Acknowledgement
이 성과는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임 (No. NRF-2022R1F1A1073211).
References
- 채재병, 김일기, "코로나19 팬데믹에 따른 사이버공격 변화 양상과 대응방안," 국가안보전략연구원, 2021년 8월
- Defense Information Systems Agency(DISA) and National Security Agency(NSA), "Zero Trust Reference Architecture Version 2.0," Jul. 2022.
- J. Kindervag, "No More Chewy Centers: Introducing the Zero Trust Model of Information Security," Forrester, Sep. 2010.
- R. Ward and B. Beyer, "BeyondCorp - A New Approach to Enterprise Security," ;login:, Vol. 39, No. 6, pp. 6-11, Dec. 2014.
- "Executive Order 14028, Improving the Nation's Cybersecurity," Nist, May 2021.
- 이선아, 김범석, 이혜인, 박원형, "제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구," 한국정보통신학회논문지, 제26권, 제2호, 265-270쪽, 2022년 2월 https://doi.org/10.6109/JKIICE.2022.26.2.265
- J. Chaffetz, "The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation," Committee on Oversight and Government Reform, Sep. 2016.
- S.M. Kerner, TechTarget, Colonial Pipeline hack explained: Everything you need to know(2022), https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-need-to-know (Accessed Feb., 17, 2023).
- CISA, "Pipeline Cybersecurity Initiative Fact Sheet," CISA, Apr. 2021.
- DEV-0537 criminal actor targeting organizations for data exfiltration and destruction (2022). https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ (Accessed Feb., 17, 2023).
- NIST, "Zero Trust Architecture," NIST SP 800-207, Aug. 2020.
- "Moving the U.S. Government Toward Zero Trust Cybersecurity Principles," OMB, Jan. 2022.
- CISA, "Zero Trust Maturity Model - Pre-decisional Draft Version 1.0," CISA, Jun. 2021.
- NCSC, "Zero trust architecture design principles," NCSC, Jul. 2021.
- GCPJ, "Approach to Zero Trust deployment in Japanese Government Information System," GCPJ, Jun. 2020.
- "Technical specification for zero trust system," T/CESA 1165-2021, 2021년 7월
- "网络安全标准化工作月报," 全国信息安全标准化技术委员会 (2022) https://www.tc260.org.cn/front/postDetail.html?id=20220610190100 (Accessed Jun., 10, 2022).
- CSA, "The Singapore Cybersecurity Strategy 2021," CSA, Oct. 2021.
- 임수연, "정보보호산업의 전략적 육성 방안," 과학기술정보통신부, 2022년 2월
- 김남승, "최근 사이버위협 동향 및 대응방안," 과학기술정보통신부, 2022년 4월
- 김승열, "디지털 질서를 위한 새로운 보안 체계를 마련한다," 과학기술정보통신부, 2022년 10월
- AWS, "Zero Trust architectures: An AWS perspective,"https://aws.amazon.com/ko/blogs/security/zero-trust-architectures-an-aws-perspective/ (Accessed Apr., 2021).
- "Zero Trust Deployment Guide for Microsoft Azure Active Directory," Microsoft, Apr. 2020.
- SAP, Cloud Platform(2021). https://www.sap.com/korea/products/cloud-platform.html (Accessed Feb., 17, 2023).
- Akamai, Getting Started with Your Zero Trust Strategy (2022). https://www.akamai.com/our-thinking/zero-trust/where-to-start-with-zero-trust-security (Accessed Feb., 17, 2023).
- Genians, 제로트러스트(Zero Trust)를 품은 Genian NAC(2021). https://www.genians.co.kr/blog/zero-trust (Accessed Feb., 17, 2023).
- MLsoft, "Tgate SDP(2020)," http://www.mlsoft.com/product-tgatesdp (Accessed Feb., 17, 2023).
- FASOO, Build a True Zero-Trust Data Security Platform (2022). https://en.fasoo.com/news-and-events/new-videobuild-a-true-zero-trust-data-security-platform/ (Accessed Feb.,17, 2023).
- 김종식, "금융분야 클라우드 및 망분리 규제 개선방안," 금융위원회, 2022년 4월