong, L. such as blocking malicious codes and (2014). A Study on The Management blocking harmful sites should be maintained. Plan for Prevention of Information Leak by Using Call-out. Korea Information Processing Society 2014 Spring academic presentation Competition, 2014, 431-434. Jang-Su, P., Su-Hyun, K., & Im-Yeong, L. (2015). A Study on a Methodology of the Internal Security Management. Korea Information Processing Society 2015 Fall Conference, 2015, 726-729. Jouini, M. & Rabai, L. B. (2019). A Security Framework for Secure Cloud Computing Environments. In I. Management Figure 2. Customer service through Association (Ed.), Cloud Security: interworking with other companies Concepts, Methodologies, Tools, and 4. CONCLUSIONS Applications (pp.249-263). IGI Global. In this paper, the contents of the review Kil-Young, J., & In-Seok, K. (2018). conducted on the systems and services in Establishing Security Level Standards and operation regarding the security review were Case Studies for Safe Electronic Financial analysed. As a result of the review based on Transactions. Korea Information Security the entire service process, the security review Association, 729-741, 2018. target often added functions to existing services, and the contents of the security Yoo, H., S. (2017). A study on developed review were prominent in terms of network, security check items for assessing mobile communication, and personal information. It financial service security. Chung-Ang is also suggested that security issues should University Graduate School. be managed continuously while establishing Yun, K., S., Samuel, W., Jungho, L., & You, the entire process from the beginning to the S., L. (2019). Deriving Essential Security end of the service construction with the Requirements of IVN through Case relevant departments, and that the security Analysis. The Journal of the Korea Institute practitioner should respond appropriately to of Intelligent Transport Systems, 144-155. 130 Số 11 (2023): 124 – 130
![](images/graphics/blank.gif)
ADSENSE
CÓ THỂ BẠN MUỐN DOWNLOAD
Thêm tài liệu vào bộ sưu tập có sẵn:
![](images/icons/closefanbox.gif)
Báo xấu
![](images/icons/closefanbox.gif)
LAVA
AANETWORK
TRỢ GIÚP
HỖ TRỢ KHÁCH HÀNG
Chịu trách nhiệm nội dung:
Nguyễn Công Hà - Giám đốc Công ty TNHH TÀI LIỆU TRỰC TUYẾN VI NA
LIÊN HỆ
Địa chỉ: P402, 54A Nơ Trang Long, Phường 14, Q.Bình Thạnh, TP.HCM
Hotline: 093 303 0098
Email: support@tailieu.vn
![](https://tailieu.vn/static/b2013az/templates/version1/default/js/fancybox2/source/ajax_loader.gif)