Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecturebased risk assessment and countermeasure definition and prioritization. Countermeasure prioritization is linked to business goals to achieve and based on cost of countermeasures and their effectiveness in reducing risks. RiskREP offers the potential to elicit complete security countermeasures, but also supports the deliberate decision and documentation of why the security analysis is focused on certain aspects. We illustrate RiskREP by an application to an action case.
|Title of host publication||Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011)|
|Place of Publication||Riga|
|Publisher||Riga Technical University|
|Publication status||Published - 2011|
Herrmann, A., Morali, A., Etalle, S., & Wieringa, R. J. (2011). RiskREP : risk-based security requirements elicitation and prioritization. In Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011) (pp. 155-162). Riga Technical University.