Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0416 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2024-12-06 | ÃÑÆäÀÌÁö | 32 |
ÇѱÛÇ¥Áظí | Á¦·ÎÆ®·¯½ºÆ® ¾ÆÅ°ÅØÃ³ | ||
¿µ¹®Ç¥Áظí | Zero Trust Architecture | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â °íµµÈµÈ »çÀ̹öÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ Á¦·ÎÆ®·¯½ºÆ® °³³ä ¹× ±âº» ¿ø¸® µîÀ» ´Ù·é´Ù. ¶ÇÇÑ, Á¦·ÎÆ®·¯½ºÆ® °³³äÀ» ±â¹ÝÀ¸·Î ÇÏ´Â ³í¸®ÀûÀÎ º¸¾È ¾ÆÅ°ÅØÃ³¸¦ Á¤ÀÇÇϸç, ±âº» ¿ø¸®¿¡ ±Ù°ÅÇÏ¿© ¾ÆÅ°ÅØÃ³ ³»ºÎ¿¡¼ ¿ä±¸µÇ´Â ³í¸®Àû ±¸¼º ¿ä¼Ò¿¡ ´ëÇÑ Á¤ÀÇ, ³í¸®Àû ±¸¼º ¿ä¼Ò°¡ °¡Á®¾ß ÇÏ´Â ³í¸®Àû ±â´É ¹× ¿ä¼Ò°£ ³í¸®Àû ÀÎÅÍÆäÀ̽º µîÀ» Æ÷ÇÔÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard covers the concept of Zero Trust and its principles to counter advanced cyber threats. It also defines a logical security architecture based on the Zero Trust concept, including the definition of the logical components required within the architecture based on the principles, the logical functions that the logical components should have, and the logical interfaces between the components. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ |
![]() |