Go to Top

Go to Top

Chemical case N2SF
Chemical case N2SF
Chemical case N2SF
Chemical case N2SF

Security Insights

Security Insights

Security Insights

[N²SF Series #2] Risk Management Framework and N²SF

[N²SF Series #2] Risk Management Framework and N²SF

[N²SF Series #2] Risk Management Framework and N²SF

Director Lee Cheol-ho
Director Lee Cheol-ho

Lee Cheol-ho

Lee Cheol-ho

Jun 25, 2025

Jun 25, 2025

Jun 25, 2025

Content

Content

Content

N²SF is the standard procedure for establishing internal security measures for public institution IT projects and outlines the minimum requirements.

As seen in Part 1, N²SF can be considered a standardization process where public institutions autonomously establish their own security measures when carrying out information projects.

Furthermore, since the N²SF Security Guidelines contain the minimum requirements applicable to national public institutions, it specifies that agencies can operate appropriately by considering the uniqueness and reality specific to each ministry/industry such as education, information and communication, foreign affairs, defense, administration, health, finance, defense industry, power, and energy.

 

N2SF 사이버안보 수행체계표

caption - Status of the National Cyber Security Execution System (Source: 2025 National Information Security White Paper)


Detailed classification considering Confidentiality, Integrity, and Availability

For special-purpose information systems such as Industrial Control Systems (ICS), it's important to consider not only confidentiality but also integrity and availability.

Imagine an information system A that measures the quantity and concentration of chemicals used for disinfection in water facilities and administers the chemicals.

The business information managed by information system A pertains to data on chemical quantity and concentration. If this information is affected by human error, mechanical failure, or cyber-attacks, it could impact public health and safety. Therefore, from a broader perspective, it is advisable to classify information system A as Class C(Classified). The C/S/O classification criteria suggested by the N²SF security guidelines are also based on the Information Disclosure Act and the Public Data Act, which instruct classifying systems impacting public health and safety as Class C.

Let's take a more detailed look by distinguishing business information and information systems and viewing them from the traditional security objectives of confidentiality, integrity, and availability.

First, let's examine business information. The business information handled by information system A (i.e., data on chemical quantity and concentration) is recommended to be classified as Class C from the perspective of integrity and availability. This is because if the data is corrupted, there is a risk of administering chemicals excessively (or insufficiently). If the data cannot be read (i.e., cannot be monitored), it becomes impossible to determine the appropriate level of chemical dosage, thus posing a risk of contaminated tap water supply. However, from the perspective of confidentiality, the business information might be classified as Class O(Open) to inform the public about water facility safety and utilize it as public data, considering societal benefits.

Next, let's look at the information systems processing the business information. Information system A, due to the potential risk of being targeted by an attack if its location and mechanical characteristics are disclosed, should be viewed as Class C from a confidentiality perspective. The perspectives of integrity and availability remain the same as discussed above.

Classification

C/S/O Classification

Confidentiality

Integrity

Availability

Business Information

(Chemical Quantity/Concentration)

O

C

C

Information System

(Chemical Administration Device)

C

C

C

As mentioned, the C/S/O classification for business information and the C/S/O classification for information systems can have different criteria based on their respective characteristics, which can maximize the application effect of N²SF.

Could organizations apply more detailed C/S/O classification criteria beyond the business information C/S/O classification criteria suggested by the N²SF security guidelines? Of course, in such cases, it is advisable to obtain judgment through prior consultation with the National Intelligence Service, which oversees security reviews.

Is N²SF a risk management framework?

Then, eventually, we ask this question.

“IsSF a Risk Management Framework?”

According to the officially announced materials and security guidelines during the development of N²SF, it is mentioned that N²SF was developed with reference to the NIST RMF, a risk management framework.

In short, it can be seen as a “Korean-type public risk management framework” developed to suit our country's governance environment. Here, the governance environment refers to the C/S/O classification system based on the Information Disclosure Act and the Public Data Act, and the linkage to the National Intelligence Service's security review.

Since N²SF clearly specifies the target and scope as the informatization projects of each agency, it is difficult to see it as a universal risk management framework that has a cycle through monitoring and constant judgment after security control application. Rather, it is more appropriate to see it as a methodology developed with reference to part of the risk management framework to standardize the process of establishing self-security measures submitted during security reviews.

However, since the related roadmap for developing into a “National Cybersecurity Framework” has been announced, it is expected to gradually develop into a universal risk management framework.

Considering that the United States started NIST RMF in the early 2000s and has been developing it for over 20 years, we have just taken the first step, which deserves applause for a bold first move.

 


 

Enki White Hat, based on more real-world attack TTPs than North Korean hacking organizations and penetration testing (mock hacking) know-how in various industry sectors, identifies threats from the attacker’s perspective, automatically links them to security control items, and evaluates their appropriateness through real-world mock hacking with a dedicated N²SF consulting methodology, and is preparing education and training services acrossSF.

※This article is based on the 'National Network Security System (N²SF) Security Guidelines (Draft)' released in January 2025, but it is disclosed that it includes some subjective viewpoints of the company.

Director Lee Cheol-ho
Director Lee Cheol-ho

Lee Cheol-ho

Lee Cheol-ho

Enki Whitehat Lab Director / CTO
Enki Whitehat Lab Director / CTO

· 2022~Present: Director and CTO at EnkiWhiteHat Research Institute · 2004~Present: Senior Researcher at ETRI's National Security Research Institute (Currently seconded to EnkiWhiteHat under the SME Research Workforce Dispatch Support Project) · 2024: Contributor to Ministry of Science and ICT/KISA Zero Trust Guidelines 2.0 · 2024: Member of the Private Task Force for National Network Security System

· 2022~Present: Director and CTO at EnkiWhiteHat Research Institute · 2004~Present: Senior Researcher at ETRI's National Security Research Institute (Currently seconded to EnkiWhiteHat under the SME Research Workforce Dispatch Support Project) · 2024: Contributor to Ministry of Science and ICT/KISA Zero Trust Guidelines 2.0 · 2024: Member of the Private Task Force for National Network Security System

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.