CODEDRAGON ㆍSecurity/SecureCoding
미국 국토안보부(DHS),
2011년 11월 발표한 "안전한사이버 미래를 위한 청사진(Blueprint for a Secure Cyber Fututure))"
직접다운받기
blueprint-for-a-secure-cyber-future.pdf
Blueprint for a Secure Cyber Fututure
http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf
MESSAGE FROM THE SECRETARY....................................................................................................................................... ii
EXECUTIVE SUMMARY .................................................................................................................. iii
INTRODUCTION ................................................................................................... 1
SCOPE .................................................................................................................................................. 2
RELATIONSHIP TO OTHER KEY POLICIES AND STRATEGIES ..................................................................................................................... 3
MOTIVATION ................................................................................................................................... 3
STRATEGIC ASSUMPTIONS ................................................................................................ 4
THE FUTURE WE SEEK ................................................................................................................. 5
VISION .......................................................................................................................................... 5
A Cyberspace that is Secure ................................................................................................................... 5
A Cyberspace that is Resilient ............................................................................................................ 6
A Cyberspace that Enables Innovation .......................................................................................................................................... 6
A Cyberspace that Protects Public Health and Safety .............................................................................................................. 7
A Cyberspace that Advances Economic Interests and National Security ......................................................................... 7
GUIDING PRINCIPLES ........................................................................................................ 8
PRIVACY AND CIVIL LIBERTIES .................................................................. 8
TRANSPARENT SECURITY PROCESSES ..................................................................................... 8
SHARED RESPONSIBILITY IN A DISTRIBUTED ENVIRONMENT ................................................................................................................. 8
RISK-BASED, COST EFFECTIVE, AND USABLE SECURITY ........................................................................................................................... 9
STRATEGIC CONCEPT ................................................................................................. 10
FOCUS AREAS ........................................................................................................................................... 10
DEFINING SUCCESS ....................................................................................................................................... 11
Protecting Critical Information Infrastructure ........................................................................................................................ 11
Strengthening the Cyber Ecosystem ............................................................................................... 11
HOW WE WILL PROTECT CRITICAL INFORMATION INFRASTRUCTURE ............................................................................................... 12
Reduce Exposure to Cyber Risk ....................................................................................................................................................... 13
Ensure Priority Response and Recovery ...................................................................................................................................... 16
Maintain Shared Situational Awareness ..................................................................................................................................... 17
Increase Resilience ..................................................................................................................... 19
HOW WE WILL STRENGTHEN THE CYBER ECOSYSTEM ......................................................................................................................... 20
Empower Individuals and Organizations to Operate Securely .......................................................................................... 20
Make and Use More Trustworthy Cyber Protocols, Products, Services, Configurations, and Architectures .... 21
Build Collaborative Communities ........................................................................................... 22
Establish Transparent Processes .............................................................................................. 23
MOVING FORWARD ................................................................................................................ 25
APPENDIX A: ROLE OF DHS IN THE BLUEPRINT ................................................................................................ A-1
APPENDIX B: MAPPING QHSR GOALS AND OBJECTIVES TO THE BLUEPRINT......................................... B-1
APPENDIX C: STRATEGY DEVELOPMENT PROCESS .......................................................................................... C-1
APPENDIX D: GLOSSARY ........................................................................................ D-1
APPENDIX E: ACRONYM LIST ....................................................................................................................................E-1
'Security > SecureCoding' 카테고리의 다른 글
NIST, The Economis Impacts of Inadequate Infrasturcture for Software Testing, 200205 (0) | 2014.12.05 |
---|---|
Web Server (웹 서버) 점유율, 2014 년 4월 기준 (0) | 2014.12.04 |
OWASP ESAPI 활용방법 (0) | 2014.12.01 |
OWASP TOP 10 2013 리뷰 및 행안부기준(시큐어코딩 점검 항목 43개) 비교 (0) | 2014.11.30 |
JAVA 시큐어코딩 가이드 (0) | 2014.11.29 |