Go to Top

Go to Top

Comprehensive Interdepartmental Information Protection Plan and Issues
Comprehensive Interdepartmental Information Protection Plan and Issues
Comprehensive Interdepartmental Information Protection Plan and Issues
Comprehensive Interdepartmental Information Protection Plan and Issues

Security Insights

Security Insights

Security Insights

2025 Comprehensive National Cybersecurity Strategy and Initiatives

2025 Comprehensive National Cybersecurity Strategy and Initiatives

2025 Comprehensive National Cybersecurity Strategy and Initiatives

Kim In-soon

Kim In-soon

Oct 23, 2025

Oct 23, 2025

Oct 23, 2025

Content

Content

Content

On October 22, 2025, the government announced a comprehensive interagency cybersecurity plan. In response to growing public anxiety following security incidents like the SK Telecom SIM hacking, which leaked the personal information of about 23 million people, and the Lotte Card breach affecting 2.97 million people, this plan was introduced. We will review the key contents of this strategy, developed jointly by the Ministry of Science and ICT, the National Security Office, the Financial Services Commission, the Personal Information Protection Commission, the National Intelligence Service, and the Ministry of the Interior and Safety, to analyze its potential effectiveness.

Urgent Inspection, Immediate Action on 1,600 Key IT Systems

The first measure the government introduced is a comprehensive security review. 

They will immediately carry out extensive security vulnerability assessments on about 1,600 key IT systems including 288 public institution infrastructures, 152 central and local administrative agencies, 261 financial industries, and 949 ISMS-certified companies such as telecom operators and major platforms. 

Especially for telecom operators, they will conduct unexpected intensive checks using actual hacking methods and completely rebuild the identification and management system for major IT assets. For the femtocell, a small base station criticized for security issues, they warned of taking strict actions like immediate disposal if its stability cannot be ensured.

The security certification system will also be significantly reinforced. The existing ISMS and ISMS-P certifications have been criticized for being formal as they were mainly paper-based reviews. Now, they will shift to onsite inspections and enhance effectiveness by canceling certifications if major defects arise. Additionally, they plan to conduct regular penetration testing exercises and establish a continuous vulnerability inspection system using white hackers.



Consumer-centered damage relief, burden of proof shifts

The second key point is the strengthening of consumer protection. Previously, even if hacking incidents occurred due to corporate security negligence, the burden was on consumers to prove the damage. 

In technically complex hacking incidents, it was almost impossible for ordinary consumers to prove corporate negligence. Now, the government will ease this burden of proof and establish a consumer-oriented damage relief system by preparing user protection manuals in key sectors such as telecommunications and finance. 

There are considerations to establish a fund to utilize fines imposed for personal data breaches to support victims and enhance personal data protection. This means that large fines, such as the 134.7 billion won imposed on SKT, can be used to help actual victims.

The government's investigative authority will also be significantly strengthened. Once evidence of hacking is obtained, the government will be able to promptly investigate the scene even without a company's report. 

Previously, it was difficult for the government to intervene unless the company reported the incident, which contributed to companies trying to hide accidents. Penalties will be significantly increased for security obligation violations such as delayed hacking reports, non-compliance with recurrence prevention measures, and repeated personal and credit information leaks, including increased fines, implementation enforcement fees, and punitive fines. 

The National Intelligence Service's investigative and analytical tools will be jointly used with the private sector, and AI-based intelligent forensic labs will be established to drastically reduce analysis time from 14 days to 5 days per case, thereby enhancing the capabilities for detecting and responding to incidents.

Security as an investment, introducing CEO accountability and rating system

The third key point is to mandate private companies to invest in information security. The most groundbreaking measure is the introduction of an information security grading system. The obligation for companies to disclose information security status will be greatly expanded from the current 666 companies to approximately 2,700 listed companies. Based on the disclosure results, the security capability levels will be graded and made public. Companies with lower security capabilities will be directly exposed to investors and consumers. 

The principle of CEO security responsibility will also be codified in law, and the authority of the Chief Information Security Officer (CISO) and Chief Privacy Officer (CPO) will be significantly strengthened. They will be granted control over all IT assets, mandated to report regularly to the board, and given practical assurance in organizing and executing information security personnel and budget.

The public sector will lead by example. It will be mandatory from the first quarter of 2026 to secure information protection budgets and personnel to a certain level compared to informatization. The rank of the government's chief information security officer will be raised from the director level to the general manager level. In evaluating the management of public institutions, the score for cybersecurity will be doubled from 0.25 to 0.5. To support small and micro-enterprises lacking in-house security capabilities, regional information security support centers will be expanded from the current 10 to 16.

Breaking away from Galapagos, switching to global standards

The fourth goal is to improve South Korea's security 'Galapagos syndrome,' which has long been criticized. Various security programs such as keyboard security and firewalls, required each time one uses financial institutions or public websites, significantly compromise user convenience while their actual security effectiveness has been questioned. Instead of these security software, the government will gradually restrict them from 2026 and enhance security using multi-factor authentication (passwords, OTP, biometric combinations) and AI-based anomaly detection systems.

The uniform physical network separation will also officially shift to focus on data security. This approach, where two PCs are necessary because of completely separating the internet network and work network, has been criticized for being inconvenient and inefficient. 

Such methods, which do not align with global changes like the spread of cloud and AI, will switch to focus on data security starting in 2026, easing the public entry requirements for private operators, including improvements in cloud security requirements. 

By 2027, the submission of the SBOM, which is a list of software components, will also be institutionalized for IT systems and products used in the public sector. IT products found to have security issues will face restrictions on public procurement adoption.

Security Industry National Strategy Industrialization and Workforce·Technology Development

The fifth strategy is to cultivate the security industry as a national strategic sector. To support being among the top three AI nations, about 30 next-generation security companies, such as AI agent security platforms, will be nurtured annually.

The scope of information protection services under the Information and Communications Technology Industry Promotion Act will be expanded from the current security consulting and control specialists to include AI security and software supply chain security specialists.

Each year, about 500 elite security experts, known as white hackers, will be trained, with the training system redesigned to meet corporate demands. Specialized cybersecurity universities and integrated security graduate schools will boost their role as hubs for nurturing security talent specialized in regional growth engine industries.

The plan aims to cultivate security experts tailored to regional specialized industries: smart shipbuilding in the Southeast, future vehicle components in the Daegyeong region, AI in the Honam region, and bio-industry in the Central region.

Nationwide cooperation framework, eliminating departmental barriers

Finally, integrate the fragmented response systems by departments.

Previously, when a hacking incident occurred, various entities such as the Ministry of Science and ICT, the Financial Services Commission, the Personal Information Protection Commission, the National Intelligence Service, and the police each conducted their investigations, exacerbating confusion on the ground and causing ambiguity in accountability.

The government plans to expand the designation of key national ICT infrastructure through the Information and Communications Infrastructure Protection Committee, a pan-ministerial committee, and activate the Cyber Incident Response Headquarters during the investigation phase of incidents.

By systematizing the fragmented investigation process of hacking incidents by departments, a one-stop reporting system will be introduced, the timing of each investigation team’s deployment will be optimized, and information sharing will be strengthened. The cooperation on cyber threat prevention and response between the National Cyber Crisis Management Team under the National Intelligence Service and government ministries will also be reinforced.

Tasks to ensure effectiveness

In the past, whenever there was a major security incident, the government proposed strong measures, but many times these fizzled out over time. For this measure to be effective, several preconditions must be met.

First, consistent determination and continuous monitoring are needed. The government stated that this measure focuses on short-term tasks that can be implemented immediately. However, even short-term tasks are useless if not properly executed. A cross-government implementation inspection system must be established, the progress should be disclosed quarterly, and clear accountability must be imposed on departments or agencies that fail to comply. A control tower, centered around the National Security Office, must have practical authority to enforce compliance by each department.

Second, there must be a balance between regulation and support. Especially for small and medium-sized enterprises, imposing excessive regulatory burdens could result in merely formal compliance. While introducing an information protection grading system, substantial improvement support should also be provided to companies with lower grades.

Expanding regional information protection support centers is a good starting point, but instead of simply increasing the number of centers, they must be equipped with capabilities for practical technical support, personnel dispatch, and consulting services.

In particular, many small manufacturing companies lack the capacity to hire security specialists, so it is necessary to consider forming a public expert pool for rotational support.

Collaborating with verified private security companies can also be an effective approach, as areas like penetration testing or vulnerability assessment can be more efficiently handled by private experts with real-world experience.

Third, training security personnel should not be about merely filling numbers but ensuring quality standards. The plan to train 500 white hat hackers annually is good, but it should not end with just acquiring formal certifications.

Mock hacking programs, industry-linked internships, and exchanges with advanced foreign institutes should also happen simultaneously to provide hands-on experience.

It is also important to actively utilize already verified high-level private security experts and white hat hackers. Government-led education alone won't keep up with rapidly evolving attack techniques. Experienced private offensive security experts should be involved in public institution mock hacking, incident response, and expert training to enhance practical capabilities. While regional specialization of Information Protection Featured Universities and Integrated Security Graduate Schools is good, it is crucial to establish a network for nationwide personnel circulation, not limited to specific regions.

Fourth, international cooperation and alignment with global standards must be ensured. Cyber threats cross borders. Institutionalizing SBOM or improving cloud security requirements aligns with global trends. We should actively adopt international standards like NIST and ISO, strengthen information-sharing systems with major countries, and enhance the global competitiveness of K-Security.

Fifth, companies should be encouraged to instill a voluntary security culture. Simply focusing on regulation and punishment has its limits. There must be a spread in the recognition that security investments can actually increase company value and enhance customer trust. For companies with high security ratings, incentives such as extra points in public bidding, financial preferences, and tax benefits should be provided, and excellent cases should be actively promoted to create a virtuous cycle. Education and campaigns should also be conducted to make CEOs and boards recognize security not just as an IT issue but as a core aspect of business strategy.

Kim In-soon

Kim In-soon

Start-up College Adjunct Professor at Gachon University
Start-up College Adjunct Professor at Gachon University

Former desk member of the Electronic Newspaper ICT Convergence Department, active as a cyber security journalist and communication expert for 20 years.

Former desk member of the Electronic Newspaper ICT Convergence Department, active as a cyber security journalist and communication expert for 20 years.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.