½ÃÀ庸°í¼­
»óǰÄÚµå
1800377

IDC PlanScape : ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È

IDC PlanScape: Software Supply Chain Security

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 11 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC PlanScape´Â ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È °ü¸® ¹× ¸ð¹ü »ç·Ê¿¡ ´ëÇÑ Æ÷°ýÀûÀÎ °³¿ä¸¦ Á¦°øÇÏ´Â °ÍÀ» ¸ñÇ¥·Î ÀÌ·¯ÇÑ À¯ÇüÀÇ º¸È£ ±â´ÉÀ» ¹èÆ÷ÇÏ´Â ÀÌÀ¯¿Í ¹æ¹ýÀ» ÀÚ¼¼È÷ ¼³¸íÇÕ´Ï´Ù. ÀÌ º¸°í¼­´Â °ø±Þ¸Á º¸¾ÈÀÇ ÀüÅëÀûÀÎ Ãø¸éÀ» ´Ù·çÁö¸¸ °£°úÇϱ⠽¬¿î °ø±Þ¸Á À§Çè À¯Çüµµ ´Ù·ì´Ï´Ù. "¸¹Àº ±â¾÷ÀÌ ÀÌÁ¦ Àû¾îµµ ±âº»ÀûÀÎ Àǹ̿¡¼­´Â ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á¿¡¼­ ¹ß»ýÇÏ´Â º¸¾È À§Çè¿¡ ´ëÇØ ÀÎÁöÇϰí ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP)ÀÇ °âÀÓ ¿¬±¸ °í¹®ÀÎ Å©¸®½ºÅäÆÛ ÅäÄ¡(Christopher Tozzi)´Â ¸»ÇÕ´Ï´Ù. "ÇÏÁö¸¸ ±âÁ¸ÀÇ °ø±Þ¸Á º¸¾È Àü·«ÀÌ Ç×»ó ÇØ°áÇÏÁö ¸øÇÏ´Â ¹®Á¦ÀÎ SaaS ¾Û°ú AI µµ±¸ ¹× ¼­ºñ½º ¹èÆ÷·Î ÀÎÇØ ¹ß»ýÇÏ´Â À§Çè°ú °°Àº ƯÁ¤ À¯ÇüÀÇ ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È Ã¥ÀÓÀ» °£°úÇϰí ÀÖÀ» ¼ö ÀÖ½À´Ï´Ù."

IDC PlanScape µµÇ¥

ÁÖ¿ä ¿ä¾à

¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾ÈÀÌ Áß¿äÇÑ ÀÌÀ¯

  • ¾ÈÀüÇÏÁö ¾ÊÀº ¿ÀÇ ¼Ò½º ¼ÒÇÁÆ®¿þ¾î ±¸¼º¿ä¼Ò
  • ¾ÈÀüÇÏÁö ¾ÊÀº ºñ°ø°³ ¼Ò½º ¼ÒÇÁÆ®¿þ¾î
  • ¾ÈÀüÇÏÁö ¾ÊÀº ¼ÒÇÁÆ®¿þ¾î ±¸¼º
  • SaaSÀÇ Ãë¾àÁ¡°ú ¸®½ºÅ©
  • AI ¼ÒÇÁÆ®¿þ¾îÀÇ °ø±Þ¸Á ¸®½ºÅ©

¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾ÈÀ̶õ ¹«¾ùÀΰ¡?

ÁÖ¿ä ÀÌÇØ°ü°èÀÚ´Â ´©±¸Àΰ¡?

Á¶Á÷Àº ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾ÈÀ» ¾î¶»°Ô Ȱ¿ëÇÒ ¼ö ÀÖÀ»±î?

  • »ç¿ë °¡´ÉÇÑ ¸ðµç ¼ÒÇÁÆ®¿þ¾î ¸®¼Ò½º ½ºÄµ
  • ¼ÒÇÁÆ®¿þ¾î ¹× ±¸¼º µ¥ÀÌÅÍ ¼Ò½º¸¦ Æò°¡Çϱâ À§ÇÑ Á¤Ã¥À» Á¤ÀÇ
  • ¼ÒÇÁÆ®¿þ¾î º¥´õ¸¦ ü°èÀûÀ¸·Î °ËÁõÇÏ´Â ¹æ¹ý
  • Ÿ»ç ¼ÒÇÁÆ®¿þ¾î ±¸¼º¿ä¼Ò ¹× ÀÚ»ê Àκ¥Å丮 °ü¸®
  • ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á ¸®½ºÅ© ¼öÁ¤À» À§ÇÑ ¿öÅ©Ç÷οì Á¤ÀÇ

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ Á¶¾ð

°ü·Ã Á¶»ç

KSM 25.09.04

This IDC PlanScape details why and how to deploy these types of protections, with the goal of providing a truly comprehensive overview of software supply chain security management and best practices. It covers traditional aspects of supply chain security, but also addresses types of supply chain risks that are easy to overlook."Many businesses are now tuned in, at least in a basic sense, to the security risks posed by their software supply chains," says Christopher Tozzi, adjunct research advisor with IDC's IT Executive Programs (IEP). "Yet they may be overlooking certain types of software supply chain security liabilities, such as SaaS apps and risks created by the deployment of AI tools and services - challenges that conventional supply chain security strategies don't always address."

IDC PlanScape Figure

Executive Summary

Why Is Software Supply Chain Security Important?

  • Insecure Open Source Software Components
  • Insecure Closed Source Software
  • Insecure Software Configurations
  • SaaS Vulnerabilities and Risks
  • AI Software Supply Chain Risks

What Is Software Supply Chain Security?

Who Are the Key Stakeholders?

How Can My Organization Take Advantage of Software Supply Chain Security?

  • Scan All Available Software Resources
  • Define Policies for Evaluating Software and Configuration Data Sources
  • Systematically Validate Software Vendors
  • Maintain Inventories of Third-Party Software Components and Assets
  • Define Workflows for Remediating Software Supply Chain Risks

Advice for Technology Buyers

Related Research

»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦