Security Audit Process Design Based on SIEM and CSPM Integration with Design Science Research Methodology Approach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security of the current information data system in the digital era needs to be strengthened with one of the current technologies, such as SIEM (Security Information and Event Management) and CSPM (Cloud Security Posture Management), which are currently mostly implemented independently of others. The researcher in this study designed how SIEM and CSPM can issue audit reports in an integrated manner according to the adaptation requirements of GDPR and PDP law regulations, along with improving the personal data security audit process. Using a design research methodology, the study addresses the challenges posed by changes in privacy regulations and the need for efficient and rapid compliance monitoring, and is expected to run automatically. This integrated system leverages live data log analysis and continuous cloud configuration monitoring to understand an organization's data security posture comprehensively. SIEM is designed to identify compliance breaches and security threats that may arise, allowing for automated reporting and rapid responses to audit requests. The results of this study show that the combination of SIEM and CSPM significantly strengthens an organization's ability to monitor and manage compliance with data privacy regulations, reduce administrative burden, and reduce the risk of data breaches, in line with a design-based privacy approach. Future research should assess the possibility of integrating artificial intelligence and machine learning to improve the detection of compliance violations and further automate the audit process, thereby creating a more responsive and adaptive system for data privacy compliance. Organizations need to regularly evaluate the effectiveness of their existing data privacy compliance systems and invest in employee training programs to raise awareness of data privacy.

Original languageEnglish
Title of host publication2025 International Conference on Data Science and Its Applications, ICoDSA 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages679-685
Number of pages7
ISBN (Electronic)9798331598549
DOIs
Publication statusPublished - 2025
Event8th International Conference on Data Science and Its Applications, ICoDSA 2025 - Hybrid, Jakarta, Indonesia
Duration: 3 Jul 20255 Jul 2025

Publication series

Name2025 International Conference on Data Science and Its Applications, ICoDSA 2025

Conference

Conference8th International Conference on Data Science and Its Applications, ICoDSA 2025
Country/TerritoryIndonesia
CityHybrid, Jakarta
Period3/07/255/07/25

Keywords

  • CSPM
  • DSR
  • GDPR
  • SIEM
  • security audit

Fingerprint

Dive into the research topics of 'Security Audit Process Design Based on SIEM and CSPM Integration with Design Science Research Methodology Approach'. Together they form a unique fingerprint.

Cite this