{"id":191,"date":"2021-04-26T11:37:16","date_gmt":"2021-04-26T03:37:16","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=191"},"modified":"2023-03-29T16:57:58","modified_gmt":"2023-03-29T08:57:58","slug":"%e7%b3%bb%e7%b5%b1%e9%96%8b%e7%99%bc%e7%94%9f%e5%91%bd%e9%80%b1%e6%9c%9fsdlc-%e8%a8%ad%e8%a8%88%e9%9a%b1%e7%a7%81","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=191","title":{"rendered":"\u7cfb\u7d71\u958b\u767c\u751f\u547d\u9031\u671f(SDLC)- \u8a2d\u8a08\u96b1\u79c1"},"content":{"rendered":"\n<p>\u6b50\u6d32GDPR\u8a2d\u8a08\uff0c\u9019\u5c31\u8981\u6c42\u96b1\u79c1\u88ab\u8003\u616e\u7d0d\u5165\u96b1\u79c1\u8cab\u7a7f\u6574\u500b\u8a2d\u8a08\u904e\u7a0b\u3002\uff08<a href=\"https:\/\/en.wikipedia.org\/wiki\/Privacy_by_design\" target=\"_blank\" rel=\"noreferrer noopener\">\u7dad\u57fa\u767e\u79d1<\/a>\uff09\u96b1\u79c1\u5f71\u97ff\u5206\u6790\u751a\u81f3\u5728\u958b\u59cb\u968e\u6bb5\u9032\u884c\u7684\u524d\u4e00\u500b\u5de5\u7a0b\u9805\u76ee\u555f\u52d5\uff0c\u5982\u5716\u6240\u793aNIST SDLC\u3002<br><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210426\/20132160EbM1u3vwC8.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210426\/20132160EbM1u3vwC8.jpg\"><br>-NIST SDLC\u548cRMF<\/p>\n\n\n\n<p><strong>\u5a01\u8105\u5efa\u6a21\uff08Threat Modeling\uff09<\/strong><br>\u5728\u7cfb\u7d71\u5de5\u7a0b\u7684\u80cc\u666f\u4e0b\uff0c\u5a01\u8105\u5efa\u6a21\u53ef\u88ab\u8996\u70ba\u5c08\u9580\u7684\u98a8\u96aa\u7ba1\u7406\u3002\u7531\u65bc\u5b58\u5728\u8a31\u591a\u5a01\u8105\u5efa\u6a21\u5be6\u8e10\u548c\u65b9\u6cd5\uff0c\u4eba\u5011\u53ef\u80fd\u6703\u4ee5\u591a\u7a2e\u65b9\u5f0f\u4e0d\u4e00\u81f4\u5730\u5be6\u65bd\u5b83\u5011\u3002\u6709\u4eba\u8a8d\u70ba\u61c9\u5728\u6574\u500b\u5de5\u7a0b\u904e\u7a0b\u4e2d\u9032\u884c\uff0c\u800c\u5927\u591a\u6578\u4eba\u5247\u5728\u8a2d\u8a08\u968e\u6bb5\u9032\u884c\u3002<\/p>\n\n\n\n<p><strong>\u4fe1\u4efb\u4f46\u8981\u9a57\u8b49\uff08Trust But Verify\uff09<\/strong><br>1987\u5e7412\u67088\u65e5\uff0c\u7f85\u7d0d\u5fb7\u00b7\u88e1\u6839\uff08Ronald Reagan\uff09\u7e3d\u7d71\u5728INF\u689d\u7d04\u4e0a\u7c3d\u5b57\u5f8c\uff0c\u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Trust,_but_verify\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u4efb\u4f46\u6838\u5be6<\/a>\u201d\u4e00\u8a5e\u88ab\u7ffb\u8b6f\u6210\u4fc4\u8a9e\uff0c\u4e26\u5ee3\u70ba\u4eba\u77e5\u3002\u6709\u4e9b\u4eba\u5c07\u5176\u8207\u201c\u96f6\u4fe1\u4efb\u201d\u76f8\u540c\uff0c\u4f46\u5176\u4ed6\u4eba\u5247\u4e0d\u540c\u3002\u6709\u4eba\u8a8d\u70ba\u4eca\u5929\u9084\u4e0d\u5920\uff0c\u61c9\u8a72\u7528\u201c\u9a57\u8b49\uff0c\u9a57\u8b49\uff0c\u9a57\u8b49\u201d\u6216\u201c\u96f6\u4fe1\u4efb\u201d\u4ee3\u66ff\u3002IMO\uff0c\u4fe1\u4efb\u4f46\u9a57\u8b49\u8207\u96f6\u4fe1\u4efb\u76f8\u540c\u3002<\/p>\n\n\n\n<p><strong>\u5171\u540c\u8cac\u4efb\uff08Shared Responsibility\uff09<\/strong><br>\u5171\u4eab\u8cac\u4efb\u662f\u5728\u96f2\u8a08\u7b97\u4e2d\u4f7f\u7528\u7684\u6a21\u578b\uff0c\u8a72\u6a21\u578b\u5b9a\u7fa9\u4e86\u96f2\u5ba2\u6236\u8207\u96f2\u670d\u52d9\u63d0\u4f9b\u5546\u4e4b\u9593\u7684\u8cac\u4efb\u908a\u754c\u3002<br><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210426\/2013216055EuiDO1h9.png\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210426\/2013216055EuiDO1h9.png\"><br>-\u5fae\u8edf\u5171\u540c\u8cac\u4efb\u6a21\u5f0f<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Privacy_by_design\" target=\"_blank\" rel=\"noreferrer noopener\">\u8a2d\u8a08\u96b1\u79c1<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Threat_model\" target=\"_blank\" rel=\"noreferrer noopener\">\u5a01\u8105\u6a21\u578b<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Trust,_but_verify\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u4efb\u4f46\u8981\u9a57\u8b49<\/a><br>.&nbsp;<a href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2016\/volume-1\/is-audit-basics-trust-but-verify\" target=\"_blank\" rel=\"noreferrer noopener\">IS\u5be9\u6838\u57fa\u790e\u77e5\u8b58\uff1a\u4fe1\u4efb\uff0c\u4f46\u8981\u9a57\u8b49<\/a><br>.&nbsp;<a href=\"https:\/\/core.ac.uk\/download\/pdf\/216742313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u4efb\u4f46\u6838\u5be6\uff1a\u8ecd\u5099\u63a7\u5236\u689d\u7d04\u548c\u5176\u4ed6\u570b\u969b\u5354\u8b70\u4e2d\u7684\u4fe1\u606f\u751f\u7522<\/a><br>.&nbsp;<a href=\"https:\/\/blog.se.com\/datacenter\/2016\/09\/21\/trust-secure-remote-monitoring-data-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u4efb\uff0c\u4f46\u9a57\u8b49\u2026\u70ba\u60a8\u7684\u6578\u64da\u4e2d\u5fc3\u4fdd\u8b77\u9060\u7a0b\u76e3\u63a7<\/a><br>.&nbsp;<a href=\"https:\/\/mytechdecisions.com\/network-security\/trust-but-verify-zero-trust-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">3\u5bb6\u4e0d\u4fe1\u4efb\u201c\u4fe1\u4efb\u4f46\u9a57\u8b49\u201d\u7684\u7db2\u7d61\u5b89\u5168\u516c\u53f8<\/a><br>.&nbsp;<a href=\"https:\/\/www.centripetal.ai\/blog\/trust-but-verify\" target=\"_blank\" rel=\"noreferrer noopener\">\u201c\u4fe1\u4efb\u4f46\u8981\u9a57\u8b49\u2026\u201d<\/a><br>.&nbsp;<a href=\"https:\/\/o365hq.com\/blog\/zero-trust-network-security-trust-but-verify\" target=\"_blank\" rel=\"noreferrer noopener\">\u96f6\u4fe1\u4efb\u7db2\u7d61\u5b89\u5168\u2013\u4fe1\u4efb\u4f46\u8981\u9a57\u8b49\uff01<\/a><br>.&nbsp;<a href=\"https:\/\/nemertes.com\/not-so-much-zero-trust-as-trust-but-verify\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u8207\u5176\u8aaa\u662f\u201c\u4fe1\u4efb\uff0c\u800c\u662f\u8981\u9a57\u8b49\u201d\uff0c\u4e0d\u5982\u8aaa\u662f\u201c\u96f6\u4fe1\u4efb\u201d<\/a><br>.&nbsp;<a href=\"https:\/\/orangematter.solarwinds.com\/2019\/05\/22\/when-trust-but-verify-isnt-enough-life-in-a-zero-trust-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u7576\u201c\u4fe1\u4efb\u4f46\u4e0d\u80fd\u9a57\u8b49\u201d\u9084\u4e0d\u5920\u6642\uff1a\u96f6\u4fe1\u4efb\u4e16\u754c\u4e2d\u7684\u751f\u6d3b<\/a><br>.&nbsp;<a href=\"https:\/\/constructionexec.com\/article\/trust-but-verify-why-cybersecurity-is-so-important-for-a-construction-contractor\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u4efb\u4f46\u8981\u9a57\u8b49\uff1a\u70ba\u4ec0\u9ebc\u7db2\u7d61\u5b89\u5168\u5c0d\u5efa\u7bc9\u627f\u5305\u5546\u5f88\u91cd\u8981<\/a><br>.&nbsp;<a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2020\/08\/26\/shared-responsibility-model-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5171\u540c\u8cac\u4efb\u6a21\u5f0f\u89e3\u91cb<\/a><br>.&nbsp;<a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5171\u540c\u8cac\u4efb\u6a21\u5f0f<\/a><br>.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/shared-responsibility\" target=\"_blank\" rel=\"noreferrer noopener\">\u96f2\u4e2d\u7684\u5171\u540c\u8cac\u4efb<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/KISS_principle\" target=\"_blank\" rel=\"noreferrer noopener\">\u543b\u539f\u7406<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/03\/02\/cissp-practice-questions-20210303\/\" target=\"_blank\">Wentz Wu QOTD-20210303<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6b50\u6d32GDPR\u8a2d\u8a08\uff0c\u9019\u5c31\u8981\u6c42\u96b1\u79c1\u88ab\u8003\u616e\u7d0d\u5165\u96b1\u79c1\u8cab\u7a7f\u6574\u500b\u8a2d\u8a08\u904e\u7a0b\u3002\uff08\u7dad\u57fa\u767e\u79d1\uff09\u96b1\u79c1\u5f71\u97ff\u5206\u6790\u751a\u81f3\u5728\u958b\u59cb\u968e\u6bb5\u9032\u884c\u7684\u524d\u4e00 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-191","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=191"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":2897,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/191\/revisions\/2897"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}