ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0416 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-12-06 ÃÑ ÆäÀÌÁö 32
ÇÑ±Û Ç¥Áظí Á¦·ÎÆ®·¯½ºÆ® ¾ÆÅ°ÅØÃ³
¿µ¹® Ç¥Áظí Zero Trust Architecture
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â °íµµÈ­µÈ »çÀ̹öÀ§Çù¿¡ ´ëÀÀÇϱâ À§ÇÑ Á¦·ÎÆ®·¯½ºÆ® °³³ä ¹× ±âº» ¿ø¸® µîÀ» ´Ù·é´Ù. ¶ÇÇÑ, Á¦·ÎÆ®·¯½ºÆ® °³³äÀ» ±â¹ÝÀ¸·Î ÇÏ´Â ³í¸®ÀûÀÎ º¸¾È ¾ÆÅ°ÅØÃ³¸¦ Á¤ÀÇÇϸç, ±âº» ¿ø¸®¿¡ ±Ù°ÅÇÏ¿© ¾ÆÅ°ÅØÃ³ ³»ºÎ¿¡¼­ ¿ä±¸µÇ´Â ³í¸®Àû ±¸¼º ¿ä¼Ò¿¡ ´ëÇÑ Á¤ÀÇ, ³í¸®Àû ±¸¼º ¿ä¼Ò°¡ °¡Á®¾ß ÇÏ´Â ³í¸®Àû ±â´É ¹× ¿ä¼Ò°£ ³í¸®Àû ÀÎÅÍÆäÀ̽º µîÀ» Æ÷ÇÔÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard covers the concept of Zero Trust and its principles to counter advanced cyber threats. It also defines a logical security architecture based on the Zero Trust concept, including the definition of the logical components required within the architecture based on the principles, the logical functions that the logical components should have, and the logical interfaces between the components.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0416.pdf TTAK.KO-12.0416.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¦·ÎÆ®·¯½ºÆ® ¾ÆÅ°ÅØÃ³ TTAK.KO-12.0416 2024-12-06 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0416.pdf