ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-10.0893 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑ ÆäÀÌÁö 25
ÇÑ±Û Ç¥Áظí Ŭ¶ó¿ìµå ¼­ºñ½º µµÀÔÀ» À§ÇÑ º¸¾È ÀÚ°¡Áø´Ü Áöħ
¿µ¹® Ç¥Áظí Security Self-Assessment Guidance for Adopting Cloud Service
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº Ŭ¶ó¿ìµå ¼­ºñ½º µµÀÔ ¸ñÀû°ú ¼­ºñ½º À¯Çü¿¡ µû¸¥ º¸¾È ¾ÈÀü¼º ÀÚ°¡ Áø´Ü ÀýÂ÷¿Í Áöħ ¹× ¼¼ºÎ Á¡°ËÇ׸ñÀ» Á¦½ÃÇÑ´Ù. º¸¾È ÀÚ°¡Áø´Ü Ç׸ñÀº Á¤º¸º¸È£ ÀÚ°¡Áø´Ü Ç׸ñ°ú Ŭ¶ó¿ìµå Ư¼ºÀ» °í·ÁÇÑ ÀÎÇÁ¶ó, Ç÷§Æû, ¼ÒÇÁÆ®¿þ¾î Ãø¸éÀÇ Å¬¶ó¿ìµå º¸¾È ÀÚ°¡Áø´Ü Ç׸ñÀ¸·Î ±¸¼ºµÈ´Ù. º» Ç¥ÁØÀÇ Å¬¶ó¿ìµå º¸¾È ÀÚ°¡Áø´Ü Ç׸ñÀº Ŭ¶ó¿ìµå ¼­ºñ½º ¼ÒºñÀÚ¿¡ ´ëÇÑ ¼¼ºÎ Á¡°ËÇ׸ñÀ» Æ÷ÇÔÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard presents security self-assessment process, guidance and specific check list in accordance with the purpose and models of adopting cloud service. Security self-assessment respects consist of items for information security self-assessment and items for cloud security self-assessment considering characteristic of cloud from a infrastructure, platform and software perspective. Cloud security self-assessment items include specific check list for cloud service consumer.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-10.0893.pdf TTAK.KO-10.0893.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Ŭ¶ó¿ìµå ¼­ºñ½º µµÀÔÀ» À§ÇÑ º¸¾È ÀÚ°¡Áø´Ü Áöħ TTAK.KO-10.0893 2015-12-16 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-10.0893.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö º» Ç¥ÁØÀº ÇöÀç »ç¿ë ÁßÀ̰ųª ¾ÕÀ¸·Îµµ »ç¿ëµÉ °¡´É¼ºÀÌ ³óÈÄÇÏ¿© À¯ÁöÇϱâ·Î °áÁ¤ÇÔ