Measures and metrics for the enforcement of critical security controls: A case study of boundary defense

Mohiuddin Ahmed, Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The center for internet security (CIS) publishes a set of defense actions which forms a set of defense in depth best practices known as critical security control (CSC) to detect, prevent, respond, and mitigate the cyber attacks against cyber systems and networks. However, no well defined automated measures and metrics are developed to validate the enforcement of these CSCs. Additionally, it is infeasible to directly analyze the implementation of security products to verify and validate the enforcement of CSCs in those security products. In this poster, we are going to present our preliminary analysis to develop automated measures and metrics for CSC based on threat model each CSC is targeting, measurable features, and cyber artifacts which can be used to create metrics for key enforcement indicators. We also present a case study to develop measures and metrics for a CIS CSC called boundary defense.

Original languageEnglish
Title of host publicationProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450371476
DOIs
StatePublished - 1 Apr 2019
Externally publishedYes
Event6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 - Nashville, United States
Duration: 1 Apr 20193 Apr 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
Country/TerritoryUnited States
CityNashville
Period1/04/193/04/19

Bibliographical note

Publisher Copyright:
© 2019 Copyright is held by the owner/author(s).

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Measures and metrics for the enforcement of critical security controls: A case study of boundary defense'. Together they form a unique fingerprint.

Cite this