# 주요정보통신기반시설 취약점 분석·평가 기준

## 주요정보통신기반시설 취약점 분석·평가 기준

### 1. 취약점 분석·평가 전담반 구성 기준

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/WmjNFuW5FpzXYIMBh4D2/image.png" alt=""><figcaption><p>취약점 분석·평가 전담반 구성 기준</p></figcaption></figure>

### 2. 취약점 분석·평가 기준 '상' 항목

#### \* 관리적/물리적/기술적 분야

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/uG57ZOH3sWyR8a349M8r/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-1</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/5sOTg5twLzl4YZC3KVXT/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-2</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/wvvwXML1KOhBHWXplahG/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-3</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/NvhctSGSNenqBr9e4rYJ/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-4</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/hWMYuwxpVWdlppCIfNlo/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-5</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/W0Xaesq4TkAw5cG9DrWu/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-6</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/S63i47SHnRfJ2hYw75xx/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-7</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/uIw6VgLgmH6gpf4ip0VZ/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-8</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/Uvg29L2nIFX70MVXlQ1o/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-9</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/cvVhJVR5xxljhFpSXeIX/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '상' 항목-10</p></figcaption></figure>

### 3. 취약점 분석·평가 기준 '중', '하' 항목

#### \* 관리적/물리적/기술적 분야

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/mjmrVa9O7i2AOqUAnepw/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-1</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/ASOBJm5HSBdUnmjofwlG/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-2</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/KkTDWvRkvI87lMY7T81x/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-3</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/7lqVq79GilITgPKwvMcZ/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-4</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/HZMzyDiPeB0rVTUqCdBx/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-5</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/Xacvxz4aHv5qt1wvmVAs/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-6</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/ZwXKg8hV31USWPcrizRb/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-7</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/qICOSv4C1EJPCWKFlFBC/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-8</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/hILsDfKr9wmz7IfBAi5y/image.png" alt=""><figcaption><p>취약점 분석·평가 기준 '중', '하' 항목-9</p></figcaption></figure>

### 4. 취약점 분석·평가 점수 산출식 예제&#x20;

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/xCHG9RmenwAFoVLbAs8i/image.png" alt=""><figcaption><p>취약점 분석·평가 점수 산출식 예제-1</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/0QC2TdC9HeGkLLVcmVBC/image.png" alt=""><figcaption><p>취약점 분석·평가 점수 산출식 예제-2</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/otJHGGBHILz1umhX4ynA/image.png" alt=""><figcaption><p>취약점 분석·평가 점수 산출식 예제-3</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/g7aiMSPXZRCJoSqJHk33/image.png" alt=""><figcaption><p>취약점 분석·평가 점수 산출식 예제-4</p></figcaption></figure>

<figure><img src="https://content.gitbook.com/content/rq6MGMZ2PAiTZsVzGxOi/blobs/ZCUJibDjITm46RMuDaej/image.png" alt=""><figcaption><p>취약점 분석·평가 점수 산출식 예제-5</p></figcaption></figure>

{% embed url="<https://doc.skill.or.kr>" %}
NHN Cloud 정보 사이트&#x20;
{% endembed %}

{% embed url="<https://sul.skill.or.kr>" %}
보안 업데이트 정보 사이트 &#x20;
{% endembed %}
