Obligations to enforce prohibitions: on the adequacy of security policies

TitleObligations to enforce prohibitions: on the adequacy of security policies
Publication TypeConference Paper
Year of Publication2013
AuthorsPieters W., Padget J., Dechesne F., Dignum V., Aldewereld H.
Conference NameSIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey
Date PublishedNovember
PublisherACM
Conference LocationNew York
KeywordsGraphs, logics, obligations, prohibitions, refinement, security policies
Abstract

Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too strong or too weak, leading to unnecessary productivity loss, or the possibility of becoming victim to attacks that exploit the weaknesses, respectively. In this paper, we propose a framework in which the security obligations of employees are linked directly to prohibitions that prevent external agents (attackers) from reaching their goals. We use graph-based and logic-based approaches to formalise and reason about such policies, and show how the framework can be used to verify correctness of the associated refinements. The framework can assist organisations in aligning security policies with their threat model.

DOI10.1145/2523514.2523526