½ÃÀ庸°í¼­
»óÇ°ÄÚµå
1577766

Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®°¡ »çÀ̹ö °ø°Ý¿¡ ´ëÇÑ ³»¼ºÀ» È®´ë

Continuous Compliance Management Increases Resilience to Cyberattack

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 15 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óÇ°Àº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Àü¸Á¿¡¼­´Â »çÀ̹ö °ø°Ý¿¡ ´ëÇÑ ³»¼ºÀ» ³ôÀ̱â À§ÇÑ Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®¿¡ ´ëÇØ ÀÚ¼¼ÇÏ°Ô ¼³¸íÇÕ´Ï´Ù. »çÀ̹ö º¸¾È ÄÄÇöóÀ̾𽺴 °ú¼ÒÆò°¡µÇ°Å³ª "¸¶Áö¸· ¼ø°£¿¡ ÇÏ´Â" ¶Ç´Â "ÇØ¾ß Çϴϱî ÇÏ´Â" È°µ¿À¸·Î ¿©°ÜÁöÁö¸¸, Á¶Á÷À» º¸È£ÇÏ´Â °­·ÂÇÑ ±â´ÉÀÌ µÉ ¼ö ÀÖ½À´Ï´Ù. ±âÁ¸ÀÇ ±ÔÁ¤ Áؼö ¹æ¹ýÀº ¼öµ¿ÀûÀÌ°í ½Ã°£ÀÌ ¸¹ÀÌ °É¸®¸ç ³ëµ¿ Áý¾àÀûÀÌ¸ç ±ÔÁ¤ Áؼö°¡ °ü¸®µÇ´Â Àüü IT ÀÚ»êÀÇ ÀϺο¡¸¸ Àû¿ëµË´Ï´Ù. ÇÏÁö¸¸ ÀÌ·¸°Ô Çϸé IT ÀÚ»êÀÇ ´Ù¸¥ ºÎºÐÀº ±ÔÁ¤À» ÁؼöÇÏÁö ¾Ê´Â »óÅ·Π³²°Ô µË´Ï´Ù. IT ÀÚ»êÀº ÀϹÝÀûÀÎ ±ÔÁ¤ Áؼö ¼öÁØ, ½À°üÀû ±ÔÁ¤ ¹ÌÁؼö, ÀÚ¿¬Àû ±ÔÁ¤ ¹ÌÁؼöÀÇ ¼¼ °¡Áö »óÅ Áß Çϳª¿¡ Á¸ÀçÇÕ´Ï´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È Á¤Ã¥ ¹× ±ÔÁ¤ Áؼö ¼öÁØÀÌ ³ôÀ»¼ö·Ï Á¶Á÷ÀÇ »çÀ̹ö º¸¾È °ø°Ý¿¡ ´ëÇÑ º¹¿ø·Â ¼öÁصµ ³ô¾ÆÁý´Ï´Ù. ¹Ý´ë·Î ±ÔÁ¤ Áؼö ¼öÁØÀÌ ³·À»¼ö·Ï »çÀ̹ö º¸¾È °ø°Ý¿¡ ´ëÇÑ º¹¿ø·Âµµ ³·¾ÆÁý´Ï´Ù. "Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®´Â ¿À´Ã³¯ »çÀ̹ö º¸¾È ºÐ¾ß¿¡¼­ °¡Àå °£°úµÇ°í ÀÖ´Â ³·Àº ¼öÁØÀÇ °á½ÇÀÔ´Ï´Ù. »çÀ̹ö º¸¾È ±ÔÁ¤ Áؼö¸¦ Áö¼ÓÀûÀ¸·Î ÀÚµ¿È­ÇÏ°í Á¶À²ÇÏ´Â µ¥ »ó´çÇÑ µµ¿òÀÌ µÇ´Â »õ·Î¿î ±â¼úÀÌ ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ Governance, Risk, and Compliance Services ´ã´ç ¸®¼­Ä¡ µð·ºÅÍÀÎ Philip Harris´Â ¸»Çß½À´Ï´Ù. "Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®¸¦ ½ÃÇàÇÏ´Â Á¶Á÷Àº »ç½Ç»ó »çÀ̹ö °ø°ÝÀÇ ¼º°ø °¡´É¼ºÀ» Å©°Ô ÁÙ¿© º¹¿ø·ÂÀ» Å©°Ô ³ôÀÏ ¼ö ÀÖ½À´Ï´Ù."

À̱×Á¦Å¥Æ¼ºê ½º³À¼ô

»óȲ °³¿ä

  • ÄÄÇöóÀ̾ð½ºÀÇ ÀϹÝÀûÀÎ ·¹º§
  • ³íÄÄÇöóÀ̾ð½ºÀÇ ½À°üÀûÀÎ °¸
  • ³íÄÄÇöóÀ̾ð½ºÀÇ ÀÚ¿¬½º·¯¿î °¸
  • Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®ÀÇ Á¤ÀÇ
  • ±âÁ¸ ÄÄÇöóÀ̾ð½º
  • ±âÁ¸ ÄÄÇöóÀ̾𽺠ºñ¿ë°ú ¿µÇâ
  • Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®ÀÇ ÀÌÁ¡

Å×Å©³î·¯Áö ±¸ÀÔÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
KSA 24.11.04

This IDC Perspective details continuous compliance management to increase resilience to cyberattack. Cybersecurity compliance is often an underrated or "do at the last minute" or "because we have to" activity, but it is necessary and can be a powerful protection capability for organizations. Traditional methods of compliance are manual, time-consuming, and labor intensive and cover only portions of the overall IT estate where compliance is managed. However, this also leaves other portions of the IT estate noncompliant. IT estates exist in one of three states of compliance - general level of compliance, habitually noncompliant, and/or naturally noncompliant. In addition, the higher the level of compliance to cybersecurity policies and regulations, the higher the level of resilience to cybersecurity attacks an organization has. Conversely, the lower the level of compliance, the lower the level of resilience to cybersecurity attacks."Continuous compliance management is the most overlooked low-hanging fruit in the cybersecurity space today. There are new technologies that aid considerably in automating and orchestrating cybersecurity compliance continuously," says Philip Harris, research director, Governance, Risk, and Compliance Services at IDC. "Organizations that implement continuous compliance management will - in effect - significantly reduce the likelihood of successful cyberattacks, thereby dramatically increasing resilience."

Executive Snapshot

Situation Overview

  • General Level of Compliance
  • Habitual Gap of Noncompliance
  • Natural Gap of Noncompliance
  • Continuous Compliance Management Defined
  • Traditional Compliance
  • Traditional Compliance Costs and Impacts
  • Continuous Compliance Management Benefits

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óÇ°À» ¼±Åà Áß
»óÇ° ºñ±³Çϱâ
Àüü»èÁ¦