Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0416 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-12-06 ÃÑÆäÀÌÁö 32
ÇѱÛÇ¥Áظí Á¦·ÎÆ®·¯½ºÆ® ¾ÆÅ°ÅØÃ³
¿µ¹®Ç¥Áظí Zero Trust Architecture
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â °íµµÈ­µÈ »çÀ̹öÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ Á¦·ÎÆ®·¯½ºÆ® °³³ä ¹× ±âº» ¿ø¸® µîÀ» ´Ù·é´Ù. ¶ÇÇÑ, Á¦·ÎÆ®·¯½ºÆ® °³³äÀ» ±â¹ÝÀ¸·Î ÇÏ´Â ³í¸®ÀûÀÎ º¸¾È ¾ÆÅ°ÅØÃ³¸¦ Á¤ÀÇÇϸç, ±âº» ¿ø¸®¿¡ ±Ù°ÅÇÏ¿© ¾ÆÅ°ÅØÃ³ ³»ºÎ¿¡¼­ ¿ä±¸µÇ´Â ³í¸®Àû ±¸¼º ¿ä¼Ò¿¡ ´ëÇÑ Á¤ÀÇ, ³í¸®Àû ±¸¼º ¿ä¼Ò°¡ °¡Á®¾ß ÇÏ´Â ³í¸®Àû ±â´É ¹× ¿ä¼Ò°£ ³í¸®Àû ÀÎÅÍÆäÀ̽º µîÀ» Æ÷ÇÔÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard covers the concept of Zero Trust and its principles to counter advanced cyber threats. It also defines a logical security architecture based on the Zero Trust concept, including the definition of the logical components required within the architecture based on the principles, the logical functions that the logical components should have, and the logical interfaces between the components.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0416.pdf TTAK.KO-12.0416.pdf            

ÀÌÀü
½º¸¶Æ® ÄÜÆ®·¢Æ® Ãë¾àÁ¡ Á¤º¸ °øÀ¯ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
ÀǷ῵»óÀúÀåÀü¼ÛÀåÄ¡(PACS)¿¡¼­ ÀǷ῵»ó µðÁöÅÐÆ÷·»½Ä ÀýÂ÷