Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Toward a Zero Trust Architecture - Korean Translation
Toward a Zero Trust Architecture - Korean Translation

Toward a Zero Trust Architecture - Korean Translation

Release Date: 04/05/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

기업 이해 관계자들은 실시간 시스템 복잡성 증가, 새로운 사이버 보안 정책의 필요성, 복잡하고 하이브리드 환경에서 시스템을 안전하게 운영하는 데 필요한 강력한 문화적 지원 등의 이슈를 고려해야 한다. 제로 트러스트와 같은 신흥 기술 솔루션과 접근 방식은 바이든 미국 대통령의 행정명령 14028, 국가 사이버 보안 개선의 의무를 충족시키는 데 매우 중요하다. 본 문서에서는, 새롭게 등장한 풍부하며 다양한 솔루션의 의미와, 제로 트러스트 아키텍처(ZTA)를 최종적으로 실현하기 위한 조직의 능력 등을 다룬다. 또한, 기업의 리더와 보안 담당자가 각각의 환경에 제로 트러스트를 도입하는 것을 촉진하기 위해, 업계가 주요한 이해관계자 그룹 사이의 협력을 강화하는 방법에 대해서도 제언하고 있다.

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural support that is required to securely operate systems in a complex and hybrid world. Emerging technology solutions and approaches such as Zero Trust are critical to meeting the mandates in President Biden’s Executive Order on Improving the Nation’s Cybersecurity. The implications of an emerging, rich and diverse solutions landscape and the challenges to an organization’s ability to ultimately deliver a Zero Trust Architecture (ZTA) are explored in this paper. Recommendations on how industry can improve collaboration among key stakeholder groups is discussed to accelerate both enterprise leaders and security practitioners’ adoption of Zero Trust into their environments.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024
Modernization Strategies for Identity and Access Management
Modernization Strategies for Identity and Access Management
Published: 11/04/2024
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Published: 11/04/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training