6. Conclusions
In this paper, we presented a security policy management process within a Six Sigma framework. Furthermore, we contend that the design of secure computing systems is based on creating adaptive policies and their correlation to threats. We address various challenges in security policy management process including:
Integration with a known management process thereby reusing tools already existing within an industrial setting.
Integration of tools with security primitives to facilitate decision making.
Quantification of risks to digital assets.