IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > ¼­Æò & ¹ø¿ª¹°
  º¸¾È Á¤Ã¥À» ÀÛ¼ºÇÏ´Â ¹æ¹ý: ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾ó by Paul R. Meynen
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 11-03-25 13:09     Á¶È¸ : 3456     Ãßõ : 14     Æ®·¢¹é ÁÖ¼Ò

Àú³Î ¿Â¶óÀÎ: º¸¾È Á¤Ã¥À» ÀÛ¼ºÇÏ´Â ¹æ¹ý: ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾ó

 

By Paul R. Meynen

 

ISACA Journal Online Volume 1, 2009

 

º¸¾È Á¤Ã¥À» ÀÛ¼ºÇÏ·Á´Â º¸¾È Àü¹®°¡¿¡°Ô´Â ±× ÀÏ¿¡ ´ëÇÑ ¾î·Æ°í °ñÄ¡ ¾ÆÇ ¼ºÁúÀ» ÀÌÇØÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù. ¹«¾ùÀ» ½á¾ß Çϴ°¡? ±×°ÍÀ» ¾î¶»°Ô ½á¾ß Çϴ°¡? ´©±¸ Ã¥ÀÓÀΰ¡? Á¤º¸ º¸¾È Á¤Ã¥À» ¾´´Ù´Â °ÍÀº ÀÏÁ¾ÀÇ ¿¹¼ú ÇàÀ§ÀÌ´Ù. 2~3ÀÏ ¾È¿¡ 80 ÆäÀÌÁö ºÐ·®ÀÇ Á¶Á÷ÀÇ º¸¾È ¸Å´º¾óÀ» ÀÛ¼ºÇؼ­ ½ÂÀÎÀ» ¹ÞÀ¸·Á´Â »ç¶÷Àº ´Ù½Ã »ý°¢ÇØ¾ß ÇÑ´Ù.

 

ÀÌ ±ÛÀº ÀúÀÚ°¡ ¡°ÃÖÁ¾ÀûÀΡ± ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾óÀ» ÀÛ¼ºÇÒ ¶§ äÅÃÇß´ø Á¢±Ù¹æ¹ýÀ» ¼³¸íÇÑ´Ù. ¾î¶² Á¤Ã¥ ¿ä°ÇÀº ƯÁ¤ÇÑ È¯°æ¿¡¼­´Â ºñ¿ë ¾ïÁ¦ÀûÀ̰ųª º´Âü ¾÷¹« ¼º°ÝÀÇ °ñÄ¡ ¾ÆÇ ÀÏÀÏ ¼ö ÀÖ´Â ¹Ý¸é, ±× ¾ÆÀ̵ð¾î´Â, ÀÌ°ÍÀÌ º¸¾È ȯ°æÀ» À§ÇÑ °ÍÀ̶ó´Â °ÍÀ» Á¦¿ÜÇϸé, »ç¶÷µéÀÌ °¥¸ÁÇÏ´Â ¸ðµç °ÍÀ» (´Ü¼øÈ÷) ¸ñ·ÏÀ¸·Î ÀÛ¼ºÇÑ ÈÞÀÏ ±¸¸Å ¸®½ºÆ®¿Í À¯»çÇÏ´Ù. »ç¶÷ÀÇ °æÇèÀÌ ¼º¼÷µÇ°í, À§ÇùÀÌ º¯È­ÇÏ°í ±×¸®°í º¸¾ÈÀÌ Àͼ÷ÇØÁø °Íó·³ ÀÌ·¯ÇÑ Á¤Ã¥µµ ¹ßÀüÇÏ°í ¼º¼÷µÉ °ÍÀÌ´Ù. »ì¾ÆÀÖ´Â ¹®¼­¿Í °°ÀÌ Á¤Ã¥À» °è¼Ó ¼û½¬µµ·Ï ÇÏ´Â °ÍÀÌ Áß¿äÇϸç, (±×´ë·Î) ¹æÄ¡Çؼ­´Â ¾È µÈ´Ù. º¸¾È ¹«´ë´Â ±Þ°ÝÈ÷ º¯È­ÇÏ¸ç º¸¾È Á¤Ã¥µµ (±× º¯È­¸¦) µû¶ó°¡¾ß¸¸ ÇÑ´Ù.

ÇöÇà ÀÚ¿ø°ú Á¤Ã¥ ÁøÈ­

 

»ç¶÷Àº ¾î¶»°Ô ¾ÆÀ̵ð¾î ¹× Àü·«À» º¸¾È Á¤Ã¥À¸·Î È¿°úÀûÀ¸·Î º¯È¯½ÃÅ°´Â°¡? ¸¹Àº º¸¾È Àü¹®°¡µéÀº °íÀ§Ãþ Áö¿øÀÌ Á¤º¸ º¸¾È ÇÁ·Î±×·¥À» ±¸ÇöÇÏ°í À¯ÁöÇϴµ¥ ÇʼöÀûÀ̶ó°í ÀÌÇØÇÑ´Ù. ÀÌ·¯ÇÑ Áö¿øÀ» ¹Þ°í À¯ÁöÇϱâ À§Çؼ­´Â, Á¤Ã¥ ¹üÀ§°¡ ¸í½ÃÀûÀ¸·Î Á¤ÀǵǾî¾ß¸¸ ÇÏ°í ±×¸®°í º¸¾È Á¤Ã¥¹®µéÀº Ÿ´çÇؾ߸¸ ÇÏ¸ç ±×¸®°í ¸ðµç Á÷¿øµé¿¡°Ô ¼ÒÅëµÇ¾î¾ß¸¸ ÇÑ´Ù.

 

ÇöÇà ÀÚ¿øµéÀº ´ÙÀ½À» Æ÷ÇÔÇÏ´Â º¸¾È Á¤Ã¥ ¸Å´º¾óÀ» ¾à¼úÇÏ´Â ÇÁ·Î¼¼½º¸¦ ºÐ¸íÈ÷ ÇÑ´Ù:1 

  • ÃëÁö(purpose)
  • ±¸Ã¼Àû ¸ñÀû(objective)
  • Àû¿ë(Applicability)
  • ¹èÆ÷(Distribution)
  • ½ÃÇà(Enforcement)
  • ¸ð´ÏÅ͸µ(Monitoring)

ºÎ¼öÀûÀ¸·Î, SANS (deriving from SysAdmin, Audit, Networking, and Security: ½Ã½ºÅÛ°ü¸®, °¨»ç, ³×Æ®¿öÅ· ±×¸®°í º¸¾ÈÀÇ ¸Ó¸®±Û¿¡¼­ µû¿È) Çùȸ´Â ÀÚ½ÅÀÇ º¸¾È Á¤Ã¥ ÇÁ·ÎÁ§Æ®¿¡ ´ëÇÑ ¸î °¡Áö »ç·Ê¸¦ °¡Áö°í ÀÖ´Ù.2

 

 

¾î¶² ±ÛÀº À§Çè¿¡ ´ëóÇÏ´Â Á¤Ã¥À» ¾²¶ó°í À̾߱âÇϱ⵵ ÇÑ´Ù; ±×°ÍÀº ¹«¾ùÀ» ÀǹÌÇϴ°¡? ³×Æ®¿öÅ© º¸¾È¿¡ ´ëÇÑ À§ÇèÀº º¸¾È Ç¥ÁØÀ» °ËÅäÇÔÀ¸·Î½á Á¤ÀǵȴÙ. º» ±Û¿¡¼­´Â ¾Õ¼­ ³ª¿­ÇÑ Ç׸ñµé ¼Ó¿¡ ±â·ÏÇÒ ³»¿ë ±×¸®°í ºñÁî´Ï½º ¹× IT »óȲÀ» Á¦°øÇϸ鼭 ³×Æ®¿öÅ© º¸¾È Á¤Ã¥À» µµÀÔÇϱâ À§ÇÏ¿© Ç¥ÁØÀ» È¿°úÀûÀ¸·Î ÀÌ¿ëÇÏ´Â ¹æ¹ýÀ» »ó¼¼È÷ ¼³¸íÇÑ´Ù.

 

º» ÀúÀÚÀÇ ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾ó(NSPM)3Àº ÁÖ·Î Á¤º¸º¸¾ÈÆ÷·³(Information Security Forum : ISF)ÀÇ ¿ì¼ö ½Ç¹« Ç¥ÁØ4À», ´ÙÀ½À¸·Î´Â ±¹Á¦Ç¥Áرⱸ(ISO)ÀÇ ISO 17799:20055¸¦ ±â¹ÝÀ¸·Î ÇÑ °ÍÀÌ´Ù.6

 

NSPMÀº ISF Ç¥ÁØÀÇ ³×Æ®¿öÅ© µµ¸ÞÀο¡ ÃÊÁ¡À» ¸ÂÃ߸鼭, 5°¡Áö ÅëÁ¦ ¸ñÀû °¡¿îµ¥ ´ÙÀ½ 4°¡Áö ¿ä±¸»çÇ×À» ´Ù·ç°í ÀÖ´Ù.

  • ³×Æ®¿öÅ© °ü¸®
  • Åë½Å·® °ü¸®
  • ³×Æ®¿öÅ© ¿î¿µ
  • Áö¿ª º¸¾È °ü¸®

»ó±â ¸®½ºÆ®¿¡ ¾ø´Â 5¹ø° ÅëÁ¦ ¸ñÀûÀÎ À½¼º ³×Æ®¿öÅ©´Â ÀÌ Á¤Ã¥ ¹üÀ§¿¡ Æ÷ÇÔµÇÁö ¾Ê´Â´Ù. Á¶Á÷ÀÌ ¼ö¿ëÇÒ ¼ö ÀÖ´Â ¼öÁØ¿¡ ¸ÂÃç À§Çè¿¡ ´ëÇÑ Á¤Ã¥¹®À» ¾²´Â ÇÑ°¡Áö ¼Õ½¬¿î ¹æ¹ýÀº Ç¥ÁØÀÇ ¹®Ã¼¸¦  (±×´ë·Î) Á¤Ã¥¹®À¸·Î º¯È¯ÇÏ´Â °ÍÀÌ´Ù. NPMSÀÇ ÃëÁö (±×¸®°í ISF Ç¥ÁØÀÇ À½¼º ³×Æ®¿öÅ© ÅëÁ¦ ¸ñÀûÀÇ ¹üÀ§)¸¦ À§Çؼ­, À½¼º ³×Æ®¿öÅ©´Â Àüü ³×Æ®¿öÅ©¿¡ ´ëÇÑ À§ÇèÀ» ³ªÅ¸³»Áö ¾Ê¾ÒÀ¸¸ç, µû¶ó¼­ ±× ¿µ¿ªÀ» ¹èÁ¦½ÃÄ×´Ù.

 

Ãß°¡·Î, NSPMÀº ISF Ç¥ÁØ¿¡¼­ ãÀ» ¼ö ¾ø´Â ±¸¹®µéµµ µé¾îÀÖ´Ù. NSPMÀº ISF Ç¥ÁØ ¹üÀ§¸¦ ¶Ù¾î³Ñ¾î ¼¼ºÎ»çÇ×µéÀ» ÅëÇÕÇϱâ À§ÇØ ³×Æ®¿öÅ© º¸¾ÈÀ» À§ÇÑ ÅëÁ¦¸¦ Æ÷ÇÔÇÏ°í ¶ÇÇÑ ¹æÈ­º® ÅëÁ¦¿¡ À־ Áß¿äÇÑ ¼¼ºÎ»çÇ×µµ Æ÷ÇÔÇÑ´Ù. °³º° Ç¥ÁØÀº (¸ðµç °ÍÀ») ¸Á¶óÇÏ´Â ´ÜÀÏ ¼Ö·ç¼ÇÀÌ ¾Æ´Ï´Ù; ±×·¸Áö¸¸, ±×°ÍÀº ³×Æ®¿öÅ© º¸¾ÈÀ» °­È­½ÃÅ°´Â ¹æ¹ý¿¡ °üÇÑ »ý°¢°ú ¾ÆÀ̵ð¾î¸¦ ¹ßµ¿½ÃÅ°±â À§Çؼ­ ÀÌ¿ëµÇ±âµµ ÇÑ´Ù.

´Ã¾î°¡´Â °íÅë

Àü¹ÝÀûÀÎ NSPMÀÇ ¾²±â ¹× °ËÅä °úÁ¤¿¡¼­, ²÷ÀÓ¾ø´Â ¹ß°ß ÇÁ·Î¼¼½º´Â ÀÛÀº º¯È­µéÀÌ Á¤Ã¥ÀÇ ¸í·á¼ºÀ» ³ôÀÌ´Â °ÍÀ¸·Î ³ªÅ¸³µ´Ù. ÀÌ°Í¿¡´Â ´ÙÀ½°ú °°Àº °ÍµéÀÌ Æ÷ÇԵȴÙ:

  • Ç¥Á¦µéÀº °øÅëÀûÀÎ Á¤Ã¥¹®µéÀ» ±×·ìÈ­Çϴµ¥ »ç¿ëµÇ¾î¾ß ÇÑ´Ù.
  • ¼öÇàÃ¥ÀÓ¿¡ ´ëÇؼ­ ¾î¶°ÇÑ ÀDZ¸½Éµµ µéÁö ¾Êµµ·Ï ¿ªÇÒ ¹× Ã¥ÀÓÀÌ Á¤ÀǵǾî¾ß¸¸ ÇÑ´Ù. ÀÌ°ÍÀ» ¿Ï¼ºÇϱâ À§ÇÏ¿©, ¿ªÇÒÀº, °¡·É ³×Æ®¿öÅ© º¸¾È ÀÌ»ç, ³×Æ®¿öÅ© º¸¾È ¿£Áö´Ï¾î, ³×Æ®¿öÅ© º¸¾È ¼³°èÀÚ µî, Á÷¹«º°·Î ±×·ìÈ­µÇ¾î¾ß ÇÑ´Ù. ÃʱâÀÇ ÃʾȵéÀº Á¤Ã¥ Àü¹Ý¿¡ °ÉÃļ­ ¿ªÇÒ ¹× Ã¥ÀÓÀÌ ÁßøµÇÁö ¾Êµµ·Ï Á¤ÀǵǾú´Ù. Á¤Ã¥ Ãʱ⿡ ¿ªÇÒ ¹× Ã¥ÀÓ Á¤ÀÇ´Â ³×Æ®¿öÅ© º¸¾È ÇÁ·Î±×·¥À» °ü¸®ÇÏ´Â Åä´ë¸¦ ¸¶·ÃÇÑ´Ù. °Ô´Ù°¡, ¿ªÇÒ ¹× Ã¥ÀÓÀº Àü»ç Â÷¿øÀÇ Á¤º¸ º¸¾È ÇÁ·Î±×·¥ÀÇ ¿ì»ê ¾Æ·¡¿¡¼­ ¼ö¿ë ¹× Àû¿ëÀÌ °¡´ÉÇÑ Á¤Ã¥ ¾È¿¡¼­ Á¤ÀǵǾî¾ß Çϱ⠶§¹®¿¡, ÀÌ°ÍÀº °¢º°ÇÑ ÁÖÀǸ¦ ±â¿ïÀÏ ÇÊ¿ä°¡ ÀÖ´Ù. ³×Æ®¿öÅ© °ü¸® ÅëÁ¦ ¸ñÀûÀº NSPMÀÇ ³×Æ®¿öÅ© º¸¾È¿¡ °üÇÑ ¸é¹ÐÇÑ ÃÊÁ¡À» °®°í¼­ ¿ªÇÒ ¹× Ã¥ÀÓÀ» ´Ù·é´Ù.
  • Á¤Ã¥ ¸Å´º¾óÀº 4°³ÀÇ °³º° Á¤Ã¥µé°ú´Â ´ëÁ¶ÀûÀ¸·Î °³¹ßµÇ¾î¾ß¸¸ ÇÑ´Ù. 4°³ÀÇ °³º° Á¤Ã¥À» ÀÌ¿ëÇÏ´Â °æ¿ì¿¡´Â ¿¬¼Ó¼ºÀÌ °á¿©·Î Á¤Ã¥µé°£ÀÇ ³»¿ëÀ» ¼­·Î ¿¬°ü½ÃÅ°±â ¾î·Æ°Ô ¸¸µé ¼ö ÀÖ´Ù. ¾Õ¼­ ¿­°ÅÇÑ 4°³ÀÇ ÅëÁ¦ ¸ñÀûÀÌ °³º° Á¤Ã¥ÀÎ ¹Ý¸é, ¿©·¯ ÀåÀ¸·Î ±¸¼ºµÈ (Á¤Ã¥) ¸Å´º¾óÀ» ÀÛ¼ºÇÏ´Â °ÍÀº Á¤Ã¥µé Àü¹Ý¿¡ °ÉÃļ­ ¹®¸Æ ¹× ¿¬¼Ó¼ºÀ» Á¦°øÇÑ´Ù. ´õ±¸³ª, Á¤Ã¥ µµÀÔ °úÁ¤¿¡¼­ ¸ÞŸµ¥ÀÌÅÍ(¿¹¸¦ µé¾î, Àû¿ë, ¹èÆ÷)¸¦ Á¤ÀÇÇÏ´Â °ÍÀº °ü¸®¸¦ º¸´Ù ½±µµ·Ï µµ¿ÍÁØ´Ù. ±×·Î½á ¸ðµç ÈÄ¼Ó Á¤Ã¥µéÀÌ ´ÜÀÏ ±ÔÄ¢ ÁýÇÕÀ» ÁؼöÇϵµ·Ï ¸¸µç´Ù.

Á¤Ã¥ ¾²±â »ç·Ê 1

 

°³¿ä(¼­¹®)°¡ Á¤Ã¥ ¹× ±×ÀÇ ÅëÁ¦ ¸ñÀû¿¡ ¾Õ¿¡ ³ª¿Í¾ß¸¸ ÇÑ´Ù. ÀÌ°ÍÀº µ¶ÀÚ¿¡°Ô Àü¹ÝÀûÀÎ »óȲÀ» Á¦½ÃÇÏ°í À̾îÁö´Â Á¤Ã¥ ¹®Àåµé¿¡ ´ëÇÑ ¿ä¾à ³»¿ëÀ» Àû´Â´Ù. ISF Ç¥ÁØ°ú ISO 17799´Â °¢ µµ¸ÞÀΰú ÅëÁ¦ ¸ñÀû¿¡ ¾Õ¼­ °³¿ä¸¦ Á¦°øÇÑ´Ù. ´õ±¸³ª, ISO 17799´Â Á¤Ã¥ ¹®ÀåÀ» ÀÛ¼ºÇÒ ¶§ ±×ÀÇ ¹æÇâ Á¦½Ã¸¦ À§ÇÑ °¢°¢ÀÇ ÅëÁ¦¿¡ ´ëÇÑ µµÀԺθ¦ Á¦°øÇÑ´Ù. ±¸Çö °¡À̵å¿Í ¿ä¾àÀ» º¸°­ÇÏ´Â °ÍÀº µµ¸ÞÀΰú ÀÌÀÇ °ü·Ã ÅëÁ¦ ¸ñÀû(µé)À» µµÀÔÇÏ´Â °ÍÀ» º¸Á¶ÇÒ °ÍÀÌ´Ù.

 

ISF °°Àº Ç¥ÁØÀº ÀÏ°üµÇ°Ô ¡°should ÇÏ¿©¾ß ÇÑ´Ù¡±¶ó´Â ´Ü¾î¸¦ »ç¿ëÇÑ´Ù. Á¤Ã¥¿¡¼­ ¡°should ÇÏ¿©¾ß ÇÑ´Ù¡±ÀÇ »ç¿ëÀº ÃæºÐÇÏÁö ¾ÊÀ» °ÍÀÌ´Ù. ±×·¯ÇÑ ´Ü¾î´Â Çؼ®(ÆÇ´Ü)ÇØ¾ß ÇÏ´Â °¡´É¼ºÀÌ ÀÖÀ¸¸ç ¶ÇÇÑ º¸¾È »ç°í ÈÄ¿¡ Á¤Ã¥À» ½Ç½ÃÇϴµ¥ ¾î·Á¿òÀ» ÃÊ·¡ÇÑ´Ù. Á¤Ã¥Àº ±ÔÄ¢µé(rules)ÀÇ ÁýÇÕÀÌ´Ù; ±×·¯¹Ç·Î, Á¤Ã¥À» °­Á¦·Î ½ÃÇàÇϱâ À§Çؼ­ ¡°¸Ó½ºÆ®(must ÇÏ¿©¾ß¸¸ ÇÑ´Ù)¡± ȤÀº ¡°Àª(will ¹Ýµå½Ã ~ ÇÑ´Ù)¡±ÀÌ »ç¿ëµÈ´Ù.

 

±×¸² 1Á¤Ã¥¹® °³¹ß »ç·Ê 1

¿¹: Àå¾Ö °ü¸® ÅëÁ¦¸¦ À§ÇÑ ¿ø¸® ¹× ¸ñÀû(NW3.3)
 

¿øÄ¢: ¾î¶² ÇüÅÂÀ̵çÁö ¸ðµç ³×Æ®¿öÅ© Àå¾Ö´Â Àå¾Ö °ü¸® ÇÁ·Î¼¼½º¿¡ µû¶ó¼­ ±â·ÏµÇ°í, °ËÅäµÇ°í ±×¸®°í ÇØ°áµÇ¾î¾ß ÇÑ´Ù. (should)

 

¸ñÀû: ³×Æ®¿öÅ© Àå¾Ö¸¦ È¿°úÀûÀ¸·Î È®ÀÎÇÏ°í ÇØ°áÇϱâ À§ÇÏ¿©, À¯»çÇÑ Àå¾ÖÀÇ Àç¹ß À§ÇèÀ» °¨¼Ò½ÃÅ°°í ¾÷¹« ¿µÇâÀº ÃÖ¼ÒÈ­½ÃÄÑ¾ß ÇÑ´Ù.(should)

 

Á¤Ã¥¹®: ³×Æ®¿öÅ© »ó¿¡¼­ ¹ß»ýÇÏ´Â ¸ðµç Àå¾Ö´Â ¼ö¸³µÈ Àå¾Ö °ü¸® ÇÁ·Î¼¼½º¿¡ µû¶ó¼­ ±â·ÏµÇ°í, °ËÅäµÇ°í ±×¸®°í ÇØ°áµÇ¾î¾ß¸¸ ÇÑ´Ù(must). Àå¾Ö °ü¸®´Â ¾÷¹« ¿µÇâ°ú À¯»ç Àå¾Ö¿¡ ´ëÇÑ ¹Ì·¡ À§ÇèÀ» ¿ÏÈ­½ÃÅ°±â À§ÇÏ¿© ½Å¼ÓÇÑ ÀÀ´ä°ú È¿À²ÀûÀÎ ÇØ°á¹æ¾ÈÀ» °í·ÁÇÑ´Ù.

 

 

Á¤Ã¥ ¾²±â »ç·Ê 2

 

ISF Ç¥ÁØÀº ³×Æ®¿öÅ© ÀÚ¿øÀÇ ¿ÀÀÛµ¿À» ÁÙÀ̱â À§Çؼ­ ȸ»ç´Â ³×Æ®¿öÅ© ±¸¼º¿ä¼ÒµéÀÌ º¹±¸µÇµµ·Ï º¸ÀåÇÒ °ÍÀ»(should) Á¦½ÃÇÑ´Ù. NSPMÀº ÇÙ½É ½Ã½ºÅÛÀÌ ¸ÕÀú º¹±¸µÇ¾î¾ß¸¸ ÇÏ°í ±×·¯ÇÑ ½Ã½ºÅÛÀ» º¹±¸Çϱâ À§ÇÑ ¿ª·®À» °®Ãç¾ß¸¸ ÇÏ´Â Á¡À» È®ÀνÃŲ´Ù(±×¸² 2). °Ô´Ù°¡, NSPMÀº ¡°ÇÙ½É ½Ã°£±âÁØcritical timescales¡±À» ´É°¡ÇÏ´Â °ªÀÌ ¸íÈ®ÇÏ°Ô ¸í½ÃµÈ »ç¾÷ ¿¬¼Ó¼º °èȹÀ¸·ÎºÎÅÍ º¹±¸ ¸ñÇ¥ ½Ã°£À» ±¸Ã¼È­ÇÑ´Ù.

 

±×¸² 2Á¤Ã¥¼­ °³¹ß »ç·Ê 2

¿¹: ³×Æ®¿öÅ© ȸº¹ ÅëÁ¦(NW1.3.3) (ISF·ÎºÎÅÍ)
 
ÁÖ¿ä ³×Æ®¿öÅ© ±¸¼º¿ä¼ÒµéÀÌ ÇÙ½É ½Ã°£±âÁØ À̳»¿¡ ±³Ã¼µÉ ¼ö ÀÖµµ·Ï º¸ÁõÇÔÀ¸·Î½á ÇÙ½É Åë½Å Àåºñ, ¼ÒÇÁÆ®¿þ¾î, ȸ¼± ±×¸®°í ¼­ºñ½ºÀÇ ¿ÀÀÛµ¿ À§ÇèÀº °¨¼ÒµÇ¾î¾ß ÇÑ´Ù.
 
Á¤Ã¥¹®: ¿ÀÀÛµ¿ À§Çè ¹× ¿µÇâÀ» ¿ÏÈ­Çϱâ À§ÇÏ¿©, ÁÖ¿ä ³×Æ®¿öÅ© ±¸¼º¿ä¼ÒµéÀÌ ÁöÁ¤µÈ º¹±¸ ¸ñÇ¥ ½Ã°£ ³»¿¡ ±³Ã¼µÉ ¼ö ÀÖµµ·Ï º¸ÁõÇÔÀ¸·Î½á ÇÙ½É ½Ã½ºÅÛ ¼¼±×¸ÕÆ®µé(segments)¿¡ ¿ì¼±¼øÀ§°¡ ºÎ¿©µÇ°í ÀûÀýÇÑ ¿ë·®ÀÌ ±×·¯ÇÑ ¼¼±×¸ÕÆ®µé¿¡ ÇÒ´çµÇ¾î¾ß¸¸ ÇÑ´Ù.

 

Á¤Ã¥ ¾²±â »ç·Ê 3

 

»ç¶÷Àº Á¦¾à Á¶°ÇÀ» ¸¸µêÀ¸·Î½á Á¦Ç° ¶Ç´Â ±â¼úÀ» Á¤ÀÇÇÏ´Â °ÍÀº ÇÇÇؾ߸¸ ÇÑ´Ù. ¿¹¸¦ µé¸é:

 

¿ÜºÎ Á¢±ÙÀº Ä¿¹ö·Î½º(Kerberos) ÀÎÁõ ¼­¹ö¸¦ ÀÌ¿ëÇÏ¿© Á¦°øµÇ¾î¾ß Çϴµ¥, Ä¿¹ö·Î½º ÀÎÁõ ¼­¹ö´Â ¿ÜºÎ ¿¬°áÀ» À§ÇÑ ½Å·ÚÇÒ ¼ö ÀÖ°í ¿ÏÀüÇÑ ÀÎÁõÀ» Á¦°øÇÏ¿©¾ß ÇÑ´Ù.

ÀÌ·¯ÇÑ ¸í½ÃÀûÀÎ Á¤ÀÇ´Â ¹®Á¦¸¦ ¾ß±âÇÒ °ÍÀÌ´Ù. ÀÎÁõ ±â¼úÀÌ ¶Ç ´Ù¸¥ ¼Ö·ç¼ÇÀ¸·Î º¯°æµÇ¸é, Á¤Ã¥ ¸Å´º¾óÀº °ËÅäµÇ°í ¼öÁ¤µÇ¾î¾ß¸¸ ÇÑ´Ù. ´ë½Å¿¡, ´ÙÀ½°ú °°Àº Á¤Ã¥ ¹®ÀåÀÌ »ç¿ëµÇ¾î¾ß¸¸ ÇÑ´Ù:

 

Àü¿ë ¿ø°Ý Á¢¼Ó ¼­¹ö°¡ ¸ðµç ¿ÜºÎ Á¢±ÙÀ» À§ÇØ »ç¿ëµÉ °ÍÀÌ´Ù(will); ±×°ÍÀº ½Å·ÚÇÒ ¼ö ÀÖ°í Çã¿ëµÈ Á¢±Ù ÅëÁ¦(¿¹¸¦ µé¸é, Kerberos, TACACS+, Radius)¸¦ ÀÌ¿ëÇÏ¿© ¿ÜºÎ Á¢¼ÓÀ» ÀÎÁõÇÏ¿©¾ß¸¸ ÇÑ´Ù.

 

¡°e.g. ¿¹¸¦ µé¸é¡± À̶ó´Â ¿ë¾î´Â ¡°¿¹¸¦ µé¸é for example¡±À» ÀÇ¹Ì¿Í ´õºÒ¾î ¡°Æ÷ÇÔÇÏ´Â including¡±À̶ó´Â Ç¥Çö°ú À¯»çÇÑ °ÍÀ¸·Î½á ¸Å¿ì À¯¿ëÇÑ Ç¥ÇöÀÌ´Ù. ¹Ù²ã ¸»Çϸé, ¡°¿¹¸¦ µé¸é¡±Àº ±â¼ú¿¡ ´ëÇÑ ½ÇÁú »ç·ÊÀÇ ¾ð±ÞÀ̸ç, °¡´ÉÇÑ ¼Ö·ç¼ÇÀ» ¸ðµÎ ¸í½ÃÇÏ°íÀÚ ÇÏ´Â Àǵµ´Â ¾Æ´Ï´Ù(Áï ³ª¿­µÈ °Í¸¸À¸·Î Á¦ÇÑÇÏ´Â °ÍÀÌ ¾Æ´Ï´Ù).

Á¤Ã¥ ¾²±â »ç·Ê 4

 

³¡À¸·Î, NSPMÀº ³×Æ®¿öÅ© º¸¾È¿¡ ÃÊÁ¡À» ¸ÂÃá °ÍÀ» ±â¾ïÇ϶ó. ISF¿Í ISO 17799 Ç¥ÁØ¿¡´Â Àü»ç º¸¾È ÇÁ·Î±×·¥ ¾È¿¡ ÀÖ¾î¾ß ÇÏ´Â Ãß°¡ ¿µ¿ªÀÌ ÀÖ´Ù. NSPMÀº Àü»çÀû ÇÁ·Î±×·¥ »óȲµéÀ» ¸Á¶óÇÏ°íÀÚ ³ë·ÂÇÏÁö¸¸ ¹üÀ§¸¦ ¹þ¾î³­ ±ÔÄ¢µéÀº Á¤ÀÇÇÏÁö ¾Ê´Â´Ù. ¿¹¸¦ µé¸é, NSPM¿¡ ÀÖ´Â ¹«¼± Á¢±Ù ÅëÁ¦´Â ´ÙÀ½Ã³·³ ±â¼úÇÏ°í ÀÖ´Ù:

 

¹«¼± Á¢¼Ó¿¡ ´ëÇÑ ¹®¼­°¡ À¯Áö°ü¸® µÇ¾î¾ß¸¸ ÇÑ´Ù. ±×°ÍÀº ÃÖ¼Ò ±æÀÌÀÇ Á¡´ëÁ¡ Çϵå¿þ¾î ¾Ïȣȭ¸¦ À¯Áö°ü¸®Çϱâ À§ÇÑ ¹«¼± Çϵå¿þ¾î ±¸¼ºµµ¸¦ ¹Ýµå½Ã Æ÷ÇÔÇÑ´Ù.

 

¿¹¸¦ µé¾î, 128 ºñÆ® ¾ÏÈ£ Ç¥ÁØÀ» Á¤ÀÇÇÏ´Â °ÍÀº NSPMÀÇ ¹üÀ§¸¦ ¹þ¾î³ª´Â °ÍÀÌ´Ù. ÀÌ Á¤Ã¥¹®Àº ¼ö¿ë°¡´ÉÇÑ ¾Ïȣȭ Á¤Ã¥¿¡ ¼ÓÇÒ ¼öµµ ÀÖ´Ù.

 

°á·Ð

 

º¸¾È Á¤Ã¥À» ¾²´Â °ÍÀº Èï¹Ì·Î¿î °ÍÀÌ´Ù. ±×°ÍÀº ȸ»ç ÀüüÀûÀ¸·Î ÀÚ¿øµéÀÇ ÀÏÄ¡¿Í Á÷¿øµéÀÇ Çù·ÂÀ» ÇÊ¿ä·Î ÇÑ´Ù. ±×·¸´õ¶óµµ, Á¤Ã¥ ¾²±â´Â ¾ø¾î¼­´Â ¾ÈµÉ ½ºÅ³À̸ç, µû¶ó¼­ Á¤Ã¥ÀÌ ¼ö¸³µÇ¸é, °ËÅ並 ¹Þ¾Æ¾ß¸¸ ÇÏ°í ¼öÁ¤µÇ¾î¾ß¸¸ ÇÑ´Ù(Àû¾îµµ ³â°£ ´ÜÀ§·Î). º¸¾È Á¤Ã¥ÀÇ À¯Áö°ü¸®´Â ÀÏ»óÀûÀÎ ºñÁî´Ï½º È°µ¿°ú ³»¿Ü ¾ÇÀÇÀûÀÎ À§Çù¿¡ ´ëÇÑ ¹æ¾îÃ¥¿¡ ´ëÇÑ À¯Áö°ü¸®Ã³·³ ¶È°°ÀÌ Áß¿äÇÏ´Ù. °³ÀÎ µ¥ÀÌÅÍ¿Í °í°´ÀÇ ½Å»ó Á¤º¸¿¡ ´ëÇÑ º¸¾ÈÀº ºñÁî´Ï½º¿¡ À־ ¸Å¿ì Áß¿äÇÏ´Ù. ¿¹¸¦ µé¸é, ½Å¿ëÄ«µå Á¤º¸, ÀÇ·á Á¤º¸ ±×¸®°í (¹Ì±¹¿¡¼­ÀÇ) »çȸ º¸Àå ¹øÈ£´Â NSPMÀÇ Åä´ëÀÌ´Ù. ±×°ÍÀº Àü»ç Á¤º¸ º¸¾È ÇÁ·Î±×·¥ÀÇ ½ÉÀåÀÌ´Ù.

Endnotes

1 Simon, Mark; ¡°An Enterprise Security Policy Management Framework Part 1 & 2,¡± ISSA Journal, February 2008, www.issa.org/Members/Journals-Archive/2008.html. SANS Institute, ¡°Building a Security Policy Framework for a Large, Multi-national Company,¡± January 2005, www.giac.org/certified_professionals/practicals/gsec/4276.php. Gartenberg, Marc; ¡°How to Develop an Enterprise Security Policy,¡± ComputerWorld, January 2005, www.computerworld.com/securitytopics/security/story/0,10801,98896,00.html. Ungerman, Mark; ¡°Creating and Enforcing an Effective Information Security Policy,¡± Information Systems Control Journal, ISACA, vol. 6, 2005
2 SANS Institute, Security Policy Project, www.sans.org/resources/policies
3 The Network Security Policy Manual is an original, copyrighted creation of the author (Paul Meynen). To obtain a copy of the NSPM, please e-mail MeynenP@gmail.com.
4 Information Security Forum, The Standard of Good Practice, https://www.isfsecuritystandard.com/SOGP07/index.htm
5 International Organization for Standardization, ISO 17799:2005, Information Technology—Security Techniques—Code of Practice for Information Security Management, 2005, www.iso.org
6 A copy of ISO 17799:2005 was not obtained by the author until the end of the course in which he developed the NSPM. Consequently, there was not sufficient time to incorporate all the additional policy statements recommended in ISO 17799:2005. However, ISO 17799:2005 presents an incredible level of detail and is a robust standard to implement a security program. As the NSPM evolves, the implementation guidance (explained later) in the ISO standard will be leveraged to incorporate new statements into the NSPM.

Author¡¯s Note

The author would like to thank James Krev for his patience and guidance in support of this research at DePaul University, as well as Jacob Furst and Linda Allen for their meticulous editing of the work.

Paul R. Meynen
is an information security consultant in Chicago, Illinois, USA. He completed the Network Security Policy Manual as part of an independent study course at DePaul University, administered by James Krev. Meynen may be reached at MeynenP@gmail.com.

 

 

 


ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
¹ø¿ª¿¡ ´ëÇÑ º¯ (1) ½ÅÀÎö 07-03-24 7695 17
38 ¿£ÅÍÇÁ¶óÀÌÁîÀÇ °³³ä ½ÅÀÎö 13-01-08 2357 8
37 ÅëÁ¦¸¦ Áø´ÜÇϱâ Àü¿¡ ´øÁ®¾ß ÇÒ 5°¡Áö Áú¹® By Brian Barnier, CGEIT ½ÅÀÎö 11-06-13 2627 9
36 Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ, ¹ý±Ô ±×¸®°í µ¥ÀÌÅÍ º¸¾È À§Çè¿¡ °üÇÑ ÀÔ¹® By Carl Cadregari, and Alfonzo Cutaia, Esq (4) ½ÅÀÎö 11-05-31 5293 20
35 Àü»ç À§Çè °ü¸®¿¡¼­ÀÇ IT ½Ã³ª¸®¿À ºÐ¼® By Urs Fischer, CISA, CRISC, CPA Swiss ½ÅÀÎö 11-05-04 5166 11
34 º¸¾ÈÀÇ °¡Ä¡´Â ¹«¾ùÀΰ¡? By Steven J. Ross, CISA, CISSP, MBCP ½ÅÀÎö 11-04-17 3156 10
33 º¸¾È Á¤Ã¥À» ÀÛ¼ºÇÏ´Â ¹æ¹ý: ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾ó by Paul R. Meynen ½ÅÀÎö 11-03-25 3457 14
32 ¼ÒÇÁÆ® IT °Å¹ö³Í½º By Kazuhiro Uehara, CGEIT, CISA, CIA, PMP, and Sayaka Akino, CISA ½ÅÀÎö 11-01-31 3445 13
31 IS °³¹ß ÇÁ·ÎÁ§Æ®¿¡¼­ À§Çè °ü¸®¸¦ À§ÇÑ ¡®¿ä±¸»çÇ× ÁïÈZ¡¯ °ü¸® by Sachidanandam Sakthivel ½ÅÀÎö 11-01-20 3348 12
30 ÇÑ°¡Áö Áß¿äÇÑ Áú¹® by Steven J. Ross ½ÅÀÎö 11-01-11 3101 13
29 ¼­ºñ½º °¡¿ë¼º°ú ÀçÇØ º¹±¸ by Steven J. Ross ½ÅÀÎö 11-01-05 3848 13
28 ISO/IEC 38500 ¿¡ ±â¹ÝÇÑ IT °Å¹ö³Í½ºÀÇ ±Ùº» by Haris Hamidovic ½ÅÀÎö 10-12-02 5018 15
27 IT À§Çè ºÐ¼® – ºü¶ß¸°¡°A¡± By Eric J. Brown and William A. Yarberry Jr., ½ÅÀÎö 10-11-08 3668 20
26 Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ÇöȤ (Cloudy Daze) by Steven J. Ross ½ÅÀÎö 10-03-03 3853 16
25 IT °Å¹ö³Í½º¸¦ ÇÑ Â÷¿ø ²ø¾î¿Ã¸®±â À§ÇÑ 5°¡Áö ÆÁ By Brian Barnier ½ÅÀÎö 10-01-22 3284 14
24 ¿ä¾à: ¸Å·ÂÀÖ´Â ÀüÇâÀû °Å¹ö³Í½º ¸ÅÇÎ À̴ϼÅƼºê By ISACA (¹ø¿ªÀÚ Ãßõ) ½ÅÀÎö 09-08-10 3559 13
 1  2  3