2022
DOI: 10.1093/cybsec/tyac004
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity service level agreements: understanding government data confidentiality requirements

Abstract: Cybersecurity requirements, such as data security, are often used as evidence for the Government's relationship with external service providers to process, store and transmit sensitive government data. However, cybersecurity researchers have not profoundly studied the practical application of government data security requirements (e.g. data confidentiality) in service level agreements (SLAs) in the context of an outsourced scenario. The relationships with external service providers are usually established thro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The requirements identified as part of the cybersecurity strategy are often missed and not met. Cybersecurity Service Level Agreements (SLAs) [35] are a way to make sure that the promised services are delivered and reduce the cyber risk exposure for the manufacturer. If at any stage the QoS availability/reliability parameters are not met or there is a breach, cyber-SLAs provide a basis for postincident legal combat.…”
Section: Cybersecurity Service Level Agreementmentioning
confidence: 99%
“…The requirements identified as part of the cybersecurity strategy are often missed and not met. Cybersecurity Service Level Agreements (SLAs) [35] are a way to make sure that the promised services are delivered and reduce the cyber risk exposure for the manufacturer. If at any stage the QoS availability/reliability parameters are not met or there is a breach, cyber-SLAs provide a basis for postincident legal combat.…”
Section: Cybersecurity Service Level Agreementmentioning
confidence: 99%
“…In the realm of superannuation, where financial records, personal identification information, and transaction details are prevalent, maintaining the confidentiality of data is critical (Salagrama, 2021). Breaches in confidentiality can lead to identity theft, financial fraud, and erode the trust individuals place in the institution , Nugraha & Martin, 2022. Data integrity ensures the accuracy, consistency, and reliability of data throughout its lifecycle.…”
Section: Data Confidentiality and Integritymentioning
confidence: 99%
“…The "Security Orchestrator" is responsible for designing, instantiating, and managing the runtime lifecycle of circuits. Security Policy and SSLA Manager are responsible for violating SSLAs (Security Service Level Agreements) [115] and security policies defined by external entities. Trust Manager is responsible for the continuous assessment of the reliability of the network services and associated circuits (this trust is calculated based on the trust attributes specified in the Trust Level Agreement).…”
Section: Autonomic and Cognitive Security Managementmentioning
confidence: 99%