Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services

Michael Middelhoff

Cite this publication as

Michael Middelhoff, Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services (2023), Logos Verlag, Berlin, ISBN: 9783832583064

7
accesses

Description / Abstract

Supply chain security encompasses measures preventing theft, smuggling, and sabotage through heightened awareness, enhanced visibility, and increased transparency. This necessitates the adoption of a security-by-design paradigm to achieve effective and efficient security measures, yielding additional benefits such as diminished supply chain costs. Given their vulnerability, transportation and logistics service providers play a pivotal role in supply chain security.
This thesis leverages systems security engineering and security-by-design to provide a methodology for designing and evaluating security measures for physical transport goods. It formulates nine principles that define security-by-design and establishes a supply chain security framework. An adaptation of the TOGAF architecture development facilitates the creation of secure-by-design enterprise architectures. Security measures are documented using security-enhanced processes based on BPMN. This enables an analysis and compliance assessment to ascertain the alignment of security with business objectives and the adequate implementation of requirements. The culmination of these efforts is exemplified through a case study.

Description

Michael Middelhoff studied Information Systems at the University of Münster, Germany. He worked as a research assistant at the European Research Center for Information Systems (ERCIS). During this time, he conducted research in the field of enterprise architecture management at the Chair of Information Systems and Supply Chain Management. In June 2023, he received his doctorate in economics.

Table of content

  • BEGINN
  • Acknowledgements
  • Foreword
  • Table of Contents
  • List of Figures
  • List of Tables
  • List of Abbreviations
  • 1 Introduction
  • 1.1 Motivation and Problem Statement
  • 1.2 Versatile Perspectives on %8FSecurity�
  • 1.3 Research Objective
  • 1.4 Research Design
  • 1.5 Thesis Structure
  • 2 Fundamentals of Supply Chain Security in Parcel Mail Services
  • 2.1 Security-by-design
  • 2.2 Systems Security Engineering
  • 2.3 Supply Chain Security Management
  • 2.4 Security in Parcel Mail Services
  • 3 Adapting Enterprise Architecture Development for Security-by-Design
  • 3.1 Enterprise Architecture Management
  • 3.2 Requirements for Secure-by-Design Architecture Development Methods
  • 3.3 State of the Art in Architecture Frameworks and Security Architectures
  • 3.4 Methodology for Adapting the Enterprise Architecture Development
  • 3.5 Secure-by-Design Architecture Development Method
  • 3.6 Enterprise Security Architecture Artifacts
  • 3.7 Evaluation and Discussion of Impact on Security Management
  • 4 Enhancing Business Process Modelling for Security-by-Design
  • 4.1 Business Process Modelling
  • 4.2 Requirements for the Security Modelling Notation
  • 4.3 State of the Art in Extending Business Processes for Security
  • 4.4 Methodology for Creating a Domain-Specific BPMN Extension
  • 4.5 Security-enhanced Business Process Modelling Notation
  • 4.6 Extensibility to Information Security Modelling
  • 4.7 Evaluation and Discussion of Impact on Security Engineering
  • 5 Linking Architecture Requirements to Process Implementation
  • 5.1 Architecture Requirements in Business Processes
  • 5.2 Requirements for Analysing Security Requirements in Process Models
  • 5.3 State of the Art in Linking Enterprise Architecture and Business Processes
  • 5.4 Methodology for Analysing Security Requirements in Business Processes
  • 5.5 Combined Architecture and Process Security Assessment
  • 5.6 SeBPMN Graph and Modelling Rules Verification
  • 5.7 Evaluation and Discussion
  • 6 Case-based Evaluation in Parcel Mail Services
  • 6.1 Case Study Background
  • 6.2 Case Study Part I - Developing the Security Architecture
  • 6.3 Case Study Part II - Modelling the Security Measures
  • 6.4 Case Study Part III - Assessment of the Security Approach
  • 6.5 Discussion
  • 7 Conclusion
  • 7.1 Summary
  • 7.2 Limitations
  • 7.3 Outlook
  • References
  • Appendix
  • A Comparison of Security Architecture Frameworks
  • B BPMN Extension Mechanism
  • C Security Engineering Framework Process Activity Diagram
  • D Case Study Baseline BPMN Parcel Import Process

More of this series

    Related titles

      More of this author(s)