Blueprint for a Secure Cyber Fututure

CODEDRAGON Security/SecureCoding

반응형

미국 국토안보부(DHS),

2011년 11월 발표한 "안전한사이버 미래를 위한 청사진(Blueprint for a Secure Cyber Fututure))"

   

직접다운받기

blueprint-for-a-secure-cyber-future.pdf

   

   

Blueprint for a Secure Cyber Fututure

http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf

   

MESSAGE FROM THE SECRETARY....................................................................................................................................... ii

EXECUTIVE SUMMARY .................................................................................................................. iii

INTRODUCTION ................................................................................................... 1

SCOPE .................................................................................................................................................. 2

RELATIONSHIP TO OTHER KEY POLICIES AND STRATEGIES ..................................................................................................................... 3

MOTIVATION ................................................................................................................................... 3

STRATEGIC ASSUMPTIONS ................................................................................................ 4

THE FUTURE WE SEEK ................................................................................................................. 5

VISION .......................................................................................................................................... 5

A Cyberspace that is Secure ................................................................................................................... 5

A Cyberspace that is Resilient ............................................................................................................ 6

A Cyberspace that Enables Innovation .......................................................................................................................................... 6

A Cyberspace that Protects Public Health and Safety .............................................................................................................. 7

A Cyberspace that Advances Economic Interests and National Security ......................................................................... 7

GUIDING PRINCIPLES ........................................................................................................ 8

PRIVACY AND CIVIL LIBERTIES .................................................................. 8

TRANSPARENT SECURITY PROCESSES ..................................................................................... 8

SHARED RESPONSIBILITY IN A DISTRIBUTED ENVIRONMENT ................................................................................................................. 8

RISK-BASED, COST EFFECTIVE, AND USABLE SECURITY ........................................................................................................................... 9

STRATEGIC CONCEPT ................................................................................................. 10

FOCUS AREAS ........................................................................................................................................... 10

DEFINING SUCCESS ....................................................................................................................................... 11

Protecting Critical Information Infrastructure ........................................................................................................................ 11

Strengthening the Cyber Ecosystem ............................................................................................... 11

HOW WE WILL PROTECT CRITICAL INFORMATION INFRASTRUCTURE ............................................................................................... 12

Reduce Exposure to Cyber Risk ....................................................................................................................................................... 13

Ensure Priority Response and Recovery ...................................................................................................................................... 16

Maintain Shared Situational Awareness ..................................................................................................................................... 17

Increase Resilience ..................................................................................................................... 19

HOW WE WILL STRENGTHEN THE CYBER ECOSYSTEM ......................................................................................................................... 20

Empower Individuals and Organizations to Operate Securely .......................................................................................... 20

Make and Use More Trustworthy Cyber Protocols, Products, Services, Configurations, and Architectures .... 21

Build Collaborative Communities ........................................................................................... 22

Establish Transparent Processes .............................................................................................. 23

MOVING FORWARD ................................................................................................................ 25

APPENDIX A: ROLE OF DHS IN THE BLUEPRINT ................................................................................................ A-1

APPENDIX B: MAPPING QHSR GOALS AND OBJECTIVES TO THE BLUEPRINT......................................... B-1

APPENDIX C: STRATEGY DEVELOPMENT PROCESS .......................................................................................... C-1

APPENDIX D: GLOSSARY ........................................................................................ D-1

APPENDIX E: ACRONYM LIST ....................................................................................................................................E-1