Abstract
An architecture is presented that is built as the sole reference for securing ICT services delivered to the market. It provides a specification for implementation during Bid phases through Transformation (project business) as well as for service operations (daily business). Simultaneously, it provides very detailed information to customers that allow them to compare offerings and to assess associated risks. The architecture describes the security procedures and all security controls as part of security standards. These standards provide a specification for implementation and operations in line with ITIL processes. They also provide transparency and evidence since these standards are used to demonstrate how the customer’s security requirements are met. Finally, the ICT Service Provider acquires an instrument that allows an active management of information security and that reduces costs while improving quality. This real-world approach is far too complex to be thoroughly described in this paper. So, in this paper a synopsis is being presented instead which depicts some major concepts and models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literature
Eberhard von Faber and Wolfgang Behnsen: Secure ICT Service Provisioning for Cloud, Mobile and Beyond, A Workable Architectural Approach to Equilibrate Buyers and Providers; Springer Vieweg, ISBN-978-3-658-00068-4 (to be published soon)
Eberhard von Faber and Michael Pauly: How Cloud Security strongly depends on Process Maturity, Automation and Scale; in: N. Pohlmann, H. Reimer, W. Schneider (Editors): Securing Electronic Business Processes, Vieweg (2011), ISBN-10: 3834819115, p. 23 – 33
Eberhard von Faber and Michael Pauly: User Risk Management Strategies and Models – Adaption for Cloud Computing; in: Securing Electronic Business Processes, Proceedings of the Information Security Solutions Europe, ISSE 2010, Vieweg+Teubner, Wiesbaden, 2010, ISBN 978- 3-8348-1438-8, p. 80-90
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
von Faber, E., Behnsen, W. (2012). A Systematic Holistic Approach for Providers to Deliver Secure ICT Services. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_9
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)