![]() |
½ÃÀ庸°í¼
»óÇ°ÄÚµå
1577766
Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®°¡ »çÀ̹ö °ø°Ý¿¡ ´ëÇÑ ³»¼ºÀ» È®´ëContinuous Compliance Management Increases Resilience to Cyberattack |
ÀÌ IDC Àü¸Á¿¡¼´Â »çÀ̹ö °ø°Ý¿¡ ´ëÇÑ ³»¼ºÀ» ³ôÀ̱â À§ÇÑ Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®¿¡ ´ëÇØ ÀÚ¼¼ÇÏ°Ô ¼³¸íÇÕ´Ï´Ù. »çÀ̹ö º¸¾È ÄÄÇöóÀ̾𽺴 °ú¼ÒÆò°¡µÇ°Å³ª "¸¶Áö¸· ¼ø°£¿¡ ÇÏ´Â" ¶Ç´Â "ÇØ¾ß Çϴϱî ÇÏ´Â" È°µ¿À¸·Î ¿©°ÜÁöÁö¸¸, Á¶Á÷À» º¸È£ÇÏ´Â °·ÂÇÑ ±â´ÉÀÌ µÉ ¼ö ÀÖ½À´Ï´Ù. ±âÁ¸ÀÇ ±ÔÁ¤ Áؼö ¹æ¹ýÀº ¼öµ¿ÀûÀÌ°í ½Ã°£ÀÌ ¸¹ÀÌ °É¸®¸ç ³ëµ¿ Áý¾àÀûÀÌ¸ç ±ÔÁ¤ Áؼö°¡ °ü¸®µÇ´Â Àüü IT ÀÚ»êÀÇ ÀϺο¡¸¸ Àû¿ëµË´Ï´Ù. ÇÏÁö¸¸ ÀÌ·¸°Ô Çϸé IT ÀÚ»êÀÇ ´Ù¸¥ ºÎºÐÀº ±ÔÁ¤À» ÁؼöÇÏÁö ¾Ê´Â »óÅ·Π³²°Ô µË´Ï´Ù. IT ÀÚ»êÀº ÀϹÝÀûÀÎ ±ÔÁ¤ Áؼö ¼öÁØ, ½À°üÀû ±ÔÁ¤ ¹ÌÁؼö, ÀÚ¿¬Àû ±ÔÁ¤ ¹ÌÁؼöÀÇ ¼¼ °¡Áö »óÅ Áß Çϳª¿¡ Á¸ÀçÇÕ´Ï´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È Á¤Ã¥ ¹× ±ÔÁ¤ Áؼö ¼öÁØÀÌ ³ôÀ»¼ö·Ï Á¶Á÷ÀÇ »çÀ̹ö º¸¾È °ø°Ý¿¡ ´ëÇÑ º¹¿ø·Â ¼öÁصµ ³ô¾ÆÁý´Ï´Ù. ¹Ý´ë·Î ±ÔÁ¤ Áؼö ¼öÁØÀÌ ³·À»¼ö·Ï »çÀ̹ö º¸¾È °ø°Ý¿¡ ´ëÇÑ º¹¿ø·Âµµ ³·¾ÆÁý´Ï´Ù. "Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®´Â ¿À´Ã³¯ »çÀ̹ö º¸¾È ºÐ¾ß¿¡¼ °¡Àå °£°úµÇ°í ÀÖ´Â ³·Àº ¼öÁØÀÇ °á½ÇÀÔ´Ï´Ù. »çÀ̹ö º¸¾È ±ÔÁ¤ Áؼö¸¦ Áö¼ÓÀûÀ¸·Î ÀÚµ¿ÈÇÏ°í Á¶À²ÇÏ´Â µ¥ »ó´çÇÑ µµ¿òÀÌ µÇ´Â »õ·Î¿î ±â¼úÀÌ ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ Governance, Risk, and Compliance Services ´ã´ç ¸®¼Ä¡ µð·ºÅÍÀÎ Philip Harris´Â ¸»Çß½À´Ï´Ù. "Áö¼ÓÀû ÄÄÇöóÀ̾𽺠°ü¸®¸¦ ½ÃÇàÇÏ´Â Á¶Á÷Àº »ç½Ç»ó »çÀ̹ö °ø°ÝÀÇ ¼º°ø °¡´É¼ºÀ» Å©°Ô ÁÙ¿© º¹¿ø·ÂÀ» Å©°Ô ³ôÀÏ ¼ö ÀÖ½À´Ï´Ù."
This IDC Perspective details continuous compliance management to increase resilience to cyberattack. Cybersecurity compliance is often an underrated or "do at the last minute" or "because we have to" activity, but it is necessary and can be a powerful protection capability for organizations. Traditional methods of compliance are manual, time-consuming, and labor intensive and cover only portions of the overall IT estate where compliance is managed. However, this also leaves other portions of the IT estate noncompliant. IT estates exist in one of three states of compliance - general level of compliance, habitually noncompliant, and/or naturally noncompliant. In addition, the higher the level of compliance to cybersecurity policies and regulations, the higher the level of resilience to cybersecurity attacks an organization has. Conversely, the lower the level of compliance, the lower the level of resilience to cybersecurity attacks."Continuous compliance management is the most overlooked low-hanging fruit in the cybersecurity space today. There are new technologies that aid considerably in automating and orchestrating cybersecurity compliance continuously," says Philip Harris, research director, Governance, Risk, and Compliance Services at IDC. "Organizations that implement continuous compliance management will - in effect - significantly reduce the likelihood of successful cyberattacks, thereby dramatically increasing resilience."