Áö±Ý ISO 27005°¡ ¿Â´Ù.
ISO 27000 Ç¥ÁØ ½Ã¸®Áî¿¡ ´ëÇÑ À̹ø Ãß°¡ºÐÀº ¡°ISO/IEC 27005:2008, Á¤º¸±â¼ú-º¸¾È Å×Å©´Ð-Á¤º¸ º¸¾È À§Çè °ü¸®¡±¶ó´Â Ç¥Á¦°¡ ºÙ¾ú´Ù.©ö °£´ÜÇÏ¸é¼ ÂüÁ¶Çϱ⠽±µµ·Ï ³ª´Â ÀÌ Ç¥ÁØÀ» ISO 27005·Î ºÎ¸¦ °ÍÀÌ´Ù. Á¤º¸ º¸¾ÈÀÇ ÀÔÀå¿¡¼ À§Çè °ü¸®¿¡ ´ëÇÑ Á÷Á¢ÀûÀÎ Á¢±Ù¹æ¹ýÀ» Á¤ÀÇÇÑ °ÍÀº Á¤º¸ º¸¾È ÀÎÁõ ÇÁ·Î¼¼½º¿¡ °üÇÑ ISO 27001¿¡ Á¸ÀçÇÏ´Â °áÇÔÀ» º¸¿ÏÇÑ °ÍÀÌ´Ù.©÷ ƯÈ÷, Á¤º¸ ½Ã½ºÅÛ °ü¸® ½Ã½ºÅÛ(ISMS)ÀÇ ¼ö¸³À» ¿ä±¸ÇÏ´Â 4 ÀýÀº À§Çè Æò°¡¸¦ ¿ä±¸ÇÏ¸é¼ Á¶Á÷ÀÇ À§Çè Æò°¡ ¹æ¹ý·ÐÀ» Á¤ÀÇÇÏ´Â ÀÏÀ» ÀÎÁõÀ» ¹Þ°íÀÚ ÇÏ´Â Á¶Á÷ ÀÚü¿¡ ¸Ã±â°í ÀÖ´Ù. ÀÌ°ÍÀº ¸ðµç À§ÇèÀÌ (´ëÀÀ) Á¶Ä¡°¡ ¾Æ´Ñ ºÐ¼®¿¡ ÀÇÇؼ ºÎÁ¤µÉ ¼ö ÀÖ´Â Æ÷¿ë·ÂÀÌ Å« Á¢±Ù¹æ¹ýÀ» ÃëÇÏ´Â °ÍÀÌ °¡´ÉÇÒ ¼ö ÀÖÀ¸¹Ç·Î ¿ÀÈ÷·Á ¿ìȸÀûÀÌ´Ù(circle).
±×·±µ¥, ³ª´Â °ú°Å ISO º¸¾È Ç¥ÁØ¿¡ ´ëÇØ ÀÏ°ü¼º ¹× Àü¹®¼ºÀÇ °á¿©·Î ÀÇ°ßÂ÷¸¦ °¡Áö°í ÀÖ¾úÀ¸³ª, ³»°¡ º¸±â¿¡ À̹ø °ÍÀº Á¦´ë·Î ±¸¼ºµÇ¾î ÀÖÀ¸¸ç À¯¿¬ÇÏ´Ù. ¸î¸î È帧µµ¿¡´Â ¾î¶² Á¤º¸ º¸¾È Àü¹®°¡¶óµµ ±×°ÍÀ» ÀÀ¿ëÇÒ ¼ö ÀÖ´Â ¹æ½ÄÀ¸·Î ÇØ´ç ÇÁ·Î¼¼½º¸¦ º¸¿©ÁØ´Ù. ³ª´Â ƯÈ÷ À§Çè Æò°¡°¡ »óÀ§ ¼öÁØÀ̰ųª ¶Ç´Â »ó¼¼ÇÒ ¼öµµ ÀÖ´Ù´Â ºÎ·Ï E ¿¡¼ÀÇ ÀÎÁ¤¿¡ Âù»ç¸¦ º¸³½´Ù. ±×°ÍÀº ÇÕ¸®ÀûÀ¸·Î Àß ¸¸µé¾îÁø ¾ð¾î·Î ¾²¿©Á³À¸¸ç ÀÌÇØÇϱ⠽±´Ù - ½¬¿ö¾ß ÇÑ´Ù -.
¾Õ¿¡¼ÀÇ ¿ËÁ¹ÇÑ ÀǽÉÀº Á¤ÀÇ ¹®Á¦ ȤÀº Á¤ÀÇ ´©¶ô ¹× À߸øµÈ Á¤ÀÇ¿¡¼ ºñ·ÔµÇ¾ú´Ù. ƯÈ÷, µ¶ÀÚ·Î ÇÏ¿©±Ý Á¤ÀÇÇϵµ·Ï ³²°ÜÁø °áÁ¤ÀûÀÎ 3°³ÀÇ ¿ë¾î°¡ ÀÖ°í, ¹«¾ùº¸´Ù °¡Àå Áß¿äÇÑ °ÍÀº Á¦½ÃµÈ ¿ë¾î Á¤ÀÇ¿¡¼ ¿äÁ¡ÀÌ ºüÁø °ÍÀÌ´Ù. À§Çè °ü¸® Ç¥ÁØ¿¡¼ À§Çù(threat), Ãë¾à¼º(vulnerability) ±×¸®°í °¡´É¼º(likelihood)¿¡ ´ëÇÑ Á¤ÀÇ°¡ ºüÁ®ÀÖ´Ù´Â °Í¿¡ ¼Ò¸§ÀÌ µ¸´Â´Ù. °Ô´Ù°¡, ³ª´Â À§Çè °ü¸® Ç¥ÁØÀ̶ó¸é À§ÇèÀ̶õ ¿ë¾î´Â ¾ö¹ÐÈ÷ ¼³¸íµÇ¾î Àֱ⸦ ±â´ëÇß¾ú´Ù; ³ª´Â ISO 27005¿¡ ³ª¿ÍÀÖ´Â ¼³¸í°ú ´Ù¸¥ °ßÇظ¦ °¡Áö°í ÀÖ´Ù. ±×¸®ÇÏ¿©, °ø°³ ¼ºñ½º Á¤½Å¿¡ ÀÔ°¢ÇÏ¿©, »ý·« ¹× À§ÀÓÀÇ Á˸¦ ¹Ù·Î Àâ±â À§ÇÏ¿© º» Ä÷³Àº ¿ë±â¸¦ °®°í ¹àÈú °ÍÀÌ´Ù. (ÁÁ¾Æ¿ä, Á˶ó°í ÇÑ °ÍÀº Á¶±ÝÀº Áö³ªÄ¡Áö¸¸, °ËÅ並 ¿ëÀÎÇØ¾ß ÇÒ ¿ë¾îµéÀº Á¸ÀçÇÑ´Ù.)
À§Çù(Threat)
ÀÌ·¯ÇÑ »ó´çÈ÷ Áß½ÉÀûÀÎ ¿ë¾î¸¦ Á¤ÀÇÇϴµ¥ ÀǵµÇÏÁö ¾ÊÀº ½Ãµµ°¡ ÀÖÀ¸³ª,©ù ¡°À§ÇùÀº ÀǵµÀû, ¿ì¹ßÀû ¾Æ´Ï¸é (ÀÚ¿¬) ȯ°æÀûÀÌ¸ç ±×¸®°í, ¿¹¸¦ µé¾î¼, Áß¿äÇÑ ¼ºñ½ºÀÇ ¼ÕÇØ È¤Àº ¼Õ½ÇÀ» ÃÊ·¡ÇÑ´Ù.¡± ¸¦ ÀÌÇØÇϱâ À§Çؼ »ç¶÷Àº ºÎ·Ï C¿¡ ´ëÇØ °ÇÏ°Ô ÁÖÀåÇؾ߸¸ ÇÑ´Ù. ¡°¿¹¸¦ µé¾î¼¡±¶ó´Â ÇÑÁ¤¾î´Â À§ÇùÀ¸·ÎºÎÅÍ ¶Ç ´Ù¸¥ °á°úµéÀÌ ³ª¿Ã ¼ö ÀÖ´Ù´Â Á¡°ú ÀÌ·Î ÀÎÇؼ ºÎ·Ï C-ÆĶó¿À ºí·¯½Ã(pharaoh blush)¸¦ ¸¸µå´Â õÀçÁöº¯ ¸ñ·Ï-¿¡ µé¾îÀÖ´Â Å×ÀÌºí ¾È¿¡ ÀÖ´Â °Í ÀÌ¿Ü¿¡ À§ÇùÀ» ÀÌÇØÇÏ´Â ´Ù¸¥ ¹æ½ÄÀÌ ÀÖÀ» ¼ö ÀÖ´Ù´Â »ý°¢À» °®°Ô ÇÑ´Ù. ±× ºÎ·Ï¿¡´Â ¿À·¡µÈ ¹ÏÀ»¸¸ÇÑ °ÍµéÀÌ µé¾î ÀÖ´Ù: ÁöÁø, ¹Ù¶÷ ±×¸®°í ÈÀç.©ë ´ÙÀ½°ú °°Àº ´õ¿í ºÒ°¡»çÀÇÇÑ »ç·Êµéµµ µé¾î ÀÖ´Ù: ÀüÀÚ¼®Àû ¹æ»ç, ÀǽɹÞÀ» ¹æÇØ ½ÅÈ£ÀÇ Â÷´Ü, ±×¸®°í ±Ç¸®ÀÇ À§Á¶. ÇØÄ¿, Å©·¡Ä¿, ¹üÁËÀÚ, Å×·¯¸®½ºÆ®, Æı« È°µ¿°¡, ¾ÇÀÇÀûÀÎ ³»ºÎÀÚµéÀ» ÁöĪÇÏ´Â Àΰ£Àû À§Çù ¿øõÀº Ưº°ÇÑ ÁÖÀǸ¦ ¿äÇÑ´Ù.
¿¹½ÃµÈ Á¤ÀÇ´Â ¸í·áÇÔÀÇ °á¿©¸¦ º¸¿©ÁÖ°í ±×¸®°í, À½¶õ¹°°ú °ü·ÃÇÏ¿© ¹Ì±¹ ÃÖ°í¹ýÁ¤ ÆÇ»çÀÎ Æ÷ÅÍ ½ºÆ©¾îÆ®¿¡ ÀÇÇØ À¯¸íÇØÁø Æø³ÐÀº ÁÖ°üÀû Çؼ®¿¡ ´ëÇÑ ¿©Áö¸¦ ³²°Ü ³õ¾Ò´Ù: ¡°³ª´Â ±×°Í(Æ÷¸£³ë)À» Á¤ÀÇÇÒ ¼ö´Â ¾øÀ¸³ª º¸¸é ¾È´Ù.¡± ±× ÈÄ·Î ¹Ì±¹ ¹ýÁ¤¿¡¼´Â Á¤È®È÷ ´©°¡ ¹«¾ùÀ» º¸¾Ò´Â°¡¿¡ ´ëÇÑ ³íÀïÀÌ ÀϾÙ.
À§ÇùÀº ´Ü¼øÈ÷ ¼ÕÇظ¦ ÀÏÀ¸Å³ ¼ö Àֱ⠶§¹®¿¡ À§ÇùÀΰ¡? ±×·± °æ¿ì¿¡´Â, °Å´ëÇÑ ½ÄÀÎ °³±¸¸®µµ ¸ðµç À§Çè Æò°¡¿¡¼ ´Ù·ïÁ®¾ß ÇÏ´Â À§ÇèÇÑ °ÍÀÌ´Ù. öÀÚ¸¦ À߸ø ¾´ °ÍÀº ¾î¶»°í; ±×·¯ÇÑ ÀÏÀº °íµîÇб³¿¡¼ ¿©·¯ºÐÀÇ ¼ºÀûÀ» ¶³¾î¶ß¸®´Â °ÍÀº °¡´ÉÇÏÁö¸¸, ÁÖ¿ä ÄÄÇ»Æà ȯ°æ¿¡¼´Â ½É°¢ÇÑ À§ÇùÀ¸·Î °ÅÀÇ °í·ÁÇÏÁö ¾Ê´Â´Ù. ºÎ·Ï C¿¡´Â ÇÔ¼öÀÇ À§ÇèÈ(compromise of functions)¶ó ºÎ¸£´Â ±×·¯ÇÑ À¯ÇüÀÇ À§Çù¿¡ ´ëÇÑ ¿¹½Ã·Î ¡°»ç¿ëÁß ¿À·ù error in use¡±°¡ µé¾î ÀÖ´Ù. À¯È¤¿¡ ºüÁö±â ½¬¿î »ç¶÷µéÀÎ ¿ì¸® Àΰ£Àº ¸ðµç Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇØ À§ÇùÀÌ ¾Æ´Ï°Ú´Â°¡?
³ª´Â À§ÇùÀ» ¡°Á¤º¸½Ã½ºÅÛ¿¡, Á¤º¸½Ã½ºÅÛ ÀÚüÀûÀ¸·Î º¸¸é ¿ÜºÎ, Áß¿äÇÑ ¼ÕÇظ¦ ³¢Ä¡´Â È®½ÇÇÑ ¿øõ¡±À¸·Î Á¤ÀÇÇÏ°íÀÚ ÇÑ´Ù. È®½Ç¼ºÀº ±×·¯ÇÑ(°Å´ëÇÑ ½ÄÀÎ) °³±¸¸®µéÀ» Á¦°ÅÇÑ´Ù; Á߿伺Àº ÇÏÂúÀº ½Ç¼ö¸¦ Á¦°ÅÇÑ´Ù; ±×¸®°í ¿ÜÀû ¿µÇâÀº ¿¡·¯¸¦ Á¦°ÅÇÑ´Ù. ³ª´Â ¿¡·¯¸¦ À§Çù¿¡¼ »©³»¾ú´Ù, ¿Ö³ÄÇÏ¸é ¿¡·¯¸¦ ¹üÇÒ °Í °°Àº »ç¶÷µéÀº ¿ÀÁ÷ ±×µéÀÌ ÇØ´ç ½Ã½ºÅÛ ¾È¿¡ ÀÖ¾î¾ß¸¸ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÑ´Ù.
Ãë¾à¼º(Vulnerability)
Ãë¾à¼ºÀ̶õ ÀÌ¿ëµÇ¾îÁö¸é Á¤º¸½Ã½ºÅÛ¿¡ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÒ ¼ö ÀÖ´Â ³»ºÎ Ãë¾àÁ¡(weaknesses)ÀÌ´Ù. ISO 27005 µµ ¡°Ãë¾à¼ºÀº Á¸Àç ÀÚü¸¸À¸·Î´Â ¼ÕÇظ¦ À¯¹ßÇÏÁö ¾Ê´Â´Ù, µû¶ó¼ ±×°ÍÀ» ÀÌ¿ëÇÏ°íÀÚ ÇÏ´Â À§ÇùÀÌ Á¸ÀçÇÒ ÇÊ¿ä°¡ ÀÖ´Ù. »óÀÀÇÏ´Â À§ÇùÀÌ ÀüÇô ¾ø´Â Ãë¾à¼º¿¡ ´ëÇؼ´Â ÅëÁ¦¸¦ ±¸ÇöÇÒ ÇÊ¿ä´Â ¾øÀ¸³ª, (Ãë¾à¼ºÀÇ) º¯È¿¡ ´ëÇÏ¿© ÀνÄÇÏ°í ¸ð´ÏÅÍÇÏ¿©¾ß ÇÑ´Ù¡±¶ó°í ¹àÈ÷´Â Á¡¿¡¼ ÀÌ·¯ÇÑ Á¤ÀÇ¿¡ µ¿ÀÇÇÏ´Â °Í °°´Ù.©ì ±×·¸Áö¸¸, °ø½ÄÀûÀÎ Á¤ÀÇÀÇ ºÎÀç´Â Ç¥ÁØ¿¡ ´ëÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡ÇÏ´Â °ÍÀε¥, ±×°ÍÀº À§Çè °ü¸® ¹× º¸¾È ¸ðµÎ¿¡ ÇØ°¡ µÉ ¼ö ÀÖ´Ù.
Á¤º¸½Ã½ºÅÛÀÌ Ãë¾àÇÏ´Ù´Â °ÍÀº (¾ö¿¬ÇÑ) »ç½ÇÀÌ´Ù. ÇÑ°¡Áö ¿¹·Î, ½Ã½ºÅÛÀº »ç¶÷¿¡ ÀÇÇØ °³¹ßµÇ°í, ±¸ÇöµÇ°í ±×¸®°í ¿î¿µµÈ´Ù. ±×·¸±â ¶§¹®¿¡ ¾Õ¼ ¾ð±ÞµÈ ¡°»ç¿ë»ó ¿À·ù¡±´Â ¸ðµç »ç¶÷¿¡°Ô º»ÁúÀûÀÌ´Ù. ÇÁ·Î±×·¡¸Ó³ª °ü¸®ÀÚ°¡ ³ªÁß¿¡ ÀڽŵéÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇÏ¿© ¾ÇÀÇÀûÀ¸·Î ½Ã½ºÅÛ ³»¿¡ °áÇÔÀ» ¹èÄ¡ÇÏ´Â »ç·ÊµéÀÌ ºÐ¸íÈ÷ ÀÖ´Â ¹Ý¸é, ´ëºÎºÐÀÇ Ãë¾à¼ºÀº º¹À⼺, ¹«½Ã ȤÀº ´ëóÇÏ´Â ÅëÁ¦ ºñ¿ë °°Àº ¿ä¼Ò·ÎºÎÅÍ ¹ß»ýÇÑ´Ù.
À§Çè °ü¸® - ¹× ±×¿¡ ´ëÇÑ °¨»ç - ÀÇ ¿äÁ¡Àº Ãë¾à¼ºÀÌ ¾Ç¿ëµÉ ¼ö ÀÖ±â Àü¿¡ ±×°ÍµéÀ» È®ÀÎÇÏ°í ±³Á¤ÇÏ´Â °Í, ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ÇØ´ç À§ÇùµéÀÌ ´õ ÀÌ»ó Àǹ̰¡ ¾øÀ» ¶§±îÁö Ãë¾à¼ºÀ» ¾Ç¿ëÇÒÁöµµ ¸ð¸£´Â °¡´ÉÇÑ À§ÇùµéÀÇ ¹üÀ§¸¦ Á¦ÇÑÇÏ´Â °ÍÀÌ´Ù. ½Ã½ºÅÛÀº ¼³°è °úÁ¤¿¡¼ÀÇ ¿À·ù (ȤÀº °íÀÇ·Î µµÀÔµÈ ¹ÌºñÁ¡) °¡ ÀÖÀ»Áö ¸ð¸¥´Ù; ÇÁ·Î±×·¡¹Ö °úÁ¤¿¡¼; ȤÀº ½ÃÇè, ±¸Çö, ¿î¿µ, ÀúÀå ȤÀº »ç¿ë Áß¿¡; ³» »ý°¢¿¡´Â ÀÌ·¯ÇÑ Ãë¾à¼ºÀÇ ¸ðµç ¿øõµéÀ» ÇÔ²² Ãë±ÞÇÏ°í ±× °á°úµéÀ» °áÇÕ½ÃÅ°´Â °ÍÀº À§Çè¿¡ ´ëÇÑ ¹«±â·ÂÇÏ°í ±Ã±ØÀûÀ¸·Î´Â ÇêµÈ Æò°¡ ¹× Ãë±ÞÀ» ³º´Â´Ù.
ISO 27005 Ç¥ÁØ ºÎ·Ï D¿¡ ³ªÅ¸³ª ÀÖ´Â À§Çù¿¡ ´ëÇÑ ºÐ·ùó·³, Ãë¾à¼º¿¡µµ ºÐ·ù¹ýÀÌ ÀÖ´Ù. ÀÌ ºÎ·Ï¿¡ ³ªÅ¸³ ¿¹½ÃµéÀÌ °¡Ä¡ÀÖ´Â °ÍÀ̳ª, (°Ü¿ì) 2 ÆäÀÌÁö ¹Ý ±æÀÌÀÇ ¸®½ºÆ®¿¡ ¸ðµÎ ´ã¾Ò´Ù°í °¨È÷ ÁÖÀåÇÒ ¼ö´Â ¾ø´Ù.
°¡´É¼º(Likelihood)
ISO 27005 Ç¥ÁØ ¼½¼Ç 3.5¿¡´Â, À§ÇèÀ» ÃøÁ¤Çϱâ À§Çؼ ¡°È®·ü probability¡± ´ë½Å ¡°°¡´É¼º likelihood¡±ÀÌ ¸í½ÃÀûÀ¸·Î ¾²ÀÌ°í ÀÖ´Ù. È®·üÀº ¿¹ÃøÀÌ °¡´ÉÇÏ´Ù; ±×°ÍÀº ÁÖ¾îÁø ½Ã°£ µ¿¾ÈÀÇ ¹ß»ý Ƚ¼öÀÌ´Ù. ÀüÈÄ °ü°è¸¦ º¸¾Æ, ¿ì¸®´Â È®·üÀ» °ú°Å·ÎºÎÅÍ ¹Ì·¡¸¦ ÃßÁ¤Çϴµ¥ ÀÌ¿ëÇÑ´Ù. °ú°Å ¾î¶°ÇÑ ´Þ¿¡ ¹ß»ýÇÑ ÀÏÀº À̹ø ´Þ ±×¸®°í ´ÙÀ½ ´Þ¿¡µµ ¹ß»ýÇÒ °ÍÀÌ´Ù. °¡´É¼ºÀº ÀüÀûÀ¸·Î ÁÖ°üÀûÀÌ°í °æÇèÀûÀÌ´Ù. ¹Ì±¹ ¾Ö¸®Á¶³ªÁÖÀÇ ÇǴнº¿¡ º¸´Ù ·±´ø¿¡ ºñ°¡ ¿Ã °¡´É¼ºÀÌ ´õ ¸¹Áö¸¸, »ç¶÷Àº µÎ °÷ÀÇ ³¯¾¾¿¡ Ä£¼÷Çؾ߸¸ ÀÌ°ÍÀ» ¾Ë ¼ö ÀÖ´Ù. ±×·¯ÇÑ Áö½Äµµ ¹Ù·Î ¿À´Ã ¾î´À °÷¿¡ ºñ°¡ ³»¸± °ÍÀΰ¡¿¡ ´ëÇÑ Â¡ÈÄ´Â °ÅÀÇ Á¦°øÇÏÁö ¾Ê´Â´Ù. ºñ½ÁÇÏ°Ô, º¸¾È °áÇÔÀº Á¢±Ù ÅëÁ¦, °¨»ç ÁõÀû, ħÀÔ Å½Áö, µîµî¿¡ ´ëÇÑ Á¤±³ÇÑ ¸ÞÄ¿´ÏÁòÀ» °¡Áø ½Ã½ºÅÛ º¸´Ù´Â ´ú º¸È£µÈ ½Ã½ºÅÛ¿¡¼ ¹ß»ýÇÒ °¡´É¼ºÀÌ ´õ ÀÖ´Ù. ÃøÁ¤ÇÒ ¼öµµ ¾øÀ¸¸ç ¾ÆÁ÷ ¾Ë·ÁÁöÁö ¾ÊÀº °ÍÀÌ ¾ó¸¶³ª ¸¹°Ú´Â°¡.
ÇöÀç·Î¼´Â ÁÖ°üÀûÀÎ ºÐ¼®¿¡ ÀÖ¾î¼ º»ÁúÀûÀ¸·Î À߸øµÈ °ÍÀº ¾Æ¹« °Íµµ ¾øÁö¸¸, ºÐ¸í ºÐ¼®°¡ÀÇ Áö½ÄÀ̳ª ¼Ø¾¾(skills)¿¡ ÀÇÁ¸ÇÑ´Ù. ¾î¶°ÇÑ È°µ¿À» ÀÌÇàÇϴ ǥÁØ ¹æ¹ýÀº ´©°¡ ±×°ÍÀ» ¼öÇàÇϴ°¡¿¡ »ó°ü¾øÀÌ µ¿ÀÏÇϰųª ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ºñ½ÁÇÑ °á°ú¸¦ ³º¾Æ¾ß ÇÑ´Ù. È®·üÀ̶ó´Â ¿ë¾î¸¦ ȸÇÇÇÔÀ¸·Î½á, ISO 27005´Â ÀÏÁ¤ÇÏ°Ô ¾Ë ¼ö ¾ø´Â °´°üÀûÀÎ »ç½ÇµéÀÇ ºóÆ´À» Á¶Á¾ÇÏÁö¸¸, Á¾±¹¿¡ ÀÖ¾î¼ À§Çè °ü¸®´Â È¿°ú¿¡ ´ëÇÑ ´Ù¾çÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡Çϸç, ¶ÇÇÑ Æ¯Á¤ À§ÇèÀ» ´Ù·ç°í Ưº°ÇÑ ÅëÁ¦¸¦ Àû¿ëÇÒ ¿ä±¸¿¡ ´ëÇÑ ¼·Î ´Ù¸¥ ÀÌÇظ¦ ³º´Â´Ù.
À§Çè
ISO 27005´Â ÀûÁ¤ÇÑ ºÎºÐ ÁýÇÕÀÎ Á¤º¸ º¸¾È À§ÇèÀ» Á¤ÀÇÇÑ´Ù: ¡°Æ¯Á¤ À§ÇùÀÌ °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ìÀÇ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© Á¶Á÷¿¡ ¼ÕÇظ¦ ³¢Ä¥ °¡´É¼º.¡± ³ª´Â Á¤ÀǵÇÁö ¾ÊÀº ´Ù¸¥ ÁÖ¿ä ¿ë¾îµéÀ»(ÀÌ °æ¿ì¿¡´Â À§Çù°ú Ãë¾à¼º) ½Å·ÚÇÏ°í, ¶ÇÇÑ ¡°°¡´É¼º¡±À̶õ ¿ë¾îÀÇ ¼Ò°³¿Í ÇÔ²² ±× Àǹ̸¦ ¾Ö¸Å¸ðÈ£ÇÑ Ã¼·Î ³²°Ü³õÀº Á¤ÀǸ¦ ÀǽÉÇÑ´Ù.©í
³ª´Â À§ÇèÀ» °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ì¿¡ ´ëÇÑ ¼ÕÇØ¿¡ ´ëÇÑ ºÒÈ®½Ç¼ºÀÇ Å©±â(measurement)·Î °£ÁÖÇÏÁö¸¸, ÀÌ ÁÖÀåÀº ´õ ¸¹Àº ¼³¸í°ú Åä·ÐÀ» ÇÊ¿ä·Î ÇÑ´Ù. ³ª´Â ´ÙÀ½¿¡ ¾µ Ä÷³¿¡¼ ±×°Í¿¡ ´äÇÒ °ÍÀ» ¾à¼ÓÇÑ´Ù.
Endnotes
1 In the beginning, there was BS 7799, parts 1 and 2, and it was good. (Actually it was so-so, but a lot has happened since.) BS 7799 begat ISO 17799 with only one part, which begat ISO 27002, which begat ISO 27001, which was, in fact, begotten by BS 7799, part 2. ISO 27001/2 begat ISO 27005 and BS 27006, the security auditing standard. ISO 27003 and ISO 27004 are, at the time of writing, still in the process of being begotten.
2 International Organization for Standardization, ISO/IEC 27001:2005/BS 7799-2:2005, Information Technology—Security Techniques—Requirements, 2005
3 Ross, Steven; ¡°Contents and Context,¡± Information Systems Control Journal, vol. 1, 2006
4 ¡°A threat has the potential to harm assets such as information, processes and systems and therefore organizations.¡± ISO 27005, section 8.2.1.3. Explanatory, in my opinion, but not definitional.
5 Or, more accurately, seismic phenomena, meteorological phenomena and fire.
6 ISO 27005, section 8.2.1.5
7 Ibid., section 3.2
Steven J. Ross, CISA, CBCP, CISSP
is a director at Deloitte. He welcomes comments at stross@deloitte.com.
--------------------------------------------------------------------------------
ISACA Journal, formerly Information Systems Control Journal, is published by ISACA, a nonprofit organization created for the public in 1969. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscript-xion to the ISACA Journal.
Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors, employers or the editors of this Journal. ISACA Journal does not attest to the originality of authors¡¯ content.
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.
Subscript-xion Rates:
US: one year (6 issues) $75.00
All international orders: one year (6 issues) $90.00
Remittance must be made in US funds.