Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1603 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 28
ÇѱÛÇ¥Áظí Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ¸ð´ÏÅ͸µ ¼­ºñ½º¿¡ ´ëÇÑ µ¥ÀÌÅÍ º¸¾È ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Data security requirements for the monitoring service of cloud computing
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ¸ð´ÏÅ͸µ ¼­ºñ½º¿¡ ´ëÇÑ µ¥ÀÌÅÍ ¹üÀ§ ¹× ¶óÀÌÇÁ»çÀÌŬ°ú ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ È¹µæ, ÀúÀå °ü·Ã º¸¾È ¿ä±¸ »çÇ× µîÀ» Æ÷ÇÔÇÑ´Ù. ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ ¹üÀ§ ¿ä±¸»çÇ×Àº Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ(CSP, Cloud Service Provider)µéÀÌ Å¬¶ó¿ìµå º¸¾È ¹× ÃÖ´ë ¸ð´ÏÅ͸µ ¹üÀ§ À¯Áö¸¦ À§ÇØ Á¦°øÇØ¾ß ÇÏ´Â Çʼö ¸ð´ÏÅ͸µ ¹üÀ§¸¦ Æ÷ÇÔÇÑ´Ù. ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ ¶óÀÌÇÁ»çÀÌŬÀº µ¥ÀÌÅÍÀÇ »ý¼º, ÀúÀå, »ç¿ë, ¸¶À̱׷¹À̼Ç, Ç¥Çö, »èÁ¦, ¹é¾÷ µîÀ» Æ÷ÇÔÇÑ´Ù. ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ È¹µæÀº ¸ð´ÏÅ͸µ ¼­ºñ½º·ÎºÎÅÍ µ¥ÀÌÅ͸¦ ȹµæÇÏ´Â ±â¼ú °ü·Ã º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ ÀúÀåÀº CSP Â÷¿øÀÇ ¸ð´ÏÅ͸µ µ¥ÀÌÅÍ ÀúÀå ½Ã º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard includes monitoring data scope requirements, monitoring data lifecycle, security requirements of monitoring data acquisition and security requirements of monitoring data storage. The monitoring data scope requirements include the necessary monitoring scope that cloud service providers(CSPs) should provide to maintain the cloud security and the biggest monitoring scope of CSPs. Monitoring data lifecycle includes data creation, data store, data use, data migrate, data present, data destroy and data backup. Monitoring acquisition determines the security requirements of the acquisition techniques of monitoring service. Monitoring data storage determines the security requirements for CSPs to store the monitoring data.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X.1603.pdf TTAE.IT-X.1603.pdf            

ÀÌÀü
ºñµ¿±â ºü¸¥ ¸µÅ©(A-QL) Ä÷¯ ½ºÅ©¸° º¯Á¶ ½Ã½ºÅÛÀÇ ¼ö½Å±â ¾ÆÅ°ÅØó
´ÙÀ½
¿þÀÌºí·¿ º¯È¯ ±â¹Ý ¼ûÀº ºñµ¿±â ºü¸¥ ¸µÅ©(WHA-QL) ¾ÆÅ°ÅØó