Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

dc.contributor.authorMatthew L. Hale
dc.contributor.authorRose Gamble
dc.coverage.spatialBolivia
dc.date.accessioned2026-03-22T13:59:02Z
dc.date.available2026-03-22T13:59:02Z
dc.date.issued2017
dc.descriptionCitaciones: 23
dc.description.abstractCompanies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various federal and industry regulatory standards, such as the NIST Special Publication on Security Controls for Federal Information Systems (NIST SP-800-53), or the Common Criteria (ISO 15408-2). Such organizations operate business or mission critical systems where a lack of or lapse in security protections translates to serious confidentiality, integrity, and availability risks that, if exploited, could result in information disclosure, loss of money, or, at worst, loss of life. To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems, which may exist outside of the information system enclave as web or cloud services also implement appropriate security measures consistent with organizational expectations. This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations to use in conjunction with formal methods and service agreements for accreditation. The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents. Accuracy, applicability, consistency, and efficacy of the approach were evaluated using controlled qualitative and quantitative methods in two separate studies.
dc.identifier.doi10.1007/s00766-017-0287-5
dc.identifier.urihttps://doi.org/10.1007/s00766-017-0287-5
dc.identifier.urihttps://andeanlibrary.org/handle/123456789/43863
dc.language.isoen
dc.publisherSpringer Science+Business Media
dc.relation.ispartofRequirements Engineering
dc.sourceUniversity of Nebraska at Omaha
dc.subjectCertified Information Systems Security Professional
dc.subjectAccreditation
dc.subjectCertification
dc.subjectInformation security
dc.subjectInformation system
dc.subjectSecurity controls
dc.subjectComputer science
dc.subjectInformation technology audit
dc.subjectInformation security standards
dc.subjectAudit
dc.titleSemantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
dc.typearticle

Files