Go to Top

Go to Top

ai시대 침해사고 위협 대응하는 방법
ai시대 침해사고 위협 대응하는 방법
ai시대 침해사고 위협 대응하는 방법
ai시대 침해사고 위협 대응하는 방법

Security Insights

Security Insights

Security Insights

[N²SF Series #1] The Untold Secrets of Each Stage in N²SF

[N²SF Series #1] The Untold Secrets of Each Stage in N²SF

[N²SF Series #1] The Untold Secrets of Each Stage in N²SF

Lee Cheol-ho

Lee Cheol-ho

Mar 19, 2025

Mar 19, 2025

Mar 19, 2025

Content

Content

Content

N²SF is an information security standard for public information service infrastructure

When a public institution builds a new information service, it must undergo a security review by the National Intelligence Service according to the National Information Security Guidelines, which are the public sector information security standards, to evaluate whether the security measures are adequate. During this process, security diagnostics and simulated hacking might occur.

Current guidelines require the submission of a business plan, request for proposals, and an information network diagram along with in-house security measures when requesting a security review. In the future, it seems that the key output of each stage of N²SF will be submitted as a security measure.

국가망보안체계 가이드라인


N²SF Stage 5 is a foundational activity for NIS security review.

The five phases included in N²SF are conducted sequentially as follows: ➊Preparation, ➋C/S/O classification, ➌Threat identification, ➍Development of security measures, and ➎Assessment and adjustment of adequacy. Once the final stage is completed, a security review is requested from the National Intelligence Service.

At this stage, the deliverables of N²SF are included in the request for the National Intelligence Service's security review. For details on the outputs of each major activity, refer to the guidelines.

N2SF 5단계

Correlation of N²SF Phase-wise Key Activities

The outputs (documents, files, etc.) produced in each step are used as input for the activities in the next step. In other words, because the main activities of N²SF are interconnected, it's important to define each activity's outputs clearly so they can be seamlessly linked to subsequent activities. Each agency should establish its own N²SF detailed guidelines (methodologies, procedures, systems, etc.).

N2SF 세부지침필요

The importance of self-evaluation by institutions for major activities at each N²SF stage before requesting a security review

The N²SF includes a stage where agencies evaluate the adequacy of the security measures they have implemented themselves, providing an opportunity to identify issues and deficiencies in the major activities of each N²SF stage and address them before requesting a security review.

This is the fifth and final stage of the N²SF, known as 'Adequacy Evaluation and Adjustment,' where the agency forms its own review committee (comprising security officers, consulting experts, and specialists) to engage in activities.

According to the guidelines, the process of evaluation and adjustment is repeated until no further adjustments are deemed necessary.

N2SF 기관 자체평가

If adjustments are needed but remain unrecognized, and the agency approves the evaluation result and requests a security review, there is a high likelihood of encountering issues during the security review that will necessitate a more complicated adjustment process.

Therefore, the agency should independently assess whether: ➊ the classification of business information and information systems by C/S/O levels is correct, ➋ the threat modeling methodology is properly applied, ➌ potential threats are accurately identified, ➍ security measures to Mitigate/Remove/Avoid/Transfer each identified threat are properly applied, ➎ the selection of security control items is appropriate, and ➏ the implementation plan for security control items is adequate.

 To develop the capability to do this independently, it is advisable for the agency to involve consulting experts with technical expertise in N²SF in all stages of the N²SF process, working jointly with the agency's security personnel to carry out key activities.


Enki White Hat has more practical attack TTPs than North Korean hacking organizations and is based on know-how from penetration tests (mock hacking) in various industries. They identify threats from the attacker's perspective and automatically link them to security control items, evaluating their adequacy through real-world mock hacking. They have a dedicated consulting methodology for N²SF. They are also preparing training services across N²SF.

※ This article is based on the 'National Network Security Framework (N²SF) Security Guidelines (Draft)' released in January 2025, but it is stated that some subjective perspectives of the company are included.

Lee Cheol-ho

Lee Cheol-ho

Enki Whitehat Lab Director / CTO
Enki Whitehat Lab Director / CTO

· 2022~Present: Director and CTO at EnkiWhiteHat Research Institute · 2004~Present: Senior Researcher at ETRI's National Security Research Institute (Currently seconded to EnkiWhiteHat under the SME Research Workforce Dispatch Support Project) · 2024: Contributor to Ministry of Science and ICT/KISA Zero Trust Guidelines 2.0 · 2024: Member of the Private Task Force for National Network Security System

· 2022~Present: Director and CTO at EnkiWhiteHat Research Institute · 2004~Present: Senior Researcher at ETRI's National Security Research Institute (Currently seconded to EnkiWhiteHat under the SME Research Workforce Dispatch Support Project) · 2024: Contributor to Ministry of Science and ICT/KISA Zero Trust Guidelines 2.0 · 2024: Member of the Private Task Force for National Network Security System

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.