Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0105 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 17
ÇѱÛÇ¥ÁØ¸í °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ DB º¸¾È°¨»ç ·Î±×
¿µ¹®Ç¥Áظí Database Security Audit Log for Protection of Personally Identifiable Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº IT¼­ºñ½º Á¦°øÀÚ°¡ ¼öÁý․°ü¸®ÇÏ´Â »ç¿ëÀÚ °³ÀÎÁ¤º¸ Áß, ¾ÈÀüÇÑ ÀúÀå․°ü¸®°¡ ¿ä±¸µÇ´Â ÁÖ¿ä °³ÀÎÁ¤º¸ Ç׸ñÀ» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ, Á¦½ÃµÈ °³ÀÎÁ¤º¸ Ç׸ñÀ» ÀúÀå․°ü¸®ÇÏ´Â µ¥ÀÌÅͺ£À̽º ½Ã½ºÅÛ¿¡¼­ »ý¼ºÇÏ°í °ü¸®ÇؾßÇÏ´Â º¸¾È°¨»ç ·Î±× Ç׸ñÀ» µµÃâÇÑ´Ù. ´Ù¸¸, °¢ Ç׸ñÀÇ Á߿伺 µî¿¡ µû¶ó ÇʼöÇ׸ñ°ú ¼±ÅÃÇ׸ñÀ¸·Î ³ª´©¾î Á¦½ÃÇÑ´Ù. Ãß°¡ÀûÀ¸·Î DBº¸¾È°¨»ç ·Î±×Ç׸ñ¿¡ ´ëÇÑ ±â¼úÀû, °ü¸®Àû º¸¾È¿ä±¸»çÇ×À» Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard defines the configuration of the database security audit log for the protection of the PII (PPII), and presents the technical and administrative requirements. The components of the database security log present the audit log item and the general information to be added according to four phases, namely: collection, storage and management, use and provisioning, and destruction of the PII. In addition, the components describe the technical and administrative security requirements of the database security audit log, in order to apply the database for secure management of the PII.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0105.pdf TTAK.KO-12.0105.pdf            

ÀÌÀü
ÀÓº£µðµå ¸®´ª½º ±â¹ÝÀÇ °í°¡¿ë ÀÀ¿ë ÇÁ·Î±×·¥ ÂüÁ¶¸ðµ¨ ¹× ¿ä±¸»çÇ×
´ÙÀ½
ÀÓº£µðµå µð¹ÙÀ̽º¿ë ÀÚ°¡ÀûÀÀÇü ¼ÒÇÁÆ®¿þ¾î Á¦3ºÎ - ÀÚ°¡ÀûÀÀÇü ÀÀ¿ëÀ» À§ÇÑ Á¦¾î ¸ð´ÏÅ͸µ ÀÎÅÍÆäÀ̽º ±Ô°Ý