SW 공급망 보안 가이드라인
| 작성일 | 2025년 01월 09일 |
|---|---|
| 수정일 | 2025년 12월 30일 |
| 카테고리 | 기술 |
| 태그 | |
| 원본 | https://croot.notion.site/1766063e659080fdacf0d24657e196f7 |
[240513-%28%EC%9A%94%EC%95%BD%EB%B3%B8%29SW%EA%B3%B5%EA%B8%89%EB%A7%9D_%EB%B3%B4%EC%95%88%EA%B0%80%EC%9D%B4%EB%93%9C%EB%9D%BC%EC%9D%B8.pdf](https://prod-files-secure.s3.us-west-2.amazonaws.com/8daffe33-d95b-4c96-91e6-1b899bcdb2d7/0f5f0886-db60-4a61-8e90-912aeea997fd/240513-%28%EC%9A%94%EC%95%BD%EB%B3%B8%29_SW%EA%B3%B5%EA%B8%89%EB%A7%9D_%EB%B3%B4%EC%95%88_%EA%B0%80%EC%9D%B4%EB%93%9C%EB%9D%BC%EC%9D%B8.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIAZI2LB466YBRJKYZ3%2F20260126%2Fus-west-2%2Fs3%2Faws4_request&X-Amz-Date=20260126T140901Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEHQaCXVzLXdlc3QtMiJHMEUCIC0HwE7bQdUriUTtGY6e6oW1kA0Hh9cwxYPQRC9v3FySAiEAifmgpSiVaq7y6rq5a7fwLLjeHbf7uUFhrZ%2B2MKSJlwgq%2FwMIPRAAGgw2Mzc0MjMxODM4MDUiDAw9cVQxNtr76JK1XyrcA1i2G33Aa14hXIUTw7WLhBLTNKxkkt6Mqqe1oUIugJUxursirmXCOeOsOoHtsTnUr6SOFVYM5kHzE7BFn9XJR0tOTHNtkIa%2B3F8U4Z0eZuzF7LoXWFR%2F%2B8wXimHxkX0hC8LmVD%2BaAbfsnoDh0Y8A4W4V110pIcwBojLKBaNzYCancv%2BTYlD0X3clAShf1UrzPVGXULkBC%2BECxZSS7pyq%2FpvZp7qs2gizH3JgwyDmcOLGZVNZvjp9zHb6r1UtNJ2iijH85KZVpca5scEXXXllJHqt3H7T9aKQQkDUGu0tIJqjcA4Asks7j2kdFBRZyQxZYfMUZFWW34BoQVMZ%2BSFMoQACeMT07pxmo3nUnE8CiJ1tzcDdJTjJTf8XWOAnlrUDcHolX2nkxxG2zr2ZAVdXqMCnpvBio%2FCdTGW6iApg8qiRiCfgj6W%2FVKboSZFONznJb0Em%2B5kQwLdCzgE9JwhrirelEFhBSeWZZ43K7k9lrdMyY0mZXwIjBNHtf%2BqaoCCs2afHYPBlv7UZbd4KLxSdzHiFs%2FHHUvDuSXthfBFbjo5k7CY9PLLltgSctuyRHCeaMxZ%2Fq68qZVmZmlKuzzn4N8p7Pq5JEMuTu5ZhwtpYDe%2BahXTL%2F%2BI3Rj3QXKedMPS13csGOqUBKFyx5gjwmewbjDRkh340Ba3UztqDPwZILou0KWuo1upwgGqm7MLDDtxeJVw0Z6jdsFAvLApoBANaWZvJGJvJy9%2BvdhBEeIFzTcd0g11dk2TDZumOFxLnHlil8dcfGnvW6OAc0Op4Wa8JVLVr7doU%2BNxTZgO7%2FQSyeQwdYL1Nwxl%2BeOm5KgQ98aSOcW2Cce4LzYEH78zJd0spvK0%2BeR6dX0NRVVtr&X-Amz-Signature=842dd5e3f8119a67f57126b5d094efab9d22814516685044eec81a4839aa65c5&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject)
C-SCRM
- 전사 : 상위 수준의 전략, 실행계획 및 정책
- 프로세스 : 하위 수준의 전략, 실행계획 및 정책
- 운영 : 계획
구축방안
- SSDF
신뢰성 확보 방안
- SBOM
« Gartner 2025
국가망보안체계(N²SF) 가이드라인 »