SlideShare a Scribd company logo
2-2. DB ๋ณด์•ˆ

                               Preview

        ํ•ญ๋ชฉ                               ์ƒ์„ธ๋‚ด์—ญ

        ๊ฐœ์š”       ์›น์— DB๊ฐ€ ์—ฐ๊ฒฐ๋˜๋ฉด์„œ ๋Œ€๋‘๋˜๋Š” ๋ฐ์ดํ„ฐ ์œ ์ถœ๋ฌธ์ œ์— ๋Œ€ํ•œ ๋Œ€์ฑ…

      ๊ธฐ์ถœ์—ฌ๋ถ€       92
     ๊ด€๋ จKeyWord   ์ ‘๊ทผ์ œ์–ด, ์•”ํ˜ธํ™”, Compliance

     ์ถ”์ฒœ์‚ฌ์ดํŠธ



      ๊ธฐ์ˆ ๋ฐœ์ „
                 Crypto Card๊ธฐ๋ฐ˜ ์•”ํ˜ธํ™”๏ƒ ์ ‘๊ทผ์ œ์–ด์†”๋ฃจ์…˜/์•”ํ˜ธํ™” ์†”๋ฃจ์…˜
      RoadMap



        ๊ธฐํƒ€       ์„ฑ๋Šฅ์„ฑ ๋ฌธ์ œ ์‹ฌ๊ฐ




                                  -0-           ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DB๋ณด์•ˆ
๏ฑ ๊ฐœ์š”
  โ€“ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ์œ„ํ˜‘์œผ๋กœ ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ์ฒด๊ณ„ ๋ฐ ๊ธฐ์ˆ 
  โ€“ ์ตœ๊ทผ ๊ธฐ์—…๋ฐ์ดํ„ฐ, ๊ฐœ์ธ์ •๋ณด์˜ ์ค‘์š”์„ฑ ๋ฐ Compliance์ฆ๊ฐ€๋กœ ์ด์Šˆํ™”
  โ€“ DB๋ณด์•ˆ ์š”๊ตฌ์‚ฌํ•ญ: ์ธ์ฆ/์ ‘๊ทผํ†ต์ œ/๊ฐ์‚ฌ


๏ฑ DB๋ณด์•ˆ์˜ ๋ฌธ์ œ์ 
  โ€“   ๋ณด์•ˆ๊ด€๋ฆฌ์ž๋Š” DB๋ฅผ ๋ชจ๋ฅด๊ณ โ€ฆ DB๊ด€๋ฆฌ์ž๋Š” ๋ณด์•ˆ์„ ๋ชจ๋ฅธ๋‹ค.
  โ€“   DB Vender๋งˆ๋‹ค ๋ณด์•ˆ์ˆ˜์ค€์ด ์ œ ๊ฐ๊ฐ์ž„
  โ€“   ์—ฐ๊ด€์ธ, ๋‚ด๋ถ€์ž์— ์˜ํ•œ ๋ฒ”์ฃ„๋ฐœ์ƒ ๋น„์œจ์ด ๋†’์Œ
  โ€“   ๋ณด์•ˆ๊ฐ•ํ™”์— ๋”ฐ๋ฅธ Performance์ €ํ•˜/๋น„์šฉ์†Œ์š”๊ฐ€ ๋งŽ์Œ


๏ฑ DB๋ณด์•ˆ ๊ด€๋ จ๊ณต๊ฒฉ

          Domain                                      ๊ด€๋ จ๋‚ด์šฉ
  ๋„คํŠธ์›Œํฌ ๊ด€๋ จ ๊ณต๊ฒฉ                 โ€ข DDOS: Stringํˆฌ์ž…์„ ํ†ตํ•œ NW Daemon down
  (BOF, ์šฐํšŒ)                  โ€ข NW Daemon์šฐํšŒ ๋ฐ ์ง์ ‘๊ณต๊ฒฉ: ์•”ํ˜ธ์„ค์ •์˜ ์ทจ์•ฝ์„ฑ, ๋‚ด๋ถ€ํŒจํ‚ค์ง€ ๋ณ€ํ˜•
                               ์„ ํ†ตํ•œ ํ•ดํ‚น์ฝ”๋“œ ์‚ฝ์ž…
  ์ธ์ฆ ํ”„๋กœ์„ธ์Šค ๊ณต๊ฒฉ                 โ€ข ์‚ฌ์šฉ์ž ์ •๋ณด ๋ณ€ํ˜•: ํ™•์ธ์ ˆ์ฐจ ์ฐจ๋‹จ์„ ํ†ตํ•œ ์ง์ ‘ ์—‘์„ธ์Šค
                             โ€ข ๋ฐฑ๋„์–ด: ๋ฉ”๋ชจ๋ฆฌ์ƒ์ฃผ ํŒจํ‚ค์ง€๋ฅผ ์•…์šฉํ•œ ๋ฐฑ๋„์–ด ์„ค์น˜
  SQL, Procedure Injection   โ€ข SQL Injection: SQL๋ณ€ํ˜•, ์ฝ”๋“œํˆฌ์ž…, ํ•จ์ˆ˜ํˆฌ์ž…, BOF
                             โ€ข Procedure Injection: Embeded SQL, Cursors, DBMSํŠนํ™”๋œ ํŒจํ‚ค์ง€


                                            -1-                   ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DB๋ณด์•ˆ
๏ฑ DB๋ณด์•ˆ์˜ ๊ธฐ์ˆ  Domain

           Domain                                 ๊ด€๋ จ๋‚ด์šฉ
   Authentication    โ€ข ํŒจ์Šค์›Œ๋“œ ๊ด€๋ฆฌ
                     โ€ข ๊ฐ€์šฉํ•œ ์ธ์ฆ์ˆ˜๋‹จ ๋™์›: ์ƒ์ฒด์ธ์‹, ์ธ์ฆ์„œ, ID/password ๋“ฑ
                     โ€ข NW Daemon์„ค์ •๊ด€๋ฆฌ, ๊ธฐ๋ณธํฌํŠธ ๋ณ€๊ฒฝ
   Authorization     โ€ขPublic๊ณ„์ •์˜ ์ œํ•œ, ์‚ฌ์šฉ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณ€๊ฒฝ ๊ฒ€ํ† 
                     โ€ข์‹œ์Šคํ…œ ๊ถŒํ•œ Revoke, Any๊ณ„์—ด ๊ถŒํ•œ Revoke
   Access Control    โ€ข DB Schema Design: Authorization๊ณ ๋ คํ•˜์—ฌ ์„ค๊ณ„
                     โ€ข ์ ‘๊ทผ์ œ์–ด๋ชจ๋ธ:MAC, DAC, RBAC
   Confidentiality   โ€ข ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(DBMS ์˜ต์…˜์‚ฌ์šฉ ํ˜น์€ ์ „์šฉ ์†”๋ฃจ์…˜)
                     โ€ข ์ „์†ก๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(SSL/TLS)
   Backup/Recovery   โ€ขIncremental/Full, ๋ฐฑ์—…์ •์ฑ…

   Audit             โ€ข Trigger ๋“ฑ ์ž„์‹œ์กฐ์น˜
                     โ€ข DBMS์ œ๊ณต Audit Tool ์ด์šฉ(์„ฑ๋Šฅ์ €ํ•˜ ๊ฐ์†Œ ๊ณ ๋ ค)

๏ฑ ์ „๋ง/๊ณ ๋ ค์‚ฌํ•ญ
   โ€“   ์›น ์ผ์ƒ‰์˜ App.๏ƒ ์›น์„ ํ†ตํ•œ ์นจํ•ด๊ฐ€๋Šฅ์„ฑ ์ƒ์กด(์›น ๋ณด์•ˆ๊ณผ DB๋ณด์•ˆ์˜ ๋™์‹œ์ง„ํ–‰ ํ•„์š”)
   โ€“   IT Compliance ์ฃผ์˜(๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๋ฒ• ๋“ฑ)
   โ€“   ๊ฐ์ข… ๋ณด์•ˆ๊ธฐ๋Šฅ ์‚ฌ์šฉ์‹œ์— ๋”ฐ๋ฅด๋Š” ์„ฑ๋Šฅ์ €ํ•˜๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ๋ฐœ์ฃผ
   โ€“   ๊ฐ์‚ฌ๊ธฐ๋Šฅ์€ DBMS Vender์— ๋”ฐ๋ผ ๊ธฐ๋Šฅ์ฐจ์ด๊ฐ€ ์žˆ์œผ๋ฏ€๋กœ ์ œ๊ณต๊ธฐ๋Šฅ ์™ธ ๋ณ„๋„์˜ ๊ธฐ๋Šฅ๊ตฌํ˜„ ํ•„์š”

                                           -2-                  ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DB๋ณด์•ˆ ์†”๋ฃจ์…˜์˜ ์ข…๋ฅ˜


                                      ์ ‘๊ทผ์ œ์–ด ์ œํ’ˆ
   ๊ตฌ๋ถ„                                                                         ์•”ํ˜ธํ™” ์ œํ’ˆ
                   Sniffing ๋ฐฉ์‹       Server Agent ๋ฐฉ์‹        Gateway ๋ฐฉ์‹

               ๏ถ๋ณด์•ˆํ†ต์ œ๊ฐ€ ์™„๋ฒฝํ•˜์ง€
 ๋ณด์•ˆ๊ธฐ๋Šฅ                             ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต         ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต     ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต
               ์•Š์Œ

                                                        ๏ถDB์„œ๋ฒ„์— ์˜ํ–ฅ ์—†์ด
                                                                          ๏ถDB ์„œ๋ฒ„ ์„ฑ๋Šฅ์—
               ๏ถAgent ๊ฐ€ ์„ค์น˜๋˜์ง€ ์•Š๋Š”   ๏ถAgent ์„ค์น˜๋กœ ์ธํ•œ DB ์„œ๋ฒ„   ์•ˆ์ •์  ์šด์˜ ๊ฐ€๋Šฅ
                                                                          ์˜ํ–ฅ ์˜ํ–ฅ์„ ์คŒ
               ๋ฐฉ์‹                 ์„ฑ๋Šฅ์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ์Œ        ๏ถGateway ๊ตฌ์„ฑ์— ๋”ฐ๋ฅธ
  ์žฅ๋‹จ์                                                                      (5-10% ๋ถ€ํ•˜ ์ƒ์„ฑ)
               ๏ถDB์„œ๋ฒ„์— ์˜ํ–ฅ ์—†์ด       ๏ถAgent ์žฅ์• ๋กœ ์ธํ•œ         ์žฅ์•  ๋Œ€์‘ ๋ฐฉ์•ˆ ํ•„์š”
               ์•ˆ์ •์  ์šด์˜ ๊ฐ€๋Šฅ                                                  ๏ถ์•”ํ˜ธํ™” ๋ฐ ์ธ์ฆ ํ‚ค
                                  ๋Œ€์ฑ… ๋ฏธ๋น„                 (์ด์ค‘ํ™” or Bypass)
                                                                          ๊ด€๋ฆฌ ํ•„์š”
                                                        ๏ถ์•”ํ™”ํ™” ๋Œ€์ฒด ๊ธฐ๋Šฅ์ œ๊ณต


               ๏ถํ™•์žฅ ์‹œ ๊ฐ๊ฐ์˜ ์„ธ๊ทธ๋จผํŠธ                           ๏ถ๋ณ„๋„์˜ H/W ์ถ”๊ฐ€ ์—†์ด    ๏ถ๋ณ„๋„์˜ H/W ์ถ”๊ฐ€ ์—†์ด
  ํ™•์žฅ์„ฑ                             ๏ถ์„œ๋ฒ„๋งˆ๋‹ค Agent ์„ค์น˜ ํ•„์š”
               ๋งˆ๋‹ค H/W ์—ฐ๊ฒฐ ํ•„์š”                             ํ™•์žฅ ๊ฐ€๋Šฅ             ํ™•์žฅ ๊ฐ€๋Šฅ


                                                        ๏ถ๋น„์ •ํ˜•๋ฐ์ดํ„ฐ ์ œ์–ด ์‹œ
               ๏ถ์ •ํ˜•๋ฐ์ดํ„ฐ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ      ๏ถ์šฐํšŒ ์ ‘์†์— ๋Œ€ํ•œ ์ œ์–ด ์‹œ       ๊ตฌ์„ฑํ•˜๋Š” ๋ฐฉ์‹์ด๋ฉฐ,        ๏ถ์•”๋ณตํ˜ธํ™” ๋ฐ DB ์„ฑ๋Šฅ
 ์ œํ’ˆํŠน์ง•
               ๊ตฌ์„ฑ ๋ฐฉ์‹              ๊ตฌ์„ฑํ•˜๋Š” ๋ฐฉ์‹               ๋ณด์•ˆ์„ฑ ๋ฐ ํ™•์žฅ์„ฑ์ด        ํŠœ๋‹ ๋“ฑ ๊ณ ๋ ค ์‚ฌํ•ญ ๋งŽ์Œ
                                                        ๋›ฐ์–ด๋‚จ



์ถœ์ฒ˜: DB Safer


                                              -3-                 ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DB์ ‘๊ทผ์ œ์–ด ์†”๋ฃจ์…˜์˜ ์ผ๋ฐ˜๊ธฐ๋Šฅ


           โ€ข ์ธ์ฆ๋˜์ง€ ์•Š์€ ์ ‘์†์— ๋Œ€ํ•œ ์„ธ์…˜ ์ฐจ๋‹จ ๋ฐ ์‹ค์‹œ๊ฐ„ ๊ฒฝ๊ณ  ๊ธฐ๋Šฅ
 ์ ‘์† ๋ฐ
           โ€ข ์˜ค๋ธŒ์ ํŠธ์— ๋Œ€ํ•œ ๊ถŒํ•œ ์„ค์ • ๋ฐ ์ฐจ๋‹จ ๊ธฐ๋Šฅ
 ๊ถŒํ•œ ์ œ์–ด
           โ€ข ์‚ฌ์šฉ์ž๋ณ„ ์‚ฌ์šฉ ๊ฐ€๋Šฅ ๋ช…๋ น์–ด๋ฅผ ์ œํ•œ


           โ€ข SQL ๋ฌธ ๊ฐ์‹œ
 ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ
           โ€ข ์‹คํ–‰๋œ SQL๋ฌธ/์‹คํ–‰์‹œ๊ฐ„/์‚ฌ์šฉ์ž/์‹œ๊ฐ„๋Œ€ ๋ณ„ ๊ฒ€์ƒ‰ ๋ฐ ์ถ”์ 
 ์ด๋ ฅ๊ด€๋ฆฌ
           โ€ข ์ ‘์† ์„ธ์…˜ ๋ฐ ์‹คํ–‰ ๋ช…๋ น์–ด ๋ณ„ ์ด๋ ฅ ๊ด€๋ฆฌ


 ๋ณด์•ˆ์ •์ฑ… ๊ด€๋ฆฌ   ์šฉ์ดํ•œ ์ •์ฑ…์„ค์ • ๋ฐ ๋ฐ˜์˜



 ๊ฒฐ์žฌ๊ด€๋ฆฌ      ์ค‘์š” SQL ๋ช…๋ น์— ๋Œ€ํ•œ ์‚ฌ์ „/์‚ฌํ›„ ์Šน์ธ(๊ฒฐ์žฌ) ๊ธฐ๋Šฅ


           โ€ข ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๋‚ด๋ถ€ ํ†ต์ œ
 ๊ธฐํƒ€        โ€ข ์—ฌ๋Ÿฌ ์œ ํ˜•์˜ DBMS ํ†ตํ•ฉ ๋ชจ๋‹ˆํ„ฐ๋ง
           โ€ข ํŠน์ • Data, Field์— ๋Œ€ํ•œ Masking ๊ธฐ๋Šฅ



                                -4-          ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DB๋ณด์•ˆ ์†”๋ฃจ์…˜ ์ ์šฉ์˜ ์ ‘๊ทผ๋ฐฉ์•ˆ

๏ฑ ์„ฑ๋Šฅ
  โ€“ ๋…ผ๋ž€์ด ์—ฌ์ง€ ๋งŽ์Œ, ๋Œ€์ฒด๋กœ ์†Œ๊ทœ๋ชจ ์‚ฌ์ดํŠธ์—์„œ ์„ฑ๊ณต Reference ์ถœํ˜„
  โ€“ ๋Œ€๊ทœ๋ชจ ์‚ฌ์ดํŠธ๋Š” ๋ณ„๋„์˜ ์ ‘๊ทผ ํ•„์š”


๏ฑ ๊ฐ€๊ฒฉ
  โ€“ BPR ์ˆ˜ํ–‰์œผ๋กœ ๋Œ€์ƒ์‹œ์Šคํ…œ ์ตœ์†Œํ™”
  โ€“ Master DB ๋ฐ Virtual Identifier๋ฅผ ์ด์šฉํ•œ ๊ตฌํ˜„


๏ฑ ์šด์˜/์ดํ–‰
  โ€“ ๊ฐ์‹œ๊ฐ€ ํž˜๋“ค๋‹ค๋ฉด ์—†๋А๋‹ˆ๋งŒ ๋ชปํ•˜๋‹ค. (ํŠนํžˆ Gatewayํ˜• ์ ‘๊ทผํ†ต์ œ)
  โ€“ BPR ์ˆ˜ํ–‰์œผ๋กœ ํ”„๋กœ์„ธ์Šค ๋ฐ ๋Œ€์ƒ์‹œ์Šคํ…œ์„ ์ตœ์ ํ™”ํ•˜๋Š” ๊ณผ์ •์„ ๋ณ‘ํ–‰
  โ€“ CTO, CSO๋ฅผ ์ ๊ทน์ ์œผ๋กœ ์ด์šฉ




                                     -5-     ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
2-3. DLP

                             Preview

           ํ•ญ๋ชฉ                        ์ƒ์„ธ๋‚ด์—ญ

           ๊ฐœ์š”    ๊ธฐ๋ฐ€ ๋ฐ์ดํ„ฐ ์œ ์ถœ์˜ ๊ฐ์‹œ/๊ธฐ๋ก/์œ ์ถœ ์ฐจ๋‹จ ์†”๋ฃจ์…˜

       ๊ธฐ์ถœ์—ฌ๋ถ€
     ๊ด€๋ จKeyWord

      ์ถ”์ฒœ์‚ฌ์ดํŠธ



      ๊ธฐ์ˆ ๋ฐœ์ „
                 PC๋ฐฉํ™”๋ฒฝ๏ƒ PC๋ณด์•ˆ ์†”๋ฃจ์…˜๏ƒ DLP
      RoadMap



                 ์†”๋ฃจ์…˜ ํ•œ๊ณ„์™€ ์ ์šฉ์ƒ์˜ ๋ฌธ์ œ์ ์— ๋งŽ์€ ์ƒ๊ฐ ํ•„์š”
           ๊ธฐํƒ€
                 ๋งˆ์ผ€ํŒ…์šฉ์–ด์— ํ˜„ํ˜น๋˜์ง€ ๋ง๊ณ  ๊ธฐ์ˆ ์˜ ์—ฐ์žฅ์„ ์„ ๋จผ์ € ํŒŒ์•…ํ•  ๊ฒƒ




                               -6-            ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DLP(Data Loss Prevention)
 ๏ฑ ๊ฐœ๋…
   โ€“ ์‚ฌ์šฉ์ž์˜ PC์—์„œ ๊ธฐ์—… ๋‚ด ๊ธฐ๋ฐ€ ๋ฐ์ดํ„ฐ๊ฐ€ ์™ธ๋ถ€๋กœ ๋ฐ˜์ถœ๋˜๋Š” ๊ฒƒ์„ ํ•ญ์‹œ โ€˜๊ฐ์‹œํ•˜๊ณ  ๊ธฐ๋กํ•˜๋ฉฐโ€™, ์ •์ฑ…์— ๋”ฐ๋ผ
     ์œ ์ถœ์„ ์ฐจ๋‹จ์‹œํ‚ค๋Š” ๊ฒƒ์„ ์ฃผ๊ธฐ๋Šฅ์œผ๋กœ ๊ตฌํ˜„ํ•œ ์†”๋ฃจ์…˜
 ๏ฑ ๋ถ€๊ฐ๋ฐฐ๊ฒฝ
   โ€“ ๊ธฐ์กด PC๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ํ•œ๊ณ„์„ฑ
   โ€“ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๋ฒ• ๋“ฑ Compliance์˜ ๊ฐ•ํ™”
 ๏ฑ ๊ฐœ๋…๊ตฌ์„ฑ๋„ ๋ฐ ๊ธฐ๋Šฅ
   โ€“ ๊ฐœ๋…๊ตฌ์„ฑ๋„
            Data Classification     Content Tracking                Data Loss Prevention
          (Enforce Tagging Rules)    (M aintain Tags)              (Enforce Reaction Rules)



                      ์„œ๋ฒ„์—์„œ ๋ณต์‚ฌ๋œ
                        ๋ฐ์ดํ„ฐ                                      Emails
                                    Endpoint
                                    DLPํ˜ธ์ŠคํŠธ๋Š” ์›๋ณธ ์ž๋ฃŒ๊ฐ€               ์›น ์—…๋กœ๋“œ
                        ๋กœ์ปฌ          ๋ณ€๊ฒฝ๋˜๊ฑฐ๋‚˜ ํฌ๋ฉง ๋ณ€ํ™˜์ด               (์›น๋ฉ”์ผ, ํฌํƒˆ)
                     ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์—์„œ       ๋˜์–ด๋„ ์ง€์†์ ์ธ ๋ณดํ˜ธ
                      ์ƒ์„ฑ๋œ ๋ฐ์ดํ„ฐ       ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•จ.

                                     โ€ข ์ด๋ฆ„ ๋ณ€๊ฒฝ
                                     โ€ข ํŒŒ์ผ ํฌ๋ฉง ๋ณ€๊ฒฝ                   ์ธ์‡„
                      ์‚ฌ์šฉ์ž์— ์˜ํ•ด        โ€ข ๋‹ค๋ฅธ ๋ฌธ์„œ๋กœ ๋‚ด์šฉ ๋ณต์‚ฌ
                     ์ƒ์„ฑ๋œ ๋ฌธ์„œ ํŒŒ์ผ       โ€ข ๋ฌธ์„œ๋ฅผ ์••์ถ•(Zipโ€ฆ)
                                     โ€ข ๋ฌธ์„œ ์•”ํ˜ธํ™”(Encr ypt ion)   Removable media




                                             -7-                       ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DLP(Data Loss Prevention)
   โ€“ ๊ธฐ๋Šฅ

          ๊ตฌ๋ถ„                                     ๊ธฐ๋Šฅ
                 ํŒŒ์ผ ์ €์žฅ ์œ„์น˜ ๋ณ„ ๋ถ„๋ฅ˜ โ€“ ํŒŒ์ผ์„œ๋ฒ„ ํŠน์ •ํด๋”
                 Contents์— ๋”ฐ๋ฅธ ๋ถ„๋ฅ˜ โ€“ ํ‚ค์›Œ๋“œ, ์ž„๊ณ„์น˜ ๋“ฑ
      Data ๋ถ„๋ฅ˜    ํŒŒ์ผ ์œ ํ˜•์— ๋”ฐ๋ฅธ ๋ถ„๋ฅ˜ โ€“ ํ™•์žฅ์ž, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜
                 Fingerprint
                 ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๋ณตํ•ฉ ๊ธฐ์ค€ ๋ถ„๋ฅ˜
                 USB ๋ฉ”๋ชจ๋ฆฌ ๋“ฑ ๋ชจ๋“  ๋ฌผ๋ฆฌ์  ์žฅ์น˜
                 ๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰์— ๋”ฐ๋ฅธ ์™ธ๋ถ€ ๋ณต์‚ฌ์ œ์–ด
                 ์ธ์‡„ ๋ชจ๋‹ˆํ„ฐ๋ง ๋˜๋Š” ์ฐจ๋‹จ
                 ๋ณต์‚ฌ & ๋ถ™์—ฌ ๋„ฃ๊ธฐ ํ™”๋ฉด ์บก์ฒ˜
     Data ์œ ์ถœ๋ฐฉ์ง€   ๋ฉ”์ผ ํด๋ผ์ด์–ธํŠธ๋ฅผ ํ†ตํ•œ ์œ ์ถœ ์ฐจ๋‹จ
                 ๋„คํŠธ์›Œํฌ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ํ†ตํ•œ ์œ ์ถœ ๋ฐฉ์ง€
                 ์œˆ๋„์šฐ ์ œ๊ณต ๋„คํŠธ์›Œํฌ ๊ฒฝ๋กœ์ฐจ๋‹จ
                 ์›น ๋ธŒ๋ผ์šฐ์ €๋ฅผ ํ†ตํ•œ ์›น ํฌ์ŠคํŒ… ์ฐจ๋‹จ
                 ์™ธ๋ถ€ ์›น ๋ฉ”์ผ ์‚ฌ์šฉ์‹œ ์ฐจ๋‹จ
                 Forensic ๋กœ๊ทธ ๋ฐ ๋ถ„์„
      ๊ฐ€์‹œ์„ฑ ํ™•๋ณด
                 ์œ ์ถœ ์‹œ๋„ ์ฆ๊ฑฐ๋ฌผ ์ˆ˜์ง‘ (Automatic Evidence Collection)
                 ์‹ค์‹œ๊ฐ„ ๊ฒฝ๊ณ  (POP-UP MESSAGE)
          ๊ธฐํƒ€     Bypass ์˜ต์…˜
                 ์ •์ฑ… ์˜ˆ์™ธ ์„ค์ •




                                       -8-                      ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
DLP(Data Loss Prevention)
   โ€“ ํ•ต์‹ฌ๊ธฐ๋Šฅ์ธ Data ๋ถ„๋ฅ˜๊ธฐ๋ฒ•์˜ ์ข…๋ฅ˜



            By location      โ€ข ํŒŒ์ผ์„œ๋ฒ„, ํŠน์ • ํด๋”, ๊ณต์œ  ๋“œ๋ผ์ด๋ธŒ, PCโ€ฆ



                             โ€ข ํ‚ค์›Œ๋“œ, ์ •๊ทœ์‹(์ฃผ๋ฏผ๋ฒˆํ˜ธ, ์‚ฌํšŒ๋ณด์žฅ๋ฒˆํ˜ธ ๋“ฑ)
            By content
                             โ€ข thresholds(ex: ์ฃผ๋ฏผ๋ฒˆํ˜ธ 100๊ฐœ ์ด์ƒ)


            By file-type     โ€ข ํŠน์ • ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋ณ„ ๋ฐ์ดํ„ฐ(doc, xls, SAP,
                               BusinessObjectsโ€ฆ)
                             โ€ข Third Party ํ˜‘๋ ฅ์ฒด๊ณ„ ์ค‘์š”

            By fingerprint   โ€ข Hash๊ฐ’์„ ์ด์šฉํ•œ digital signature
                             โ€ข ์—…์ฒด๋ณ„ ๊ตฌํ˜„๋ฐฉ์‹ ์ƒ์ด

 ๏ฑ ๋„์ž… ๊ณ ๋ ค์‚ฌํ•ญ
   โ€“ ๊ธฐ์กด ๋ณด์•ˆ Policy์™€์˜ ๊ด€๊ณ„, End Userํ™˜๊ฒฝ๊ณผ์˜ ์กฐํ™”
   โ€“ ์†”๋ฃจ์…˜์˜ ํ•œ๊ณ„์„ฑ ๋ฐ ๊ธฐ๋Œ€์ˆ˜์ค€์˜ ์„ค์ •
   โ€“ ์„ค์น˜์œจ ์ œ๊ณ ์˜ ๋ฌธ์ œ


                                   -9-                ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
Access Control
&
Authentication
Authorization
Accounting




                 - 10 -   ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
3-1. MAC/DAC/MLS

                                   Preview

        ํ•ญ๋ชฉ                                    ์ƒ์„ธ๋‚ด์—ญ

        ๊ฐœ์š”       ๊ธฐํƒ€ ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ

      ๊ธฐ์ถœ์—ฌ๋ถ€
     ๊ด€๋ จKeyWord   Secure OS

     ์ถ”์ฒœ์‚ฌ์ดํŠธ       http://www.kangho.com/exploit/SEC/2-acessControl.html



      ๊ธฐ์ˆ ๋ฐœ์ „
      RoadMap



                 ๊ธฐํƒ€ ์—ฌ๋Ÿฌ๊ฐ€์ง€ ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ์ด ํ•™์ˆ ์  ์ฐจ์›์—์„œ ๋ฐœํ‘œ๋˜์—ˆ์œผ๋‚˜ ์ฑ„ํƒ๋œ
        ๊ธฐํƒ€
                 ๊ฒƒ์€ ๊ฑฐ์˜ ์—†์Œ.




                                     - 11 -                 ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
MAC/DAC/MLS

๏ฑ MAC (Mandatory Access Control)
   โ€“ ์›๋ฆฌ: ์ฃผ์ฒด๋Š” ์ธ๊ฐ€ ๋ ˆ์ด๋ธ”, ๊ฐ์ฒด๋Š” ๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰(๋ฏผ๊ฐ๋„ ๋ ˆ์ด๋ธ”)์— ์˜ํ•ด ์ ‘๊ทผํ—ˆ๊ฐ€ ๊ฒฐ์ •
       โ€ข ์ฃผ์ฒด๋Š” ๊ทธ๋ฃน/๋„๋ฉ”์ธ๋„ ๊ฐ€๋Šฅ
       โ€ข ์ธ๊ฐ€>๋ถ„๋ฅ˜: Access
       โ€ข ์ธ๊ฐ€<๋ถ„๋ฅ˜: Deny
   โ€“ ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์ค‘์•™๊ด€๋ฆฌ(DAC์— ๋น„ํ•ด ์œ ์—ฐ์„ฑ์€ ๋–จ์–ด์ง)
       โ€ข ๊ตฐ๋Œ€ ๋“ฑ ๋ณต์žก์„ฑ/๋น„์šฉ์— ๋ฏผ๊ฐํ•˜์ง€ ์•Š์€ ๊ณณ์—์„œ ์‚ฌ์šฉ
   โ€“ ์˜ˆ: BLP(Bell-LaPadulla)๋ชจ๋ธ, Biba๋ชจ๋ธ, MLS
       โ€ข Linux(Suse Linux, SELinux..)
       โ€ข Vista/Server2008
       โ€ข FreeBSD


๏ฑ DAC (Discretionary Access Control)
   โ€“ ๋ณด์•ˆ๊ด€๋ฆฌ์ž/๊ฐ์ฒด์†Œ์œ ์ž๊ฐ€ โ€˜์š”์ฒญ์ฃผ์ฒดโ€™์˜ ์‹ ์›์— ๋”ฐ๋ผ ์ ‘๊ทผ๊ถŒํ•œ์„ ๊ฒฐ์ •ํ•จ
       โ€ข ์˜ˆ: ์ธ์‚ฌDB ์ ‘๊ทผ๊ถŒํ•œ์€ ์ธ์žฌ๊ฐœ๋ฐœํŒ€์—์„œ ๊ฒฐ์ •ํ•˜๋ฉฐ โ€˜์ธ์‚ฌ๊ด€๋ จ๋ถ€์„œโ€™๋Š” read๊ถŒํ•œ์„, โ€˜
          ๋‚˜๋จธ์ง€ ๋ถ€์„œโ€™๋Š” ์ ‘๊ทผ์„ ๋ถˆํ—ˆํ•œ๋‹ค.
   โ€“ Access Matrix(Capability List, ACL)๋ชจ๋ธ, Take-Grant๋ชจ๋ธ, Action-Entity๋ชจ๋ธ

  โ€ข๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰ ์˜ˆ: public, confidential, secret, top secret
  โ€ข๋ณด์•ˆ ์ทจ๊ธ‰ ํ—ˆ๊ฐ€ ๋ผ๋ฒจ ์˜ˆ: ์ธ์‚ฌ์ •๋ณด ์—ด๋žŒ์„ ์œ„ํ•ด Secret ์ด์ƒ์˜ ๋“ฑ๊ธ‰์ด ํ•„์š”ํ•จ


                                                 - 12 -     ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
MAC/DAC/MLS

๏ฑ MLS (Multi-Level Security)
   โ€“   ์ฃผ์ฒด/๊ฐ์ฒด๋Š” ํ”„๋กœ์„ธ์Šค, ํŒŒ์ผ, ์‚ฌ์šฉ์ž, ํฌํŠธ๋ฒˆํ˜ธ ๋“ฑ ์ปดํ“จํ„ฐ์—์„œ ๊ตฌ๋ถ„ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ๊ฒƒ์ด ํ•ด๋‹น๋จ
   โ€“   ๊ตฌํ˜„์—ฌ๋ถ€๋Š” ๊ตฌํ˜„์ž๊ฐ€ ๊ฒฐ์ •
   โ€“   DAC/MAC ๋™์‹œ์ ์šฉ ์‹œ ์ƒ๊ธธ ์ˆ˜ ์žˆ๋Š” ๋…ผ๋ฆฌ์  ๋ชจ์ˆœํ˜„์ƒ ํ•ด๊ฒฐ ๊ฐ€๋Šฅ
   โ€“   http://www.centos.org/docs/5/html/Deployment_Guide-en-US/sec-mls-ov.html




            ๏ƒ˜No Read Up, No Write Down
              โ€ข No Read up: Confidentiality ์œ ์ง€ ๋ชฉ์ 
              โ€ข No Write Down: Integrity ์œ ์ง€ ๋ชฉ์ 




                                            - 13 -             ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
3-2. RBAC

                                   Preview

        ํ•ญ๋ชฉ                                    ์ƒ์„ธ๋‚ด์—ญ

        ๊ฐœ์š”       ๊ฐ€์žฅ ์ผ๋ฐ˜์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ

      ๊ธฐ์ถœ์—ฌ๋ถ€       92
     ๊ด€๋ จKeyWord   ๋ฐ์ดํ„ฐ ์ถ”์ƒํ™”

      ์ถ”์ฒœ์‚ฌ์ดํŠธ      http://www.kangho.com/exploit/SEC/2-acessControl.html



      ๊ธฐ์ˆ ๋ฐœ์ „
      RoadMap



        ๊ธฐํƒ€




                                     - 14 -                 ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
RBAC (Role Based Access Control)

 ๏ฑ ๊ฐœ๋…
   โ€“ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ๋œ ์—ญํ• ์— ๊ทผ๊ฑฐํ•˜์—ฌ ์ ‘๊ทผํ†ต์ œ๋ฅผ ์‹ค์‹œํ•˜๋Š” ๋ฐฉ๋ฒ•
   โ€“ ๊ธฐ์กด ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ์˜ ๋ถˆ์™„์ „ํ•จ์—์„œ ์ถœ๋ฐœ
       โ€ข MAC: ๋“ฑ๊ธ‰ ์„ค์ •์ด ๋ชจํ˜ธํ•œ ๊ฒฝ์šฐ์— ์ ์šฉ๋ถˆ๊ฐ€
       โ€ข DAC: ๊ถŒํ•œํ‘œํ˜„, ๊ด€๋ฆฌ์„ฑ์˜ ๊ฐœ์„  ํ•„์š”



                    2. ๋ฐฐ์ •                      1. ๋ฐฐ์ •
        ์‚ฌ์šฉ์ž(U)                      ์—ญํ• (R)                  ๊ถŒํ•œ(P)




                      ์„ธ์…˜(S)

                                              Object
                    3. Access


 ๏ฑ RBAC ์˜ ํŠน์„ฑ
   โ€“   ๊ด€๋ฆฌ ํšจ์œจ์„ฑ, ์ƒ์†๊ฐ€๋Šฅ, Least Privilege ๊ตฌํ˜„ ๊ฐ€๋Šฅ
   โ€“   ์ž„๋ฌด๋ถ„๋ฆฌ: ์ƒํ˜ธ๊ฐ์‹œ ๊ฐ€๋Šฅ
   โ€“   Data ์ถ”์ƒํ™”: OS RWED์™ธ ์ถ”์ƒํ™” ๊ฐ€๋Šฅ(์ž…๊ธˆ, ์ถœ๊ธˆ ๋“ฑ)
   โ€“   ๊ฐ์ฒด๋ถ„๋ฅ˜: ์ˆ˜ํ–‰์—…๋ฌด์— ๋”ฐ๋ผ ์‚ฌ์šฉ์ž๋ถ„๋ฅ˜, ๊ถŒํ•œ์ œํ•œ ๊ตฌํ˜„ ๊ฐ€๋Šฅ



                                     - 15 -            ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
RBAC (Role Based Access Control)

 ๏ฑ RBAC์˜ ํ™œ์šฉ
   โ€“ ์ƒ์šฉSW ๊ฑฐ์˜ ๋Œ€๋ถ€๋ถ„
   โ€“ DBMS, OS, CORBAโ€ฆ
   โ€“ Web ๊ธฐ๋ฐ˜ Application๋„ ํ™œ๋ฐœํ•˜๊ฒŒ ์‚ฌ์šฉ
 ๏ฑ RBAC ๊ตฌํ˜„ ์˜ˆ

        USER           ROLE             Permission     ์‚ฌ์šฉ์ž ๋ฐฐ์ •

       U1: IRON       R1: Admin             R           U1 : R1

                      R2: Owner             W

                                            D




                                   - 16 -            ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
3-3. AAA

                                Preview

           ํ•ญ๋ชฉ                               ์ƒ์„ธ๋‚ด์—ญ
                 ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ๊ธฐ๋Šฅ์œผ๋กœ ๋‹จ์ˆœํ•œ ํ†ต์‹ ์‚ฌ์—…์ž์˜ AAA๊ฐ€ ์•„๋‹Œ ์ธ์ฆ์Šคํ‚ค๋งˆ ์ „์ฒด๋กœ
           ๊ฐœ์š”
                 ๊ฐœ๋…ํ™•์žฅ ํ•„์š”

       ๊ธฐ์ถœ์—ฌ๋ถ€
     ๊ด€๋ จKeyWord   Radius, Diameter (์ตœ์†Œ์˜๋ฏธ AAA๊ธฐ์ค€)

      ์ถ”์ฒœ์‚ฌ์ดํŠธ



      ๊ธฐ์ˆ ๋ฐœ์ „
                 ๋‹จ์ˆœ/๋น„์‹ ๋ขฐ๏ƒ ๋ณต์žก/์‹ ๋ขฐ/๊ธฐ์ˆ ํ™˜๊ฒฝ๋ณ€ํ™” ์ˆ˜์šฉ
      RoadMap



           ๊ธฐํƒ€




                                   - 17 -          ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
AAA(Authentication/Authorization/Accounting)

 ๏ฑ ๊ฐœ์š”
     โ€“ ์‚ฌ์šฉ์ž ์‹ ์›์˜ ํ™•์ธ๏ƒ ์„œ๋น„์Šค๊ถŒํ•œ๋ถ€์—ฌ๏ƒ ๊ณผ๊ธˆ/๊ฐ์‚ฌ
     โ€“ ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ, ์„œ๋น„์Šค/ํ†ต์ œ ์‹œ ์„ธ๊ฐ€์ง€ ์ค‘ ํ•œ๊ฐ€์ง€ ์ด์ƒ ๋ฐ˜๋“œ์‹œ ํ•„์š”
 ๏ฑ ์ฃผ์š” ๊ธฐ๋Šฅ
     โ€“ Authentication: ์ธ์ฆ ์š”๊ตฌ์ž ๋‹น์‚ฌ์ž์˜ ์ฆ๋ช…, id/password/์ƒ์ฑ„์ธ์‹/Smart Card ๋“ฑ
     โ€“ Authorization: ์‚ฌ์šฉ์ž ์š”๊ตฌ์ž‘์—…์˜ ํ—ˆ์šฉ์—ฌ๋ถ€ ๊ฒฐ์ •
     โ€“ Accounting: ์‚ฌ์šฉ์ž ์‚ฌ์šฉ๋‚ด์—ญ์˜ Audit
 ๏ฑ ์ฃผ์š” ์ธ์ฆ ํ”„๋กœํ† ์ฝœ
     โ€“ Radius
        โ€ข UDP๊ธฐ๋ฐ˜, C/S, ์ €๋ณ€์ด ๋„“์Œ
        โ€ข ๋ณด์•ˆ/Fail Over๊ธฐ๋Šฅ ์•ฝํ•จ
        โ€ข ๊ณผ๊ธˆ ์‹œ ํŒจํ‚ท ์†์‹ค ๊ฐ€๋Šฅ
     โ€“ TACACS+
        โ€ข TCP๊ธฐ๋ฐ˜, CISCO, C/S
        โ€ข ๋ณด์•ˆ๊ฐ•ํ™”, CISCO NW๊ธฐ๊ธฐ ์ธ์ฆ์— ์ฃผ๋กœ ์‚ฌ์šฉ
     โ€“ Diameter
        โ€ข TCP/SCTP๊ธฐ๋ฐ˜, P2P
        โ€ข ๋ณด์•ˆ๊ฐ•ํ™” (IPSEC/TLS), ๋›ฐ์–ด๋‚œ ํ™•์žฅ์„ฑ
        โ€ข Mobile IP(Roaming), Fail Over, ๋ฉ”์‹œ์ง€ ์ฒ˜๋ฆฌ๊ธฐ๋Šฅ ํ–ฅ์ƒ




                                               - 18 -        ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
AAA(Authentication/Authorization/Accounting)

 ๏ฑ AAA์˜ ํ™œ์šฉ
     โ€“ AAA์†”๋ฃจ์…˜: ISP์œ„์ฃผ์˜ ์‚ฌ์šฉ
     โ€“ ์ผ๋ถ€ ์‚ฌ์šฉ: ์ผ๋ฐ˜ SW๋ณด์•ˆ, IAM/EAM ๋“ฑ ๊ฐœ๋…์Šน๊ณ„
 ๏ฑ ํ–ฅํ›„์ „๋ง
     โ€“ IPv6๋Œ€๋น„, Radiusํ™•์žฅ
     โ€“ Diameter๋กœ์˜ ๋Œ€๊ฐœ์ฒด (๊ณผ๊ธˆ/๋ณด์•ˆ/802.1x/NASRAQ/EAP/PKI์ง€์› ๋“ฑ ์‹ ๊ธฐ๋Šฅ ํ’๋ถ€)
 ๏ฑ Diameter

     Cellular               ACR          Diameter ์‘์šฉ     ๋‹ค์–‘ํ•œ AAA์„œ๋น„์Šค
                   RAS
     Phone

                                         Diameter base   ํ”„๋กœํ† ์ฝœ์˜ ๊ตฌ์กฐ์  ํ™•์žฅ
    Fixed Phone
        VoIP             ๊ฐ์ข… GW           ํ•˜๋ถ€์ „์†ก๊ณ„์ธต
     Set-top Box


                            Peer1              Peer2




                                      - 19 -                ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€

More Related Content

PDF
๋ณด์•ˆ์„ธ๋ฏธ๋‚˜ 1 db๋ณด์•ˆ, ์ทจ์•ฝ์  ๋ถ„์„ why how when 20121025
PDF
๋””์ง€ํ„ธ๊ฐ€๋””์–ธ(Digital Guardian)
PDF
Hillstone networks utm 2016๋…„
PDF
Apani ์†Œ๊ฐœ์ž๋ฃŒ 20110713
PDF
ClouDoc Intro (Korean)
PDF
ClouDoc brochure_kor_20160630
PDF
๊ฐ€๋“œ์กด ์ œ์•ˆ์„œ_์‹œ์˜จ์‹œํ๋ฆฌํ‹ฐ
PDF
App check pro_ํ‘œ์ค€์ œ์•ˆ์„œ_z
๋ณด์•ˆ์„ธ๋ฏธ๋‚˜ 1 db๋ณด์•ˆ, ์ทจ์•ฝ์  ๋ถ„์„ why how when 20121025
๋””์ง€ํ„ธ๊ฐ€๋””์–ธ(Digital Guardian)
Hillstone networks utm 2016๋…„
Apani ์†Œ๊ฐœ์ž๋ฃŒ 20110713
ClouDoc Intro (Korean)
ClouDoc brochure_kor_20160630
๊ฐ€๋“œ์กด ์ œ์•ˆ์„œ_์‹œ์˜จ์‹œํ๋ฆฌํ‹ฐ
App check pro_ํ‘œ์ค€์ œ์•ˆ์„œ_z

What's hot (20)

PDF
์‹œํ์–ด๋””์Šคํฌ ECM
PDF
Clou doc intro_kor_20160524
PDF
201412 epp mdm_์‹œ์˜จ
PDF
201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ
PDF
2014 mdlp ๋…ธํŠธ๋ถ๋ถ„์‹ค๋Œ€์‘ํฌํ•จ
PDF
๋‚ด๋ถ€์ž์ •๋ณด์œ ์ถœ๋ฐฉ์ง€ : ์—”๋“œํฌ์ธํŠธ ํ†ตํ•ฉ๋ณด์•ˆ
PDF
cloud security trend and case
ย 
PDF
Talk IT_ CA_์กฐ์ƒ์›_110930
ย 
PDF
ํ™”๋ฉด ์บก์ณ ๋ฐฉ์ง€ ์†”๋ฃจ์…˜
PPTX
02. it์ •๋ณดํ™”์ „๋žต-๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ๋„์ž…
PDF
์ด์šฉ์ž ์ž…๋ ฅ๋‹จ ๋ณด์•ˆ์†”๋ฃจ์…˜ (Non-ActiveX ๊ธฐ๋ฐ˜)
PDF
2014 pf filter ๊ฐœ์ธ์ •๋ณด_์‹œ์˜จ
PDF
Guardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
PDF
์ •๋ณด๋ณดํ˜ธ์ฒด๊ณ„ ์ œ์–ธ
PDF
Sua ๊ฐ•์˜์ž๋ฃŒ 2์ฃผ์ฐจ_๊ด€๋ฆฌ์ฒด๊ณ„(2014.03.18)_์ตœ์ข…
PDF
์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z
PPT
141224 ์ •๋ณด๋ณดํ˜ธ summit ํ‚ค๋…ธํŠธ v1.03 ๋ฐœํ‘œ
PPTX
IT์ „๋žต๊ณ„ํš-04.๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜
PDF
Cloud security & apani
PDF
์ƒˆ๋„์šฐํฌ๋ธŒ drm
์‹œํ์–ด๋””์Šคํฌ ECM
Clou doc intro_kor_20160524
201412 epp mdm_์‹œ์˜จ
201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ
2014 mdlp ๋…ธํŠธ๋ถ๋ถ„์‹ค๋Œ€์‘ํฌํ•จ
๋‚ด๋ถ€์ž์ •๋ณด์œ ์ถœ๋ฐฉ์ง€ : ์—”๋“œํฌ์ธํŠธ ํ†ตํ•ฉ๋ณด์•ˆ
cloud security trend and case
ย 
Talk IT_ CA_์กฐ์ƒ์›_110930
ย 
ํ™”๋ฉด ์บก์ณ ๋ฐฉ์ง€ ์†”๋ฃจ์…˜
02. it์ •๋ณดํ™”์ „๋žต-๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ๋„์ž…
์ด์šฉ์ž ์ž…๋ ฅ๋‹จ ๋ณด์•ˆ์†”๋ฃจ์…˜ (Non-ActiveX ๊ธฐ๋ฐ˜)
2014 pf filter ๊ฐœ์ธ์ •๋ณด_์‹œ์˜จ
Guardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
์ •๋ณด๋ณดํ˜ธ์ฒด๊ณ„ ์ œ์–ธ
Sua ๊ฐ•์˜์ž๋ฃŒ 2์ฃผ์ฐจ_๊ด€๋ฆฌ์ฒด๊ณ„(2014.03.18)_์ตœ์ข…
์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z
141224 ์ •๋ณด๋ณดํ˜ธ summit ํ‚ค๋…ธํŠธ v1.03 ๋ฐœํ‘œ
IT์ „๋žต๊ณ„ํš-04.๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜
Cloud security & apani
์ƒˆ๋„์šฐํฌ๋ธŒ drm
Ad

Viewers also liked (15)

PPSX
[INFOREVER] ์‹œํ๋ฆฌํ‹ฐ ํ”„๋ ˆ์ž„์› #6
PDF
์„œ์šธ์—ด๋ฆฐ๋ฐ์ดํ„ฐ๊ด‘์žฅDbํ™œ์šฉ๊ณผ big data
PDF
Label based Mandatory Access Control on PostgreSQL
PDF
์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ํ™˜๊ฒฝ์˜ ๋ฐ์ดํ„ฐ๋ชจ๋ธ ๊ด€๋ฆฌ ๋ฐฉ์•ˆ By ์— ๋ฐ”์นด๋ฐ๋กœ ๋ฐ๋ธŒ๊ธฐ์–ด 2015.12.03
ย 
ODP
1 mysql์•„ํ‚คํ…์ณ v1
PPTX
CouchDB - Introduction - Korean
PPT
Ndc2011 ์„ฑ๋Šฅ ํ–ฅ์ƒ์„_์œ„ํ•œ_๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค_์•„ํ‚คํ…์ณ_๊ตฌ์ถ•_๋ฐ_๊ฐœ๋ฐœ_๊ฐ€์ด๋“œ
PDF
๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์‹œ์Šคํ…œ chapter3_STG๋ฐ•ํ•˜์€
PDF
Sua ์ •๋ณด๋ณดํ˜ธ๊ด€๋ฆฌ์ฒด๊ณ„ ์ตœ์ข…_๊ฐ•์˜๊ต์•ˆ
PDF
H3 2011 ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ์•ฑ ์•„ํ‚คํ…์ณ ๋ฐ ๊ฐœ๋ฐœ๋ฐฉ๋ฒ•
ย 
PPTX
Mongo DB ์„ฑ๋Šฅ์ตœ์ ํ™” ์ „๋žต
PDF
์–ด๋–ป๊ฒŒ ํ•˜๋ฉด ๋ฐ์ดํ„ฐ ์‚ฌ์ด์–ธํ‹ฐ์ŠคํŠธ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋‚˜์š”?
PPTX
์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ์ž ๋กœ๋“œ๋งต
PPTX
Social game programming footage 7 loading and storing via db cache system
PDF
ERD๋ฅผ ์ด์šฉํ•œ DB ๋ชจ๋ธ๋ง
ย 
[INFOREVER] ์‹œํ๋ฆฌํ‹ฐ ํ”„๋ ˆ์ž„์› #6
์„œ์šธ์—ด๋ฆฐ๋ฐ์ดํ„ฐ๊ด‘์žฅDbํ™œ์šฉ๊ณผ big data
Label based Mandatory Access Control on PostgreSQL
์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ํ™˜๊ฒฝ์˜ ๋ฐ์ดํ„ฐ๋ชจ๋ธ ๊ด€๋ฆฌ ๋ฐฉ์•ˆ By ์— ๋ฐ”์นด๋ฐ๋กœ ๋ฐ๋ธŒ๊ธฐ์–ด 2015.12.03
ย 
1 mysql์•„ํ‚คํ…์ณ v1
CouchDB - Introduction - Korean
Ndc2011 ์„ฑ๋Šฅ ํ–ฅ์ƒ์„_์œ„ํ•œ_๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค_์•„ํ‚คํ…์ณ_๊ตฌ์ถ•_๋ฐ_๊ฐœ๋ฐœ_๊ฐ€์ด๋“œ
๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์‹œ์Šคํ…œ chapter3_STG๋ฐ•ํ•˜์€
Sua ์ •๋ณด๋ณดํ˜ธ๊ด€๋ฆฌ์ฒด๊ณ„ ์ตœ์ข…_๊ฐ•์˜๊ต์•ˆ
H3 2011 ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ์•ฑ ์•„ํ‚คํ…์ณ ๋ฐ ๊ฐœ๋ฐœ๋ฐฉ๋ฒ•
ย 
Mongo DB ์„ฑ๋Šฅ์ตœ์ ํ™” ์ „๋žต
์–ด๋–ป๊ฒŒ ํ•˜๋ฉด ๋ฐ์ดํ„ฐ ์‚ฌ์ด์–ธํ‹ฐ์ŠคํŠธ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋‚˜์š”?
์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ์ž ๋กœ๋“œ๋งต
Social game programming footage 7 loading and storing via db cache system
ERD๋ฅผ ์ด์šฉํ•œ DB ๋ชจ๋ธ๋ง
ย 
Ad

Similar to 120515 security framework2.20 (20)

PDF
[๋„ค์ด๋ฒ„D2SF] ์•ˆ์ „ํ•œ ์„œ๋น„์Šค ์šด์˜์„ ์œ„ํ•œ Ncloud ๋ณด์•ˆ๊ต์œก
PPTX
Advanced DQC-S
PPTX
2014 data ๋ณด์•ˆ ๊ฐ€์ด๋“œ๋ผ์ธ ๊ทธ๋žœ๋“œ์ปจํผ๋Ÿฐ์Šค 20140930
PDF
ํด๋ผ์šฐ๋“œ์— ์ตœ์ ํ™”๋œ DB ์ ‘๊ทผ์ œ์–ด ์†”๋ฃจ์…˜ '์ฟผ๋ฆฌํŒŒ์ด(QueryPie) DAC'
PDF
110922 oracle ap
ย 
PDF
ํฌํ‹ฐํŒŒ์ด ์•ˆ์ „ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ตฌ์ถ• ๋ฐ ์šด์˜๋ฐฉ์•ˆ
ย 
PDF
[2016 ๋ฐ์ดํ„ฐ ๊ทธ๋žœ๋“œ ์ปจํผ๋Ÿฐ์Šค] 5 4(๋ณด์•ˆ,ํ’ˆ์งˆ). ๋ฐ”๋„ท์ •๋ณด๊ธฐ์ˆ  ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๋Œ€์‘์„ ์œ„ํ•œ ํšจ์œจ์ ์ธ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ๋ฐฉ์•ˆ
ย 
PDF
์›นํ•„ํ„ฐ ์‹œ์˜จ
PDF
Observability customer presentation samuel-2021-03-30
PDF
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]์ด๊ธฐ์ข… WAS ํด๋Ÿฌ์Šคํ„ฐ๋ง ์†”๋ฃจ์…˜- Athena Dolly
PDF
Azure Databases for PostgreSQL MYSQL and MariaDB
PDF
201412 ๋ฌธ์„œ๋ณด์•ˆ์ œ์•ˆ์„œ ์‹œ์˜จ
PDF
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]์œ ๋‹‰์Šค์˜ ๋ฆฌ๋ˆ…์Šค ๋งˆ์ด๊ทธ๋ ˆ์ด์…˜ ์ „๋žต_v3
PDF
โ€œํด๋ผ์šฐ๋“œ์— ๋ฐฑ์—…ํ•˜๊ณ  ํด๋ผ์šฐ๋“œ๋„ ๋ฐฑ์—…ํ•œ๋‹คโ€ ๋ฉ€ํ‹ฐํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์˜ ๋ฐ์ดํ„ฐ ๊ฐ€์šฉ์„ฑ 120% ํ™•๋ณด ๊ฐ€์ด๋“œ
PDF
Openstack security(2018)
PDF
ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๊ธฐ๋ณธ ์‚ฌํ•ญ (Fundamentals)
PDF
Cross-Platfrom ๊ธฐ๋ฐ˜ Agent ๊ฐœ๋ฐœ
PDF
Pg day seoul 2016 session_02_v1.0_ff
PPTX
MSA(Service Mesh), MDA(Data Mesh), MIA(Inference Mesh) ๊ธฐ์ˆ ๋™ํ–ฅ แ„‰แ…ฉแ„€แ…ข-แ„‡แ…กแ†จแ„†แ…ฎแ†ซแ„€แ…ต@แ„†แ…ฆแ„€...
PDF
KEYRKE - CSAM ํด๋ผ์šฐ๋“œ ๋น„๋ฐ€์ž์‚ฐ๊ด€๋ฆฌ ์†”๋ฃจ์…˜ (Cloud Secret Asset Management)
[๋„ค์ด๋ฒ„D2SF] ์•ˆ์ „ํ•œ ์„œ๋น„์Šค ์šด์˜์„ ์œ„ํ•œ Ncloud ๋ณด์•ˆ๊ต์œก
Advanced DQC-S
2014 data ๋ณด์•ˆ ๊ฐ€์ด๋“œ๋ผ์ธ ๊ทธ๋žœ๋“œ์ปจํผ๋Ÿฐ์Šค 20140930
ํด๋ผ์šฐ๋“œ์— ์ตœ์ ํ™”๋œ DB ์ ‘๊ทผ์ œ์–ด ์†”๋ฃจ์…˜ '์ฟผ๋ฆฌํŒŒ์ด(QueryPie) DAC'
110922 oracle ap
ย 
ํฌํ‹ฐํŒŒ์ด ์•ˆ์ „ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ตฌ์ถ• ๋ฐ ์šด์˜๋ฐฉ์•ˆ
ย 
[2016 ๋ฐ์ดํ„ฐ ๊ทธ๋žœ๋“œ ์ปจํผ๋Ÿฐ์Šค] 5 4(๋ณด์•ˆ,ํ’ˆ์งˆ). ๋ฐ”๋„ท์ •๋ณด๊ธฐ์ˆ  ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๋Œ€์‘์„ ์œ„ํ•œ ํšจ์œจ์ ์ธ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ๋ฐฉ์•ˆ
ย 
์›นํ•„ํ„ฐ ์‹œ์˜จ
Observability customer presentation samuel-2021-03-30
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]์ด๊ธฐ์ข… WAS ํด๋Ÿฌ์Šคํ„ฐ๋ง ์†”๋ฃจ์…˜- Athena Dolly
Azure Databases for PostgreSQL MYSQL and MariaDB
201412 ๋ฌธ์„œ๋ณด์•ˆ์ œ์•ˆ์„œ ์‹œ์˜จ
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]์œ ๋‹‰์Šค์˜ ๋ฆฌ๋ˆ…์Šค ๋งˆ์ด๊ทธ๋ ˆ์ด์…˜ ์ „๋žต_v3
โ€œํด๋ผ์šฐ๋“œ์— ๋ฐฑ์—…ํ•˜๊ณ  ํด๋ผ์šฐ๋“œ๋„ ๋ฐฑ์—…ํ•œ๋‹คโ€ ๋ฉ€ํ‹ฐํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์˜ ๋ฐ์ดํ„ฐ ๊ฐ€์šฉ์„ฑ 120% ํ™•๋ณด ๊ฐ€์ด๋“œ
Openstack security(2018)
ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๊ธฐ๋ณธ ์‚ฌํ•ญ (Fundamentals)
Cross-Platfrom ๊ธฐ๋ฐ˜ Agent ๊ฐœ๋ฐœ
Pg day seoul 2016 session_02_v1.0_ff
MSA(Service Mesh), MDA(Data Mesh), MIA(Inference Mesh) ๊ธฐ์ˆ ๋™ํ–ฅ แ„‰แ…ฉแ„€แ…ข-แ„‡แ…กแ†จแ„†แ…ฎแ†ซแ„€แ…ต@แ„†แ…ฆแ„€...
KEYRKE - CSAM ํด๋ผ์šฐ๋“œ ๋น„๋ฐ€์ž์‚ฐ๊ด€๋ฆฌ ์†”๋ฃจ์…˜ (Cloud Secret Asset Management)

More from skccsocial (6)

PPSX
130308 แ„ƒแ…ตแ„Œแ…ตแ„แ…ฅแ†ฏแ„แ…ฅแ†ซแ„‡แ…ฅแ„Œแ…งแ†ซแ„‰แ…ณi 2แ„€แ…ญแ„‰แ…ต
PPSX
130122 แ„ƒแ…ตแ„Œแ…ตแ„แ…ฅแ†ฏแ„แ…ฅแ†ซแ„‡แ…ฅแ„Œแ…งแ†ซแ„‰แ…ณi 1แ„€แ…ญแ„‰แ…ต
PPSX
๊ธฐ์ˆ ์‚ฌ์ˆ˜๊ฒ€์ „๋žต3
PPSX
security framework2.20
PPSX
security framework2.20
PPSX
Security framework2
130308 แ„ƒแ…ตแ„Œแ…ตแ„แ…ฅแ†ฏแ„แ…ฅแ†ซแ„‡แ…ฅแ„Œแ…งแ†ซแ„‰แ…ณi 2แ„€แ…ญแ„‰แ…ต
130122 แ„ƒแ…ตแ„Œแ…ตแ„แ…ฅแ†ฏแ„แ…ฅแ†ซแ„‡แ…ฅแ„Œแ…งแ†ซแ„‰แ…ณi 1แ„€แ…ญแ„‰แ…ต
๊ธฐ์ˆ ์‚ฌ์ˆ˜๊ฒ€์ „๋žต3
security framework2.20
security framework2.20
Security framework2

120515 security framework2.20

  • 1. 2-2. DB ๋ณด์•ˆ Preview ํ•ญ๋ชฉ ์ƒ์„ธ๋‚ด์—ญ ๊ฐœ์š” ์›น์— DB๊ฐ€ ์—ฐ๊ฒฐ๋˜๋ฉด์„œ ๋Œ€๋‘๋˜๋Š” ๋ฐ์ดํ„ฐ ์œ ์ถœ๋ฌธ์ œ์— ๋Œ€ํ•œ ๋Œ€์ฑ… ๊ธฐ์ถœ์—ฌ๋ถ€ 92 ๊ด€๋ จKeyWord ์ ‘๊ทผ์ œ์–ด, ์•”ํ˜ธํ™”, Compliance ์ถ”์ฒœ์‚ฌ์ดํŠธ ๊ธฐ์ˆ ๋ฐœ์ „ Crypto Card๊ธฐ๋ฐ˜ ์•”ํ˜ธํ™”๏ƒ ์ ‘๊ทผ์ œ์–ด์†”๋ฃจ์…˜/์•”ํ˜ธํ™” ์†”๋ฃจ์…˜ RoadMap ๊ธฐํƒ€ ์„ฑ๋Šฅ์„ฑ ๋ฌธ์ œ ์‹ฌ๊ฐ -0- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 2. DB๋ณด์•ˆ ๏ฑ ๊ฐœ์š” โ€“ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ์œ„ํ˜‘์œผ๋กœ ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ์ฒด๊ณ„ ๋ฐ ๊ธฐ์ˆ  โ€“ ์ตœ๊ทผ ๊ธฐ์—…๋ฐ์ดํ„ฐ, ๊ฐœ์ธ์ •๋ณด์˜ ์ค‘์š”์„ฑ ๋ฐ Compliance์ฆ๊ฐ€๋กœ ์ด์Šˆํ™” โ€“ DB๋ณด์•ˆ ์š”๊ตฌ์‚ฌํ•ญ: ์ธ์ฆ/์ ‘๊ทผํ†ต์ œ/๊ฐ์‚ฌ ๏ฑ DB๋ณด์•ˆ์˜ ๋ฌธ์ œ์  โ€“ ๋ณด์•ˆ๊ด€๋ฆฌ์ž๋Š” DB๋ฅผ ๋ชจ๋ฅด๊ณ โ€ฆ DB๊ด€๋ฆฌ์ž๋Š” ๋ณด์•ˆ์„ ๋ชจ๋ฅธ๋‹ค. โ€“ DB Vender๋งˆ๋‹ค ๋ณด์•ˆ์ˆ˜์ค€์ด ์ œ ๊ฐ๊ฐ์ž„ โ€“ ์—ฐ๊ด€์ธ, ๋‚ด๋ถ€์ž์— ์˜ํ•œ ๋ฒ”์ฃ„๋ฐœ์ƒ ๋น„์œจ์ด ๋†’์Œ โ€“ ๋ณด์•ˆ๊ฐ•ํ™”์— ๋”ฐ๋ฅธ Performance์ €ํ•˜/๋น„์šฉ์†Œ์š”๊ฐ€ ๋งŽ์Œ ๏ฑ DB๋ณด์•ˆ ๊ด€๋ จ๊ณต๊ฒฉ Domain ๊ด€๋ จ๋‚ด์šฉ ๋„คํŠธ์›Œํฌ ๊ด€๋ จ ๊ณต๊ฒฉ โ€ข DDOS: Stringํˆฌ์ž…์„ ํ†ตํ•œ NW Daemon down (BOF, ์šฐํšŒ) โ€ข NW Daemon์šฐํšŒ ๋ฐ ์ง์ ‘๊ณต๊ฒฉ: ์•”ํ˜ธ์„ค์ •์˜ ์ทจ์•ฝ์„ฑ, ๋‚ด๋ถ€ํŒจํ‚ค์ง€ ๋ณ€ํ˜• ์„ ํ†ตํ•œ ํ•ดํ‚น์ฝ”๋“œ ์‚ฝ์ž… ์ธ์ฆ ํ”„๋กœ์„ธ์Šค ๊ณต๊ฒฉ โ€ข ์‚ฌ์šฉ์ž ์ •๋ณด ๋ณ€ํ˜•: ํ™•์ธ์ ˆ์ฐจ ์ฐจ๋‹จ์„ ํ†ตํ•œ ์ง์ ‘ ์—‘์„ธ์Šค โ€ข ๋ฐฑ๋„์–ด: ๋ฉ”๋ชจ๋ฆฌ์ƒ์ฃผ ํŒจํ‚ค์ง€๋ฅผ ์•…์šฉํ•œ ๋ฐฑ๋„์–ด ์„ค์น˜ SQL, Procedure Injection โ€ข SQL Injection: SQL๋ณ€ํ˜•, ์ฝ”๋“œํˆฌ์ž…, ํ•จ์ˆ˜ํˆฌ์ž…, BOF โ€ข Procedure Injection: Embeded SQL, Cursors, DBMSํŠนํ™”๋œ ํŒจํ‚ค์ง€ -1- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 3. DB๋ณด์•ˆ ๏ฑ DB๋ณด์•ˆ์˜ ๊ธฐ์ˆ  Domain Domain ๊ด€๋ จ๋‚ด์šฉ Authentication โ€ข ํŒจ์Šค์›Œ๋“œ ๊ด€๋ฆฌ โ€ข ๊ฐ€์šฉํ•œ ์ธ์ฆ์ˆ˜๋‹จ ๋™์›: ์ƒ์ฒด์ธ์‹, ์ธ์ฆ์„œ, ID/password ๋“ฑ โ€ข NW Daemon์„ค์ •๊ด€๋ฆฌ, ๊ธฐ๋ณธํฌํŠธ ๋ณ€๊ฒฝ Authorization โ€ขPublic๊ณ„์ •์˜ ์ œํ•œ, ์‚ฌ์šฉ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณ€๊ฒฝ ๊ฒ€ํ†  โ€ข์‹œ์Šคํ…œ ๊ถŒํ•œ Revoke, Any๊ณ„์—ด ๊ถŒํ•œ Revoke Access Control โ€ข DB Schema Design: Authorization๊ณ ๋ คํ•˜์—ฌ ์„ค๊ณ„ โ€ข ์ ‘๊ทผ์ œ์–ด๋ชจ๋ธ:MAC, DAC, RBAC Confidentiality โ€ข ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(DBMS ์˜ต์…˜์‚ฌ์šฉ ํ˜น์€ ์ „์šฉ ์†”๋ฃจ์…˜) โ€ข ์ „์†ก๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(SSL/TLS) Backup/Recovery โ€ขIncremental/Full, ๋ฐฑ์—…์ •์ฑ… Audit โ€ข Trigger ๋“ฑ ์ž„์‹œ์กฐ์น˜ โ€ข DBMS์ œ๊ณต Audit Tool ์ด์šฉ(์„ฑ๋Šฅ์ €ํ•˜ ๊ฐ์†Œ ๊ณ ๋ ค) ๏ฑ ์ „๋ง/๊ณ ๋ ค์‚ฌํ•ญ โ€“ ์›น ์ผ์ƒ‰์˜ App.๏ƒ ์›น์„ ํ†ตํ•œ ์นจํ•ด๊ฐ€๋Šฅ์„ฑ ์ƒ์กด(์›น ๋ณด์•ˆ๊ณผ DB๋ณด์•ˆ์˜ ๋™์‹œ์ง„ํ–‰ ํ•„์š”) โ€“ IT Compliance ์ฃผ์˜(๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๋ฒ• ๋“ฑ) โ€“ ๊ฐ์ข… ๋ณด์•ˆ๊ธฐ๋Šฅ ์‚ฌ์šฉ์‹œ์— ๋”ฐ๋ฅด๋Š” ์„ฑ๋Šฅ์ €ํ•˜๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ๋ฐœ์ฃผ โ€“ ๊ฐ์‚ฌ๊ธฐ๋Šฅ์€ DBMS Vender์— ๋”ฐ๋ผ ๊ธฐ๋Šฅ์ฐจ์ด๊ฐ€ ์žˆ์œผ๋ฏ€๋กœ ์ œ๊ณต๊ธฐ๋Šฅ ์™ธ ๋ณ„๋„์˜ ๊ธฐ๋Šฅ๊ตฌํ˜„ ํ•„์š” -2- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 4. DB๋ณด์•ˆ ์†”๋ฃจ์…˜์˜ ์ข…๋ฅ˜ ์ ‘๊ทผ์ œ์–ด ์ œํ’ˆ ๊ตฌ๋ถ„ ์•”ํ˜ธํ™” ์ œํ’ˆ Sniffing ๋ฐฉ์‹ Server Agent ๋ฐฉ์‹ Gateway ๋ฐฉ์‹ ๏ถ๋ณด์•ˆํ†ต์ œ๊ฐ€ ์™„๋ฒฝํ•˜์ง€ ๋ณด์•ˆ๊ธฐ๋Šฅ ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต ๏ถ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต ์•Š์Œ ๏ถDB์„œ๋ฒ„์— ์˜ํ–ฅ ์—†์ด ๏ถDB ์„œ๋ฒ„ ์„ฑ๋Šฅ์— ๏ถAgent ๊ฐ€ ์„ค์น˜๋˜์ง€ ์•Š๋Š” ๏ถAgent ์„ค์น˜๋กœ ์ธํ•œ DB ์„œ๋ฒ„ ์•ˆ์ •์  ์šด์˜ ๊ฐ€๋Šฅ ์˜ํ–ฅ ์˜ํ–ฅ์„ ์คŒ ๋ฐฉ์‹ ์„ฑ๋Šฅ์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ์Œ ๏ถGateway ๊ตฌ์„ฑ์— ๋”ฐ๋ฅธ ์žฅ๋‹จ์  (5-10% ๋ถ€ํ•˜ ์ƒ์„ฑ) ๏ถDB์„œ๋ฒ„์— ์˜ํ–ฅ ์—†์ด ๏ถAgent ์žฅ์• ๋กœ ์ธํ•œ ์žฅ์•  ๋Œ€์‘ ๋ฐฉ์•ˆ ํ•„์š” ์•ˆ์ •์  ์šด์˜ ๊ฐ€๋Šฅ ๏ถ์•”ํ˜ธํ™” ๋ฐ ์ธ์ฆ ํ‚ค ๋Œ€์ฑ… ๋ฏธ๋น„ (์ด์ค‘ํ™” or Bypass) ๊ด€๋ฆฌ ํ•„์š” ๏ถ์•”ํ™”ํ™” ๋Œ€์ฒด ๊ธฐ๋Šฅ์ œ๊ณต ๏ถํ™•์žฅ ์‹œ ๊ฐ๊ฐ์˜ ์„ธ๊ทธ๋จผํŠธ ๏ถ๋ณ„๋„์˜ H/W ์ถ”๊ฐ€ ์—†์ด ๏ถ๋ณ„๋„์˜ H/W ์ถ”๊ฐ€ ์—†์ด ํ™•์žฅ์„ฑ ๏ถ์„œ๋ฒ„๋งˆ๋‹ค Agent ์„ค์น˜ ํ•„์š” ๋งˆ๋‹ค H/W ์—ฐ๊ฒฐ ํ•„์š” ํ™•์žฅ ๊ฐ€๋Šฅ ํ™•์žฅ ๊ฐ€๋Šฅ ๏ถ๋น„์ •ํ˜•๋ฐ์ดํ„ฐ ์ œ์–ด ์‹œ ๏ถ์ •ํ˜•๋ฐ์ดํ„ฐ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ ๏ถ์šฐํšŒ ์ ‘์†์— ๋Œ€ํ•œ ์ œ์–ด ์‹œ ๊ตฌ์„ฑํ•˜๋Š” ๋ฐฉ์‹์ด๋ฉฐ, ๏ถ์•”๋ณตํ˜ธํ™” ๋ฐ DB ์„ฑ๋Šฅ ์ œํ’ˆํŠน์ง• ๊ตฌ์„ฑ ๋ฐฉ์‹ ๊ตฌ์„ฑํ•˜๋Š” ๋ฐฉ์‹ ๋ณด์•ˆ์„ฑ ๋ฐ ํ™•์žฅ์„ฑ์ด ํŠœ๋‹ ๋“ฑ ๊ณ ๋ ค ์‚ฌํ•ญ ๋งŽ์Œ ๋›ฐ์–ด๋‚จ ์ถœ์ฒ˜: DB Safer -3- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 5. DB์ ‘๊ทผ์ œ์–ด ์†”๋ฃจ์…˜์˜ ์ผ๋ฐ˜๊ธฐ๋Šฅ โ€ข ์ธ์ฆ๋˜์ง€ ์•Š์€ ์ ‘์†์— ๋Œ€ํ•œ ์„ธ์…˜ ์ฐจ๋‹จ ๋ฐ ์‹ค์‹œ๊ฐ„ ๊ฒฝ๊ณ  ๊ธฐ๋Šฅ ์ ‘์† ๋ฐ โ€ข ์˜ค๋ธŒ์ ํŠธ์— ๋Œ€ํ•œ ๊ถŒํ•œ ์„ค์ • ๋ฐ ์ฐจ๋‹จ ๊ธฐ๋Šฅ ๊ถŒํ•œ ์ œ์–ด โ€ข ์‚ฌ์šฉ์ž๋ณ„ ์‚ฌ์šฉ ๊ฐ€๋Šฅ ๋ช…๋ น์–ด๋ฅผ ์ œํ•œ โ€ข SQL ๋ฌธ ๊ฐ์‹œ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ โ€ข ์‹คํ–‰๋œ SQL๋ฌธ/์‹คํ–‰์‹œ๊ฐ„/์‚ฌ์šฉ์ž/์‹œ๊ฐ„๋Œ€ ๋ณ„ ๊ฒ€์ƒ‰ ๋ฐ ์ถ”์  ์ด๋ ฅ๊ด€๋ฆฌ โ€ข ์ ‘์† ์„ธ์…˜ ๋ฐ ์‹คํ–‰ ๋ช…๋ น์–ด ๋ณ„ ์ด๋ ฅ ๊ด€๋ฆฌ ๋ณด์•ˆ์ •์ฑ… ๊ด€๋ฆฌ ์šฉ์ดํ•œ ์ •์ฑ…์„ค์ • ๋ฐ ๋ฐ˜์˜ ๊ฒฐ์žฌ๊ด€๋ฆฌ ์ค‘์š” SQL ๋ช…๋ น์— ๋Œ€ํ•œ ์‚ฌ์ „/์‚ฌํ›„ ์Šน์ธ(๊ฒฐ์žฌ) ๊ธฐ๋Šฅ โ€ข ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๋‚ด๋ถ€ ํ†ต์ œ ๊ธฐํƒ€ โ€ข ์—ฌ๋Ÿฌ ์œ ํ˜•์˜ DBMS ํ†ตํ•ฉ ๋ชจ๋‹ˆํ„ฐ๋ง โ€ข ํŠน์ • Data, Field์— ๋Œ€ํ•œ Masking ๊ธฐ๋Šฅ -4- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 6. DB๋ณด์•ˆ ์†”๋ฃจ์…˜ ์ ์šฉ์˜ ์ ‘๊ทผ๋ฐฉ์•ˆ ๏ฑ ์„ฑ๋Šฅ โ€“ ๋…ผ๋ž€์ด ์—ฌ์ง€ ๋งŽ์Œ, ๋Œ€์ฒด๋กœ ์†Œ๊ทœ๋ชจ ์‚ฌ์ดํŠธ์—์„œ ์„ฑ๊ณต Reference ์ถœํ˜„ โ€“ ๋Œ€๊ทœ๋ชจ ์‚ฌ์ดํŠธ๋Š” ๋ณ„๋„์˜ ์ ‘๊ทผ ํ•„์š” ๏ฑ ๊ฐ€๊ฒฉ โ€“ BPR ์ˆ˜ํ–‰์œผ๋กœ ๋Œ€์ƒ์‹œ์Šคํ…œ ์ตœ์†Œํ™” โ€“ Master DB ๋ฐ Virtual Identifier๋ฅผ ์ด์šฉํ•œ ๊ตฌํ˜„ ๏ฑ ์šด์˜/์ดํ–‰ โ€“ ๊ฐ์‹œ๊ฐ€ ํž˜๋“ค๋‹ค๋ฉด ์—†๋А๋‹ˆ๋งŒ ๋ชปํ•˜๋‹ค. (ํŠนํžˆ Gatewayํ˜• ์ ‘๊ทผํ†ต์ œ) โ€“ BPR ์ˆ˜ํ–‰์œผ๋กœ ํ”„๋กœ์„ธ์Šค ๋ฐ ๋Œ€์ƒ์‹œ์Šคํ…œ์„ ์ตœ์ ํ™”ํ•˜๋Š” ๊ณผ์ •์„ ๋ณ‘ํ–‰ โ€“ CTO, CSO๋ฅผ ์ ๊ทน์ ์œผ๋กœ ์ด์šฉ -5- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 7. 2-3. DLP Preview ํ•ญ๋ชฉ ์ƒ์„ธ๋‚ด์—ญ ๊ฐœ์š” ๊ธฐ๋ฐ€ ๋ฐ์ดํ„ฐ ์œ ์ถœ์˜ ๊ฐ์‹œ/๊ธฐ๋ก/์œ ์ถœ ์ฐจ๋‹จ ์†”๋ฃจ์…˜ ๊ธฐ์ถœ์—ฌ๋ถ€ ๊ด€๋ จKeyWord ์ถ”์ฒœ์‚ฌ์ดํŠธ ๊ธฐ์ˆ ๋ฐœ์ „ PC๋ฐฉํ™”๋ฒฝ๏ƒ PC๋ณด์•ˆ ์†”๋ฃจ์…˜๏ƒ DLP RoadMap ์†”๋ฃจ์…˜ ํ•œ๊ณ„์™€ ์ ์šฉ์ƒ์˜ ๋ฌธ์ œ์ ์— ๋งŽ์€ ์ƒ๊ฐ ํ•„์š” ๊ธฐํƒ€ ๋งˆ์ผ€ํŒ…์šฉ์–ด์— ํ˜„ํ˜น๋˜์ง€ ๋ง๊ณ  ๊ธฐ์ˆ ์˜ ์—ฐ์žฅ์„ ์„ ๋จผ์ € ํŒŒ์•…ํ•  ๊ฒƒ -6- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 8. DLP(Data Loss Prevention) ๏ฑ ๊ฐœ๋… โ€“ ์‚ฌ์šฉ์ž์˜ PC์—์„œ ๊ธฐ์—… ๋‚ด ๊ธฐ๋ฐ€ ๋ฐ์ดํ„ฐ๊ฐ€ ์™ธ๋ถ€๋กœ ๋ฐ˜์ถœ๋˜๋Š” ๊ฒƒ์„ ํ•ญ์‹œ โ€˜๊ฐ์‹œํ•˜๊ณ  ๊ธฐ๋กํ•˜๋ฉฐโ€™, ์ •์ฑ…์— ๋”ฐ๋ผ ์œ ์ถœ์„ ์ฐจ๋‹จ์‹œํ‚ค๋Š” ๊ฒƒ์„ ์ฃผ๊ธฐ๋Šฅ์œผ๋กœ ๊ตฌํ˜„ํ•œ ์†”๋ฃจ์…˜ ๏ฑ ๋ถ€๊ฐ๋ฐฐ๊ฒฝ โ€“ ๊ธฐ์กด PC๋ณด์•ˆ์†”๋ฃจ์…˜์˜ ํ•œ๊ณ„์„ฑ โ€“ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๋ฒ• ๋“ฑ Compliance์˜ ๊ฐ•ํ™” ๏ฑ ๊ฐœ๋…๊ตฌ์„ฑ๋„ ๋ฐ ๊ธฐ๋Šฅ โ€“ ๊ฐœ๋…๊ตฌ์„ฑ๋„ Data Classification Content Tracking Data Loss Prevention (Enforce Tagging Rules) (M aintain Tags) (Enforce Reaction Rules) ์„œ๋ฒ„์—์„œ ๋ณต์‚ฌ๋œ ๋ฐ์ดํ„ฐ Emails Endpoint DLPํ˜ธ์ŠคํŠธ๋Š” ์›๋ณธ ์ž๋ฃŒ๊ฐ€ ์›น ์—…๋กœ๋“œ ๋กœ์ปฌ ๋ณ€๊ฒฝ๋˜๊ฑฐ๋‚˜ ํฌ๋ฉง ๋ณ€ํ™˜์ด (์›น๋ฉ”์ผ, ํฌํƒˆ) ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์—์„œ ๋˜์–ด๋„ ์ง€์†์ ์ธ ๋ณดํ˜ธ ์ƒ์„ฑ๋œ ๋ฐ์ดํ„ฐ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•จ. โ€ข ์ด๋ฆ„ ๋ณ€๊ฒฝ โ€ข ํŒŒ์ผ ํฌ๋ฉง ๋ณ€๊ฒฝ ์ธ์‡„ ์‚ฌ์šฉ์ž์— ์˜ํ•ด โ€ข ๋‹ค๋ฅธ ๋ฌธ์„œ๋กœ ๋‚ด์šฉ ๋ณต์‚ฌ ์ƒ์„ฑ๋œ ๋ฌธ์„œ ํŒŒ์ผ โ€ข ๋ฌธ์„œ๋ฅผ ์••์ถ•(Zipโ€ฆ) โ€ข ๋ฌธ์„œ ์•”ํ˜ธํ™”(Encr ypt ion) Removable media -7- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 9. DLP(Data Loss Prevention) โ€“ ๊ธฐ๋Šฅ ๊ตฌ๋ถ„ ๊ธฐ๋Šฅ ํŒŒ์ผ ์ €์žฅ ์œ„์น˜ ๋ณ„ ๋ถ„๋ฅ˜ โ€“ ํŒŒ์ผ์„œ๋ฒ„ ํŠน์ •ํด๋” Contents์— ๋”ฐ๋ฅธ ๋ถ„๋ฅ˜ โ€“ ํ‚ค์›Œ๋“œ, ์ž„๊ณ„์น˜ ๋“ฑ Data ๋ถ„๋ฅ˜ ํŒŒ์ผ ์œ ํ˜•์— ๋”ฐ๋ฅธ ๋ถ„๋ฅ˜ โ€“ ํ™•์žฅ์ž, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ Fingerprint ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๋ณตํ•ฉ ๊ธฐ์ค€ ๋ถ„๋ฅ˜ USB ๋ฉ”๋ชจ๋ฆฌ ๋“ฑ ๋ชจ๋“  ๋ฌผ๋ฆฌ์  ์žฅ์น˜ ๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰์— ๋”ฐ๋ฅธ ์™ธ๋ถ€ ๋ณต์‚ฌ์ œ์–ด ์ธ์‡„ ๋ชจ๋‹ˆํ„ฐ๋ง ๋˜๋Š” ์ฐจ๋‹จ ๋ณต์‚ฌ & ๋ถ™์—ฌ ๋„ฃ๊ธฐ ํ™”๋ฉด ์บก์ฒ˜ Data ์œ ์ถœ๋ฐฉ์ง€ ๋ฉ”์ผ ํด๋ผ์ด์–ธํŠธ๋ฅผ ํ†ตํ•œ ์œ ์ถœ ์ฐจ๋‹จ ๋„คํŠธ์›Œํฌ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ํ†ตํ•œ ์œ ์ถœ ๋ฐฉ์ง€ ์œˆ๋„์šฐ ์ œ๊ณต ๋„คํŠธ์›Œํฌ ๊ฒฝ๋กœ์ฐจ๋‹จ ์›น ๋ธŒ๋ผ์šฐ์ €๋ฅผ ํ†ตํ•œ ์›น ํฌ์ŠคํŒ… ์ฐจ๋‹จ ์™ธ๋ถ€ ์›น ๋ฉ”์ผ ์‚ฌ์šฉ์‹œ ์ฐจ๋‹จ Forensic ๋กœ๊ทธ ๋ฐ ๋ถ„์„ ๊ฐ€์‹œ์„ฑ ํ™•๋ณด ์œ ์ถœ ์‹œ๋„ ์ฆ๊ฑฐ๋ฌผ ์ˆ˜์ง‘ (Automatic Evidence Collection) ์‹ค์‹œ๊ฐ„ ๊ฒฝ๊ณ  (POP-UP MESSAGE) ๊ธฐํƒ€ Bypass ์˜ต์…˜ ์ •์ฑ… ์˜ˆ์™ธ ์„ค์ • -8- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 10. DLP(Data Loss Prevention) โ€“ ํ•ต์‹ฌ๊ธฐ๋Šฅ์ธ Data ๋ถ„๋ฅ˜๊ธฐ๋ฒ•์˜ ์ข…๋ฅ˜ By location โ€ข ํŒŒ์ผ์„œ๋ฒ„, ํŠน์ • ํด๋”, ๊ณต์œ  ๋“œ๋ผ์ด๋ธŒ, PCโ€ฆ โ€ข ํ‚ค์›Œ๋“œ, ์ •๊ทœ์‹(์ฃผ๋ฏผ๋ฒˆํ˜ธ, ์‚ฌํšŒ๋ณด์žฅ๋ฒˆํ˜ธ ๋“ฑ) By content โ€ข thresholds(ex: ์ฃผ๋ฏผ๋ฒˆํ˜ธ 100๊ฐœ ์ด์ƒ) By file-type โ€ข ํŠน์ • ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋ณ„ ๋ฐ์ดํ„ฐ(doc, xls, SAP, BusinessObjectsโ€ฆ) โ€ข Third Party ํ˜‘๋ ฅ์ฒด๊ณ„ ์ค‘์š” By fingerprint โ€ข Hash๊ฐ’์„ ์ด์šฉํ•œ digital signature โ€ข ์—…์ฒด๋ณ„ ๊ตฌํ˜„๋ฐฉ์‹ ์ƒ์ด ๏ฑ ๋„์ž… ๊ณ ๋ ค์‚ฌํ•ญ โ€“ ๊ธฐ์กด ๋ณด์•ˆ Policy์™€์˜ ๊ด€๊ณ„, End Userํ™˜๊ฒฝ๊ณผ์˜ ์กฐํ™” โ€“ ์†”๋ฃจ์…˜์˜ ํ•œ๊ณ„์„ฑ ๋ฐ ๊ธฐ๋Œ€์ˆ˜์ค€์˜ ์„ค์ • โ€“ ์„ค์น˜์œจ ์ œ๊ณ ์˜ ๋ฌธ์ œ -9- ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 11. Access Control & Authentication Authorization Accounting - 10 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 12. 3-1. MAC/DAC/MLS Preview ํ•ญ๋ชฉ ์ƒ์„ธ๋‚ด์—ญ ๊ฐœ์š” ๊ธฐํƒ€ ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ ๊ธฐ์ถœ์—ฌ๋ถ€ ๊ด€๋ จKeyWord Secure OS ์ถ”์ฒœ์‚ฌ์ดํŠธ http://www.kangho.com/exploit/SEC/2-acessControl.html ๊ธฐ์ˆ ๋ฐœ์ „ RoadMap ๊ธฐํƒ€ ์—ฌ๋Ÿฌ๊ฐ€์ง€ ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ์ด ํ•™์ˆ ์  ์ฐจ์›์—์„œ ๋ฐœํ‘œ๋˜์—ˆ์œผ๋‚˜ ์ฑ„ํƒ๋œ ๊ธฐํƒ€ ๊ฒƒ์€ ๊ฑฐ์˜ ์—†์Œ. - 11 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 13. MAC/DAC/MLS ๏ฑ MAC (Mandatory Access Control) โ€“ ์›๋ฆฌ: ์ฃผ์ฒด๋Š” ์ธ๊ฐ€ ๋ ˆ์ด๋ธ”, ๊ฐ์ฒด๋Š” ๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰(๋ฏผ๊ฐ๋„ ๋ ˆ์ด๋ธ”)์— ์˜ํ•ด ์ ‘๊ทผํ—ˆ๊ฐ€ ๊ฒฐ์ • โ€ข ์ฃผ์ฒด๋Š” ๊ทธ๋ฃน/๋„๋ฉ”์ธ๋„ ๊ฐ€๋Šฅ โ€ข ์ธ๊ฐ€>๋ถ„๋ฅ˜: Access โ€ข ์ธ๊ฐ€<๋ถ„๋ฅ˜: Deny โ€“ ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์ค‘์•™๊ด€๋ฆฌ(DAC์— ๋น„ํ•ด ์œ ์—ฐ์„ฑ์€ ๋–จ์–ด์ง) โ€ข ๊ตฐ๋Œ€ ๋“ฑ ๋ณต์žก์„ฑ/๋น„์šฉ์— ๋ฏผ๊ฐํ•˜์ง€ ์•Š์€ ๊ณณ์—์„œ ์‚ฌ์šฉ โ€“ ์˜ˆ: BLP(Bell-LaPadulla)๋ชจ๋ธ, Biba๋ชจ๋ธ, MLS โ€ข Linux(Suse Linux, SELinux..) โ€ข Vista/Server2008 โ€ข FreeBSD ๏ฑ DAC (Discretionary Access Control) โ€“ ๋ณด์•ˆ๊ด€๋ฆฌ์ž/๊ฐ์ฒด์†Œ์œ ์ž๊ฐ€ โ€˜์š”์ฒญ์ฃผ์ฒดโ€™์˜ ์‹ ์›์— ๋”ฐ๋ผ ์ ‘๊ทผ๊ถŒํ•œ์„ ๊ฒฐ์ •ํ•จ โ€ข ์˜ˆ: ์ธ์‚ฌDB ์ ‘๊ทผ๊ถŒํ•œ์€ ์ธ์žฌ๊ฐœ๋ฐœํŒ€์—์„œ ๊ฒฐ์ •ํ•˜๋ฉฐ โ€˜์ธ์‚ฌ๊ด€๋ จ๋ถ€์„œโ€™๋Š” read๊ถŒํ•œ์„, โ€˜ ๋‚˜๋จธ์ง€ ๋ถ€์„œโ€™๋Š” ์ ‘๊ทผ์„ ๋ถˆํ—ˆํ•œ๋‹ค. โ€“ Access Matrix(Capability List, ACL)๋ชจ๋ธ, Take-Grant๋ชจ๋ธ, Action-Entity๋ชจ๋ธ โ€ข๋ถ„๋ฅ˜ ๋“ฑ๊ธ‰ ์˜ˆ: public, confidential, secret, top secret โ€ข๋ณด์•ˆ ์ทจ๊ธ‰ ํ—ˆ๊ฐ€ ๋ผ๋ฒจ ์˜ˆ: ์ธ์‚ฌ์ •๋ณด ์—ด๋žŒ์„ ์œ„ํ•ด Secret ์ด์ƒ์˜ ๋“ฑ๊ธ‰์ด ํ•„์š”ํ•จ - 12 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 14. MAC/DAC/MLS ๏ฑ MLS (Multi-Level Security) โ€“ ์ฃผ์ฒด/๊ฐ์ฒด๋Š” ํ”„๋กœ์„ธ์Šค, ํŒŒ์ผ, ์‚ฌ์šฉ์ž, ํฌํŠธ๋ฒˆํ˜ธ ๋“ฑ ์ปดํ“จํ„ฐ์—์„œ ๊ตฌ๋ถ„ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ๊ฒƒ์ด ํ•ด๋‹น๋จ โ€“ ๊ตฌํ˜„์—ฌ๋ถ€๋Š” ๊ตฌํ˜„์ž๊ฐ€ ๊ฒฐ์ • โ€“ DAC/MAC ๋™์‹œ์ ์šฉ ์‹œ ์ƒ๊ธธ ์ˆ˜ ์žˆ๋Š” ๋…ผ๋ฆฌ์  ๋ชจ์ˆœํ˜„์ƒ ํ•ด๊ฒฐ ๊ฐ€๋Šฅ โ€“ http://www.centos.org/docs/5/html/Deployment_Guide-en-US/sec-mls-ov.html ๏ƒ˜No Read Up, No Write Down โ€ข No Read up: Confidentiality ์œ ์ง€ ๋ชฉ์  โ€ข No Write Down: Integrity ์œ ์ง€ ๋ชฉ์  - 13 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 15. 3-2. RBAC Preview ํ•ญ๋ชฉ ์ƒ์„ธ๋‚ด์—ญ ๊ฐœ์š” ๊ฐ€์žฅ ์ผ๋ฐ˜์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ ๊ธฐ์ถœ์—ฌ๋ถ€ 92 ๊ด€๋ จKeyWord ๋ฐ์ดํ„ฐ ์ถ”์ƒํ™” ์ถ”์ฒœ์‚ฌ์ดํŠธ http://www.kangho.com/exploit/SEC/2-acessControl.html ๊ธฐ์ˆ ๋ฐœ์ „ RoadMap ๊ธฐํƒ€ - 14 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 16. RBAC (Role Based Access Control) ๏ฑ ๊ฐœ๋… โ€“ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ๋œ ์—ญํ• ์— ๊ทผ๊ฑฐํ•˜์—ฌ ์ ‘๊ทผํ†ต์ œ๋ฅผ ์‹ค์‹œํ•˜๋Š” ๋ฐฉ๋ฒ• โ€“ ๊ธฐ์กด ์ ‘๊ทผ์ œ์–ด ๋ชจ๋ธ์˜ ๋ถˆ์™„์ „ํ•จ์—์„œ ์ถœ๋ฐœ โ€ข MAC: ๋“ฑ๊ธ‰ ์„ค์ •์ด ๋ชจํ˜ธํ•œ ๊ฒฝ์šฐ์— ์ ์šฉ๋ถˆ๊ฐ€ โ€ข DAC: ๊ถŒํ•œํ‘œํ˜„, ๊ด€๋ฆฌ์„ฑ์˜ ๊ฐœ์„  ํ•„์š” 2. ๋ฐฐ์ • 1. ๋ฐฐ์ • ์‚ฌ์šฉ์ž(U) ์—ญํ• (R) ๊ถŒํ•œ(P) ์„ธ์…˜(S) Object 3. Access ๏ฑ RBAC ์˜ ํŠน์„ฑ โ€“ ๊ด€๋ฆฌ ํšจ์œจ์„ฑ, ์ƒ์†๊ฐ€๋Šฅ, Least Privilege ๊ตฌํ˜„ ๊ฐ€๋Šฅ โ€“ ์ž„๋ฌด๋ถ„๋ฆฌ: ์ƒํ˜ธ๊ฐ์‹œ ๊ฐ€๋Šฅ โ€“ Data ์ถ”์ƒํ™”: OS RWED์™ธ ์ถ”์ƒํ™” ๊ฐ€๋Šฅ(์ž…๊ธˆ, ์ถœ๊ธˆ ๋“ฑ) โ€“ ๊ฐ์ฒด๋ถ„๋ฅ˜: ์ˆ˜ํ–‰์—…๋ฌด์— ๋”ฐ๋ผ ์‚ฌ์šฉ์ž๋ถ„๋ฅ˜, ๊ถŒํ•œ์ œํ•œ ๊ตฌํ˜„ ๊ฐ€๋Šฅ - 15 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 17. RBAC (Role Based Access Control) ๏ฑ RBAC์˜ ํ™œ์šฉ โ€“ ์ƒ์šฉSW ๊ฑฐ์˜ ๋Œ€๋ถ€๋ถ„ โ€“ DBMS, OS, CORBAโ€ฆ โ€“ Web ๊ธฐ๋ฐ˜ Application๋„ ํ™œ๋ฐœํ•˜๊ฒŒ ์‚ฌ์šฉ ๏ฑ RBAC ๊ตฌํ˜„ ์˜ˆ USER ROLE Permission ์‚ฌ์šฉ์ž ๋ฐฐ์ • U1: IRON R1: Admin R U1 : R1 R2: Owner W D - 16 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 18. 3-3. AAA Preview ํ•ญ๋ชฉ ์ƒ์„ธ๋‚ด์—ญ ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ๊ธฐ๋Šฅ์œผ๋กœ ๋‹จ์ˆœํ•œ ํ†ต์‹ ์‚ฌ์—…์ž์˜ AAA๊ฐ€ ์•„๋‹Œ ์ธ์ฆ์Šคํ‚ค๋งˆ ์ „์ฒด๋กœ ๊ฐœ์š” ๊ฐœ๋…ํ™•์žฅ ํ•„์š” ๊ธฐ์ถœ์—ฌ๋ถ€ ๊ด€๋ จKeyWord Radius, Diameter (์ตœ์†Œ์˜๋ฏธ AAA๊ธฐ์ค€) ์ถ”์ฒœ์‚ฌ์ดํŠธ ๊ธฐ์ˆ ๋ฐœ์ „ ๋‹จ์ˆœ/๋น„์‹ ๋ขฐ๏ƒ ๋ณต์žก/์‹ ๋ขฐ/๊ธฐ์ˆ ํ™˜๊ฒฝ๋ณ€ํ™” ์ˆ˜์šฉ RoadMap ๊ธฐํƒ€ - 17 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 19. AAA(Authentication/Authorization/Accounting) ๏ฑ ๊ฐœ์š” โ€“ ์‚ฌ์šฉ์ž ์‹ ์›์˜ ํ™•์ธ๏ƒ ์„œ๋น„์Šค๊ถŒํ•œ๋ถ€์—ฌ๏ƒ ๊ณผ๊ธˆ/๊ฐ์‚ฌ โ€“ ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ, ์„œ๋น„์Šค/ํ†ต์ œ ์‹œ ์„ธ๊ฐ€์ง€ ์ค‘ ํ•œ๊ฐ€์ง€ ์ด์ƒ ๋ฐ˜๋“œ์‹œ ํ•„์š” ๏ฑ ์ฃผ์š” ๊ธฐ๋Šฅ โ€“ Authentication: ์ธ์ฆ ์š”๊ตฌ์ž ๋‹น์‚ฌ์ž์˜ ์ฆ๋ช…, id/password/์ƒ์ฑ„์ธ์‹/Smart Card ๋“ฑ โ€“ Authorization: ์‚ฌ์šฉ์ž ์š”๊ตฌ์ž‘์—…์˜ ํ—ˆ์šฉ์—ฌ๋ถ€ ๊ฒฐ์ • โ€“ Accounting: ์‚ฌ์šฉ์ž ์‚ฌ์šฉ๋‚ด์—ญ์˜ Audit ๏ฑ ์ฃผ์š” ์ธ์ฆ ํ”„๋กœํ† ์ฝœ โ€“ Radius โ€ข UDP๊ธฐ๋ฐ˜, C/S, ์ €๋ณ€์ด ๋„“์Œ โ€ข ๋ณด์•ˆ/Fail Over๊ธฐ๋Šฅ ์•ฝํ•จ โ€ข ๊ณผ๊ธˆ ์‹œ ํŒจํ‚ท ์†์‹ค ๊ฐ€๋Šฅ โ€“ TACACS+ โ€ข TCP๊ธฐ๋ฐ˜, CISCO, C/S โ€ข ๋ณด์•ˆ๊ฐ•ํ™”, CISCO NW๊ธฐ๊ธฐ ์ธ์ฆ์— ์ฃผ๋กœ ์‚ฌ์šฉ โ€“ Diameter โ€ข TCP/SCTP๊ธฐ๋ฐ˜, P2P โ€ข ๋ณด์•ˆ๊ฐ•ํ™” (IPSEC/TLS), ๋›ฐ์–ด๋‚œ ํ™•์žฅ์„ฑ โ€ข Mobile IP(Roaming), Fail Over, ๋ฉ”์‹œ์ง€ ์ฒ˜๋ฆฌ๊ธฐ๋Šฅ ํ–ฅ์ƒ - 18 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€
  • 20. AAA(Authentication/Authorization/Accounting) ๏ฑ AAA์˜ ํ™œ์šฉ โ€“ AAA์†”๋ฃจ์…˜: ISP์œ„์ฃผ์˜ ์‚ฌ์šฉ โ€“ ์ผ๋ถ€ ์‚ฌ์šฉ: ์ผ๋ฐ˜ SW๋ณด์•ˆ, IAM/EAM ๋“ฑ ๊ฐœ๋…์Šน๊ณ„ ๏ฑ ํ–ฅํ›„์ „๋ง โ€“ IPv6๋Œ€๋น„, Radiusํ™•์žฅ โ€“ Diameter๋กœ์˜ ๋Œ€๊ฐœ์ฒด (๊ณผ๊ธˆ/๋ณด์•ˆ/802.1x/NASRAQ/EAP/PKI์ง€์› ๋“ฑ ์‹ ๊ธฐ๋Šฅ ํ’๋ถ€) ๏ฑ Diameter Cellular ACR Diameter ์‘์šฉ ๋‹ค์–‘ํ•œ AAA์„œ๋น„์Šค RAS Phone Diameter base ํ”„๋กœํ† ์ฝœ์˜ ๊ตฌ์กฐ์  ํ™•์žฅ Fixed Phone VoIP ๊ฐ์ข… GW ํ•˜๋ถ€์ „์†ก๊ณ„์ธต Set-top Box Peer1 Peer2 - 19 - ใˆœ ์ธํฌ๋ ˆ๋ฒ„์ปจ์„คํŒ… ๊ต์œก์‚ฌ์—…๋ณธ๋ถ€