{"id":98027,"date":"2019-04-05T00:47:22","date_gmt":"2019-04-05T07:47:22","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98027"},"modified":"2019-04-05T00:47:22","modified_gmt":"2019-04-05T07:47:22","slug":"cloud-security-transformed-kr","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/04\/cloud-security-transformed-kr\/?lang=ko","title":{"rendered":"\ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548 \ud601\uc2e0 \u2013 Evident\uc640 RedLock"},"content":{"rendered":"<p>\ub2f9\uc0ac\ub294 \uc120\uad6c\uc801\uc778 \uc81c\ud488\uc778 Evident\uc640 RedLock\uc744 \ucd5c\uace0\uc758 \ub2e8\uc77c \uc81c\ud488\uc73c\ub85c \uacb0\ud569\ud558\uc5ec AWS, Azure, Google Cloud\ub97c \ud3ec\ud568\ud55c \uba40\ud2f0 \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc744 \uc9c0\uc6d0\ud558\ub294 \ub3d9\uae09 \ucd5c\uace0\uc758 \uaddc\uc815 \uc900\uc218\uc640 \ubcf4\uc548\uc744 \uc81c\uacf5\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. Palo Alto Networks\ub294 \uc774\uc81c \ub2e8\uc77c \ud1b5\ud569 \uc81c\ud488\uc744 \ud1b5\ud574 \uc790\ub3d9\ud654\ub41c \uc218\uc815\uc744 \ud1a0\ub300\ub85c \ud3ec\uad04\uc801\uc778 \uac00\uc2dc\uc131, \uad6c\uc131 \ubaa8\ub2c8\ud130\ub9c1, \uc9c0\uc18d\uc801\uc778 \uc900\uc218 \ubcf4\uc7a5, \uc704\ud611 \uac10\uc9c0\ub97c \uc81c\uacf5\ud558\ub294 \uc720\uc77c\ud55c \ubca4\ub354\uc785\ub2c8\ub2e4.<\/p>\n<p><strong>\ubcf4\uc644\uc801\uc778<\/strong> <strong>\ud2b9\uc131\uc758<\/strong> <strong>\ud074\ub77c\uc6b0\ub4dc<\/strong> <strong>\ubcf4\uc548<\/strong> <strong>\ubd84\uc11d<\/strong> <strong>\ubc0f<\/strong> <strong>\uaddc\uc815<\/strong> <strong>\uc900\uc218<\/strong><\/p>\n<p>\uace0\ub3c4\ub85c \ub2e8\ud3b8\ud654\ub41c \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0\ub294 \ub2e4\uc74c\uacfc \uac19\uc740 \uc0c8\ub85c\uc6b4 \ube44\uc988\ub2c8\uc2a4 \ubc0f \ubcf4\uc548 \uacfc\uc81c\uac00 \uc218\ubc18\ub429\ub2c8\ub2e4.<\/p>\n<ul>\n<li>\ubd84\uc0b0\ub41c \uba40\ud2f0 \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc5d0 \ub300\ud55c \uac00\uc2dc\uc131 \ubc0f \uc81c\uc5b4 \uad8c\ud55c \uc720\uc9c0<\/li>\n<li>\uc571\uc774 \uc9c0\uc18d\uc801\uc73c\ub85c \ubcc0\uacbd\ub418\uc5b4 \uc774\ub3d9\ud558\ub294 \uacbd\uc6b0 \uaddc\uc815 \uc900\uc218(\uaddc\uc81c \ubc0f \ubcf4\uc548 \ubaa8\ub450\uc5d0 \ub300\ud55c \uc900\uc218)\uc758 \ubcf5\uc7a1\uc131 \uad00\ub9ac<\/li>\n<li>\ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \uc218\uc9d1, \uc800\uc7a5 \ubc0f \uacf5\uc720<\/li>\n<li>SecOps \ud300\uc774 \uc704\ud611\uc5d0 \uc2e0\uc18d\ud558\uac8c \ub300\uc751\ud558\uace0 \ube44\uc815\uc0c1\uc801\uc778 \ub3d9\uc791\uc744 \uac10\uc9c0\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc6d0<\/li>\n<\/ul>\n<p>\ud37c\ube14\ub9ad \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \uc131\uacf5\uc801\uc778 \uc0ac\uc774\ubc84\uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \uc784\ubb34\ub97c \uc9c4\uc804\uc2dc\ud0a4\ub294 \uc720\uc77c\ud55c \ubc29\ubc95\uc774 <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/03\/cloud-compliance\/\">\ud074\ub77c\uc6b0\ub4dc \uaddc\uc815 \uc900\uc218\uc758 \ub9ac\ub354\uc778<\/a><\/u> Evident\uc640\u00a0<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/10\/time-bring-together-cloud-compliance-security-analytics\/\">\ubcf4\uc548 \ubd84\uc11d \ubc0f \uc704\ud611 \uac10\uc9c0 \ubd84\uc57c\uc758 \ub9ac\ub354\uc778<\/a><\/u> Redlock\uc744 \ud1b5\ud569\ud558\ub294 \uac83\uc784\uc744 \uae68\ub2ec\uc558\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>\ud1b5\ud569\uc744<\/strong> <strong>\ud1b5\ud55c<\/strong> <strong>\ubcf4\uc548<\/strong> <strong>\uc131\uacfc<\/strong> <strong>\ud5a5\uc0c1<\/strong><\/p>\n<p>RedLock\uc740 \uaddc\uce59 \uae30\ubc18 \ubcf4\uc548 \ubaa8\ubc94 \uc0ac\ub840\uc640 \ub3d9\uae09 \ucd5c\uac15\uc758 \uba38\uc2e0 \ub7ec\ub2dd\uc744 \uacb0\ud569\ud558\uc5ec AWS, Azure, GCP\uc5d0\uc11c \ubcf4\uc548 \uc0ac\uac01\uc9c0\ub300\ub97c \uc81c\uac70\ud568\uc73c\ub85c\uc368 \ud074\ub77c\uc6b0\ub4dc \ub9ac\uc18c\uc2a4\uc640 \uc911\uc694\ud55c \ub370\uc774\ud130\ub97c \uac80\uc0c9\ud569\ub2c8\ub2e4. \uc704\ud5d8\ud55c \uad6c\uc131\uc744 \uac10\uc9c0\ud558\ub294 \uac83\uc740 \ubb3c\ub860, \ub124\ud2b8\uc6cc\ud06c \uc704\ud611, \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc0ac\uc6a9\uc790 \ub3d9\uc791, \uba40\uc6e8\uc5b4, \ub370\uc774\ud130 \uc720\ucd9c, \ud638\uc2a4\ud2b8 \ucde8\uc57d\uc810\uc744 \uc2dd\ubcc4\ud569\ub2c8\ub2e4. Evident\uc758 \uaddc\uc815 \uc900\uc218 \uae30\ub2a5\uacfc RedLock\uc744 \ud1b5\ud569\ud558\uba74 \uace0\uac1d\uc774 \uaddc\uc815 \ubc0f \uc0b0\uc5c5 \uaddc\uc815 \uc900\uc218 \ud0dc\uc138\ub97c \uc27d\uac8c \uac80\uc99d\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud074\ub9ad \ud55c \ubc88\uc73c\ub85c RedLock \uc0ac\uc6a9\uc790\ub294 CIS, NIST, PCI, HIPAA, GDPR, ISO, SOC 2 \ub4f1\uc758 \uac10\uc0ac \uce5c\ud654\uc801\uc774\uace0 \uc0ac\uc6a9\uc790 \uc9c0\uc815 \uac00\ub2a5\ud55c \ubcf4\uace0\uc11c\ub97c \uc0dd\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>\ub2e8\uc9c0<\/strong> <strong>\uc2dc\uc791\uc5d0<\/strong> <strong>\ubd88\uacfc<\/strong><\/p>\n<p>\ub2f9\uc0ac\ub294 \ud3ed\ub113\uc740 Palo Alto Networks Security Operating Platform\uc5d0\uc11c \ud601\uc2e0\uc801\uc774\uace0 \uc218\uc900 \ub192\uc740 \ubcf4\uc548 \uae30\ub2a5\uacfc \ud1b5\ud569\uc744 \ud1b5\ud574 \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548 \ud50c\ub7ab\ud3fc\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \uac15\ud654\ud568\uc73c\ub85c\uc368 \uae30\uc5c5 IT \uc544\ud0a4\ud14d\ucc98 \uc804\ubc18\uc5d0 \uc77c\uad00\uc131 \uc788\ub294 \ubcf4\uc548\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/p>\n<p>\uc774\uc81c \uad00\uc2ec\uc744 \uac16\uace0 Palo Alto Networks \uace0\uac1d\uc774 \ub420 \ub54c\uc785\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \uc800\ud76c \ub9d0\ub9cc \uadf8\ub300\ub85c \ubbff\uc9c0 \ub9c8\uc2dc\uace0, Palo Alto Networks\uac00 \ud37c\ube14\ub9ad \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uc758 \ub9ac\ub354\uc778 \uc774\uc720\ub97c \uc9c1\uc811 \uacbd\ud5d8\ud574 \ubcf4\uc138\uc694.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ub2f9\uc0ac\ub294 \uc120\uad6c\uc801\uc778 \uc81c\ud488\uc778 Evident\uc640 RedLock\uc744 \ucd5c\uace0\uc758 \ub2e8\uc77c \uc81c\ud488\uc73c\ub85c \uacb0\ud569\ud558\uc5ec AWS, Azure, Google Cloud\ub97c \ud3ec\ud568\ud55c \uba40\ud2f0 \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd\uc744 \uc9c0\uc6d0\ud558\ub294 \ub3d9\uae09 \ucd5c\uace0\uc758 \uaddc\uc815 \uc900\uc218\uc640 \ubcf4\uc548\uc744 \uc81c\uacf5\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. Palo Alto Networks\ub294 \uc774\uc81c \ub2e8\uc77c \ud1b5\ud569 \uc81c\ud488\uc744 &hellip;<\/p>\n","protected":false},"author":631,"featured_media":96986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3555],"tags":[],"coauthors":[6733],"class_list":["post-98027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3555"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/corp-blog-cloud-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/631"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98027"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98027\/revisions"}],"predecessor-version":[{"id":98041,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98027\/revisions\/98041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/96986"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98027"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}