제어 네트워크 경계에 대한 OT-IT 책임 역할 연구
Study on the Security R&R of OT-IT for Control System Network Boundaries
- 한국IT서비스학회
- 한국IT서비스학회지
- 한국IT서비스학회지 제19권 제5호
- : KCI등재
- 2020.10
- 33 - 47 (15 pages)
In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.
1. 서 론
2. 제어시스템 사이버보안
3. 표준과 현황 분석
4. 운영 현황 분석
5. 개선 방안 및 책임 역할
6. 결 론
참고문헌