{"id":63056,"date":"2025-01-09T03:29:51","date_gmt":"2025-01-09T11:29:51","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/siem-%ec%86%94%eb%a3%a8%ec%85%98-%ed%8f%89%ea%b0%80-%eb%b0%a9%eb%b2%95"},"modified":"2025-12-14T11:26:27","modified_gmt":"2025-12-14T19:26:27","slug":"siem-evaluation-guide","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/ko\/guides\/siem-evaluation-guide","title":{"rendered":"SIEM \uc194\ub8e8\uc158 \ud3c9\uac00 \ubc29\ubc95"},"content":{"rendered":"\n<p>\uc0c8\ub85c\uc6b4 \ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac(<a href=\"https:\/\/www.sumologic.com\/guides\/siem\/\">SIEM<\/a>) \uc194\ub8e8\uc158\uc774 \ud544\uc694\ud55c\uc9c0 \uc5b4\ub5bb\uac8c \uc54c \uc218 \uc788\uc744\uae4c\uc694? \ub2e4\uc74c\uc740 \uc0c8\ub85c\uc6b4 <a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/cloud-siem\">SIEM \uc194\ub8e8\uc158<\/a>\uc744 \uac80\ud1a0\ud574\uc57c \ud560 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \uc774\uc720\ub4e4\uc785\ub2c8\ub2e4.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\ucd5c\uadfc\uc758 \ubcf4\uc548 \uc0ac\uace0\uc640 <\/strong><a href=\"https:\/\/www.sumologic.com\/blog\/is-your-penetration-testing-weak\"><strong>\uce68\ud22c \ud14c\uc2a4\ud2b8<\/strong><\/a>\ub294 \uacbd\uac01\uc2ec\uc744 \uc77c\uae68\uc6cc \uc90d\ub2c8\ub2e4. \uc774\ub4e4\uc740 \ub354 \uc774\uc0c1 \ubb34\uc2dc\ud560 \uc218 \uc5c6\ub294 \ucde8\uc57d\uc810\uacfc \ubcf4\uc548 \uacf5\ubc31\uc744 \ub4dc\ub7ec\ub0b4\uba70, \uc55e\uc73c\ub85c \uc194\ub8e8\uc158\uc5d0 \ud544\uc694\ud558\uac8c \ub420 \ud575\uc2ec \uc5ed\ub7c9\uc774 \ubb34\uc5c7\uc778\uc9c0 \uba85\ud655\ud788 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uaddc\uc81c \uc694\uac74 \ubc0f \ubcc0\uacbd \uc0ac\ud56d<\/strong>\uc740 \ub2e8\uc21c\ud55c \ud589\uc815 \uc808\ucc28\uac00 \uc544\ub2c8\ub77c, \ub9c9\ub300\ud55c \uc81c\uc7ac\ub97c \ud53c\ud558\uae30 \uc704\ud574 \ubc18\ub4dc\uc2dc \uac16\ucdb0\uc57c \ud558\ub294 \uac15\ub825\ud55c \ubcf4\uc548 \uc870\uce58\ub97c \uc694\uad6c\ud558\ub294 \uc911\uc694\ud55c \uc758\ubb34\uc785\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc0c8\ub85c\uc6b4 \uc2dc\uc7a5 \uc9c4\ucd9c\uc774\ub098 \ucca8\ub2e8 \uae30\uc220 \ub3c4\uc785 \ub4f1\uc758 \uc131\uc7a5 \uc804\ub7b5<\/strong>\uc740 \ud655\uc7a5\uc131\uacfc \uc720\uc5f0\uc131\uc744 \uac16\ucd98 \ubcf4\uc548 \uc194\ub8e8\uc158\uc744 \ud544\uc694\ub85c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc608\uc0b0 \ud3b8\uc131 \uc2dc\uae30<\/strong>\ub294 \ub178\ud6c4\ud558\uac70\ub098 \ubd88\ucda9\ubd84\ud55c \uc194\ub8e8\uc158\uc744 \uacc4\uc18d \uc720\uc9c0\ud558\ub294 \ub300\uc2e0, \ubcf4\uc548\uc5d0 \ud604\uba85\ud558\uac8c \ud22c\uc790\ud560 \uc218 \uc788\ub294 \ucd5c\uc801\uc758 \uae30\ud68c\uc785\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc5c5\uacc4 \uc778\uc218\ud569\ubcd1(M&amp;A)<\/strong>\uc740 \uae30\uc874 SIEM\uc774 <a href=\"https:\/\/www.sumologic.com\/ko\/blog\/navigate-changes-consolidation-siem-security-analytics\">\uc2dc\uc7a5 \ud1b5\ud569<\/a>\uc758 \ucda9\uaca9\uc744 \uacac\ub38c\ub0b4\uba74\uc11c\ub3c4 \uac15\ub825\ud55c \ubcf4\ud638 \uae30\ub2a5\uc744 \uc81c\uacf5\ud560 \uc218 \uc788\ub294\uc9c0\ub97c \uace0\ubbfc\ud558\uac8c \ub9cc\ub4ed\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-2bcbd51ede2ea3c301c93efde8498704\" id=\"features\">\ud604\uc7ac \uc0ac\uc6a9 \uc911\uc778 SIEM\uc740 \uba87 \uc138\ub300\uc778\uac00?<\/h2>\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-931e0909a4145d5b3f6c759d1da306d0\">SIEM \uc194\ub8e8\uc158\uc744 \ud3c9\uac00\ud558\ub824\uba74 \ud604\uc7ac \uc0ac\uc6a9 \uc911\uc778 SIEM\uc774 \uc5b4\ub290 \uc138\ub300\uc5d0 \uc18d\ud558\ub294\uc9c0 \uc774\ud574\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>1\uc138\ub300:<\/strong>\u00a0\uae30\ubcf8 <a href=\"https:\/\/www.sumologic.com\/guides\/log-management\/\">\ub85c\uadf8 \uad00\ub9ac<\/a> \ubc0f \ub2e8\uc21c \uc0c1\uad00\uad00\uacc4 \uae30\ub2a5 \uc911\uc2ec. \ub85c\uadf8\ub97c \uc218\uc791\uc5c5\uc73c\ub85c \ubd84\uc11d\ud558\ub294 \ubc29\ubc95\uc73c\ub85c \uc704\ud611\uc744 \uc2dd\ubcc4.<\/li>\n\n\n\n<li><strong>2\uc138\ub300:<\/strong>\u00a0\uc0c1\uad00\uad00\uacc4 \uc5d4\uc9c4 \uac1c\uc120, \ub300\uc2dc\ubcf4\ub4dc, \uae30\ubcf8\uc801\uc778 \uc778\uc2dc\ub358\ud2b8 \ub300\uc751 \uc6cc\ud06c\ud50c\ub85c \ub3c4\uc785\uc73c\ub85c \uac00\uc2dc\uc131\uacfc \ub300\uc751 \uc2dc\uac04 \ud5a5\uc0c1.<\/li>\n\n\n\n<li><strong>3\uc138\ub300:<\/strong>\u00a0\uc2e4\uc2dc\uac04 \ubaa8\ub2c8\ud130\ub9c1, \uc678\ubd80 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ud53c\ub4dc\uc640\uc758 \ud1b5\ud569, \ub0b4\ubd80 \uc704\ud611 \ud0d0\uc9c0\ub97c \uc704\ud55c \uc0ac\uc6a9\uc790 \ud589\ub3d9 \ubd84\uc11d(UBA) \uae30\ub2a5 \ud0d1\uc7ac.<\/li>\n\n\n\n<li><strong>4\uc138\ub300:<\/strong>\u00a04\uc138\ub300: \ud1b5\ud569 \uace0\uae09 \ubd84\uc11d,\u00a0<a href=\"https:\/\/www.sumologic.com\/ko\/blog\/machine-learning-deep-learning\">\uba38\uc2e0\ub7ec\ub2dd<\/a>,\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/soar\">SOAR<\/a>\u00a0\uae30\ub2a5\uc774 \ud1b5\ud569\ub418\uace0, \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd \ubc0f \ud558\uc774\ube0c\ub9ac\ub4dc \uc778\ud504\ub77c \uc9c0\uc6d0\uc774 \uac15\ud654\ub428.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"1116\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/SIEM-Market_800x372_x3.gif\" alt=\"\" class=\"wp-image-3085\" title=\"\"><\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"the-latest-generation-of-siem\"><strong>\ucd5c\uc2e0 \uc138\ub300 SIEM<\/strong><\/h3>\n\n<p>\uace7 \ucd9c\uc2dc\ub420 <a href=\"https:\/\/www.sumologic.com\/blog\/how-ai-will-impact-cybersecurity-the-beginning-of-fifth-gen-siem\"><strong>5\uc138\ub300 SIEM<\/strong><\/a>\uc740 \uc774\uc804 \uc138\ub300\ub97c \ud06c\uac8c \ub6f0\uc5b4\ub118\ub294 \ubc1c\uc804\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \uadf8 \ud575\uc2ec \ud2b9\uc9d5\uc740 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sumologic.com\/blog\/ai-driven-low-noise-alerts\">AI \uae30\ubc18 \uc778\uc0ac\uc774\ud2b8<\/a>\ub97c \ud1b5\ud55c \ucd94\ucc9c \uc81c\uacf5 \ubc0f \uc608\uce21\uc801 \uc704\ud611 \ud0d0\uc9c0\u00b7\ub300\uc751<\/li>\n\n\n\n<li>\uc885\ud569\uc801\uc778 \ubcf4\uc548 \uad00\ub9ac\ub97c \uc704\ud55c \ud1b5\ud569 \ud50c\ub7ab\ud3fc \uac1c\ubc1c<\/li>\n\n\n\n<li><a href=\"https:\/\/www.sumologic.com\/blog\/devsecops-log-analysis-app-security\">\uac1c\ubc1c \ub77c\uc774\ud504\uc0ac\uc774\ud074 \uc804\ubc18\uc5d0 \uac78\uccd0 \ubcf4\uc548\uc744 \ub0b4\uc7ac\ud654\ud558\ub294 DevSecOps \ud1b5\ud569<\/a>\u00a0<\/li>\n\n\n\n<li>\uc704\ud611\uc744 \uc2e0\uc18d\ud788 \uc5b5\uc81c\ud558\uace0 \uc644\ud654\ud560 \uc218 \uc788\ub3c4\ub85d \uc790\ub3d9\ud654\ub41c \uc870\uce58.<\/li>\n\n\n\n<li>\ub300\uaddc\ubaa8 \uc5b8\uc5b4 \ubaa8\ub378(LLM)\uc744 \ud65c\uc6a9\ud558\uc5ec DevSecOps \ud300\uc774 \uc790\uc5f0\uc5b4\ub85c \uc194\ub8e8\uc158\uacfc \uc18c\ud1b5\ud558\uace0, \ud544\uc694\ud55c \uc870\uce58\ub97c \ucd94\ucc9c\ud558\uace0 \uc2e4\uc2dc\uac04 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4\uc640 \uc5f0\uacc4\ud558\uba70 \ub2e4\ub2e8\uacc4 \ud0d0\uc9c0\ub97c \uc9c0\uc6d0\ud558\uace0 \uc870\uc9c1 \ub9de\ucda4\ud615 \uc778\uc0ac\uc774\ud2b8\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"five-steps-to-evaluate-your-siem\">SIEM \ud3c9\uac00\uc758 \ub2e4\uc12f \uac00\uc9c0 \ub2e8\uacc4<\/h2>\n\n<p>SIEM \ud3c9\uac00\uc5d0\uc11c\ub294 <a href=\"https:\/\/www.sumologic.com\/solutions\/threat-detection-investigation\/\">\uc704\ud611 \ud0d0\uc9c0<\/a>, \uc870\uc0ac, \ub300\uc751(TDIR)\uacfc \uad00\ub828\ub41c \uacfc\uc81c\ub97c \ud574\uacb0\ud574\uc57c \ud569\ub2c8\ub2e4. \ud604\uc7ac SIEM \uc194\ub8e8\uc158\uc744 \ud3c9\uac00\ud560 \ub54c \ubc18\ub4dc\uc2dc \ubb3c\uc5b4\uc57c \ud560 \uc9c8\ubb38 \ub2e4\uc12f \uac00\uc9c0\uac00 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"1-are-you-collecting-the-right-logs\">1. \uc62c\ubc14\ub978 \ub85c\uadf8\ub97c \uc218\uc9d1\ud558\uace0 \uc788\ub294\uac00?<\/h3>\n\n<p><a href=\"https:\/\/www.sumologic.com\/blog\/future-sumo-logic-atomic-level-logs\">\ub85c\uadf8<\/a>\ub294 \ub514\uc9c0\ud138 \ucef4\ud4e8\ud305\uc758 \uac00\uc7a5 \uadfc\ubcf8\uc801\uc778 \uc0b0\ucd9c\ubb3c\ub85c, \ud074\ub77c\uc6b0\ub4dc \ubc0f \uae30\uc5c5 \uc778\ud504\ub77c\uc640 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc804\ubc18\uc5d0 \ub300\ud55c \uac15\ub825\ud55c \uc778\uc0ac\uc774\ud2b8\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \ud6a8\uacfc\uc801\uc778 \ub85c\uadf8 \uc218\uc9d1\uc740 <a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/cloud-siem\">\uacac\uace0\ud55c SIEM \uc194\ub8e8\uc158<\/a>\uc758 \ud575\uc2ec \uae30\ubc18\uc785\ub2c8\ub2e4. \uc778\uc2dc\ub358\ud2b8\ub97c \uc870\uc0ac\ud560 \ub54c\ub294 \ubaa8\ub4e0 \uc911\uc694\ud55c \ub85c\uadf8\uac00 \uc628\ub77c\uc778 \uc0c1\ud0dc\ub85c \ud655\ubcf4\ub418\uc5b4 \uc788\uc5b4\uc57c \ud558\uba70 \ubd84\uc11d \uacfc\uc815\uc5d0 \ud3ec\ud568\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4.\u00a0<\/p>\n\n<p>\uc77c\ubc18\uc801\uc73c\ub85c \ub85c\uadf8 \uc218\uc9d1\uc758 \uac00\uc7a5 \ud070 \uacfc\uc81c\ub294 \uc11c\ub85c \ub2e4\ub978 \ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc18c\uc2a4\ub97c \uc815\ud655\ud558\uace0 \ud6a8\uc728\uc801\uc73c\ub85c \uc9d1\uacc4\ud558\ub294 \ub370 \uc788\uc2b5\ub2c8\ub2e4. \ud655\uc7a5\uc131\uacfc \uc18d\ub3c4\ub294 \ud074\ub77c\uc6b0\ub4dc \ub124\uc774\ud2f0\ube0c SaaS \uc194\ub8e8\uc158\uc758 \ud575\uc2ec \ud2b9\uc9d5\uc73c\ub85c, SIEM\uc758 \ub85c\uadf8 \uc218\uc9d1 \uae30\ub2a5\uc744 \ud3c9\uac00\ud560 \ub54c \uc6b0\uc120\uc801\uc73c\ub85c \uace0\ub824\ud574\uc57c \ud560 \uc0ac\ud56d\uc785\ub2c8\ub2e4.<\/p>\n\n<p>\uc5d4\ud130\ud504\ub77c\uc774\uc988 \uc804\uccb4\uc758 \ubaa8\ub4e0 \ub85c\uadf8\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uc800\uc7a5\ud558\uace0 \ubd84\uc11d\ud560 \uc218 \uc788\ub3c4\ub85d \ub77c\uc774\uc120\uc2a4\uc640 \uc0ac\uc6a9\ub7c9 \uae30\ubc18 \uc694\uae08 \ubaa8\ub378\uc744 \uc81c\uacf5\ud558\ub294 \uc194\ub8e8\uc158\uc740 \ubd84\uc11d\uacfc \uc778\uc0ac\uc774\ud2b8 \ub3c4\ucd9c \uc804\uc5d0 \ub370\uc774\ud130\ub97c \uc900\ube44\u00b7\uac00\uacf5\u00b7\uc815\ub9ac\ud574\uc57c \ud558\ub294 \uc2dc\uac04\uc744 \uc904\uc5ec \uc870\uc0ac\uc5d0 \uc18c\uc694\ub418\ub294 \uc2dc\uac04\uc744 \uc218\uc2dc\uac04\uc5d0\uc11c \uc218\uc77c\uae4c\uc9c0 \ub2e8\ucd95\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.\u00a0<\/p>\n\n<p>\uacac\uace0\ud55c SIEM \uc194\ub8e8\uc158\uc740 \ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc18c\uc2a4\uc640 \uc6d0\ud65c\ud558\uac8c \ud1b5\ud569\ub418\uace0, \uc2e4\uc2dc\uac04 \ub370\uc774\ud130 \uc218\uc9d1\uc744 \uc9c0\uc6d0\ud574\uc57c \ud569\ub2c8\ub2e4. \ub610\ud55c <a href=\"https:\/\/www.sumologic.com\/guides\/opentelemetry\/\">\uc624\ud508 \ud154\ub808\uba54\ud2b8\ub9ac<\/a>\uc640 \uac19\uc774 \ubca4\ub354\uc5d0 \uad6c\uc560\ubc1b\uc9c0 \uc54a\ub294 \uc624\ud508\uc18c\uc2a4 \uae30\ubc18\uc758 \uc218\uc9d1 \uae30\uc220\uc744 \ube44\ub86f\ud55c \uc5ec\ub7ec \ub370\uc774\ud130 \ud3ec\ub9f7\uc744 \ucc98\ub9ac\ud558\uc5ec \ud3ec\uad04\uc801\uc774\uace0 \ud1b5\ud569\ub41c \ubcf4\uc548 \uad00\uc810\uc744 \uc81c\uacf5\ud574\uc57c \ud569\ub2c8\ub2e4.\u00a0<\/p>\n\n<p>\uc911\uc694\ud55c \ub370\uc774\ud130\ub97c \ub193\uce58\uc9c0 \uc54a\uace0 \ubcf4\uc548 \ud300\uc774 \uc704\ud611\uc744 \uc2e0\uc18d\ud558\uace0 \ud6a8\uacfc\uc801\uc73c\ub85c \ud0d0\uc9c0\u00b7\ub300\uc751\ud558\uae30 \uc704\ud574 \ud544\uc694\ud55c \uc815\ubcf4\ub97c \ud655\ubcf4\ud558\ub824\uba74 \ud3ec\uad04\uc801\uc778 \ub370\uc774\ud130 \uc218\uc9d1\uc774 \ubc18\ub4dc\uc2dc \ud544\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n<p><strong>\ub85c\uadf8 \uc218\uc9d1 \ud3c9\uac00 \uae30\uc900<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\ud3ec\uad04\uc801\uc778 \uc18c\uc2a4 \ud1b5\ud569<\/strong>: SIEM\uc774 \uc628\ud504\ub808\ubbf8\uc2a4, \ud074\ub77c\uc6b0\ub4dc, \ud558\uc774\ube0c\ub9ac\ub4dc \ud658\uacbd\uc744 \ud3ec\ud568\ud55c \ubaa8\ub4e0 \uad00\ub828 \uc18c\uc2a4\uc5d0\uc11c \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud560 \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ub85c\uadf8, \ub124\ud2b8\uc6cc\ud06c \ud50c\ub85c\uc6b0, \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ub370\uc774\ud130, \ub2e4\uc591\ud55c SaaS \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ub370\uc774\ud130\uac00 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc2e4\uc2dc\uac04 \ub370\uc774\ud130 \uc218\uc9d1<\/strong>: SIEM\uc774 \uc2e4\uc2dc\uac04\uc73c\ub85c \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud558\uc5ec \uc0c8\ub85c\uc6b4 \uc704\ud611\uc744 \uc2e0\uc18d\ud558\uac8c \ud0d0\uc9c0\ud558\uace0 \ub300\uc751\ud560 \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc720\ud615 \uc9c0\uc6d0<\/strong>: SIEM\uc740 \ub85c\uadf8, \uc774\ubca4\ud2b8, \uba54\ud2b8\ub9ad \ub4f1 \uc870\uc9c1\uc758 <a href=\"https:\/\/www.sumologic.com\/blog\/improve-security-posture-velocity-visibility-vectors\">\ubcf4\uc548 \ud0dc\uc138<\/a>\ub97c \ucd1d\uccb4\uc801\uc73c\ub85c \ud30c\uc545\ud558\ub294 \ub370 \ud544\uc694\ud55c \uad11\ubc94\uc704\ud55c \ub370\uc774\ud130 \uc720\ud615\uc744 \uc9c0\uc6d0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub85c\uadf8 \uc800\uc7a5 \ubc0f \ub370\uc774\ud130 \ubcf4\uc874<\/strong>: \ubcf4\uc548 \ub85c\uadf8 \ub370\uc774\ud130\uac00 \uc800\uc7a5 \uc2dc AES-256\uc73c\ub85c \uc554\ud638\ud654\ub418\uace0 \uc804\uc1a1 \uc2dc TLS\ub85c \uc554\ud638\ud654\ub418\uc5b4 \ubcf4\ud638\ub418\uba70, \ucd5c\ub300 7\ub144 \ub610\ub294 \uc0b0\uc5c5\ubcc4 \uaddc\uc81c \uae30\uad00\uc774 \uc694\uad6c\ud558\ub294 \uae30\uac04 \ub3d9\uc548 \ubcf4\uc874\ub418\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub85c\uadf8 \uacbd\uc81c\uc131<\/strong>: \uc911\uc694\ud55c \ub370\uc774\ud130 \ud750\ub984\uc744 \uc720\uc9c0\ud558\uba74\uc11c\ub3c4 \uacfc\ub3c4\ud558\uac8c \ube44\uc6a9\uc774 \ucd08\uacfc\ub418\uc9c0 \uc54a\ub3c4\ub85d SIEM\uc5d0 <a href=\"https:\/\/www.sumologic.com\/blog\/devsecops-ai-disruptive-log-economics\">\ub85c\uadf8\uc758 \uacbd\uc81c\uc131<\/a>\uacfc <a href=\"https:\/\/www.sumologic.com\/blog\/log-everything-zero-dollar-ingest\">\ubcf4\uc548 \ub370\uc774\ud130\uc758 \uc720\uc5f0\ud55c \uac00\uaca9 \ubaa8\ub378<\/a>\uc774 \uc81c\uacf5\ub418\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4. \uac00\ub2a5\ud558\uba74 \uc778\uc81c\uc2a4\ud2b8 \uae30\ubc18 \ubaa8\ub378 \ub300\uc2e0 <a href=\"https:\/\/www.sumologic.com\/ko\/pricing\">\uc2a4\uce94\ub2f9 \uac00\uaca9<\/a> \ubaa8\ub378\uc744 \ud3ec\ud568\ud558\ub294 \uac83\uc774 \ubc14\ub78c\uc9c1\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud544\uc218 \uae30\ub2a5<\/strong>: \uc628\ud504\ub808\ubbf8\uc2a4 \ub610\ub294 \ud074\ub77c\uc6b0\ub4dc \uc778\ud504\ub77c \ub0b4\uc758 \uad11\ubc94\uc704\ud55c \uc790\uc0b0\uc73c\ub85c\ubd80\ud130 \uc778\ud504\ub77c \uc138\ubd80 \uc815\ubcf4\uc640 \ubcf4\uc548 \uad00\ub828 \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud558\ub294 \uae30\ub2a5.<span style=\"font-family: inherit; font-size: inherit; font-weight: inherit; background-color: var(--bs-body-bg); text-align: var(--bs-body-text-align);\"><\/span><br\/><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud45c\uc900 \uae30\ub2a5<\/strong>: \uc704\ud611 \ud0d0\uc9c0, \uc0ac\uc6a9 \uc0ac\ub840, \ubcf4\uace0, \uc0ac\uace0 \uc870\uc0ac\ub97c \uc704\ud574 \uc5ec\ub7ec \uc774\ubca4\ud2b8 \uc18c\uc2a4\ub85c\ubd80\ud130 \ub85c\uadf8 \uc2a4\ud2b8\ub9bc, API, \ud30c\uc77c \ucc98\ub9ac \ub4f1 \ub2e4\uc591\ud55c \uba54\ucee4\ub2c8\uc998\uc744 \ud1b5\ud574 \uc774\ubca4\ud2b8 \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud560 \uc218 \uc788\ub3c4\ub85d \ud5c8\uc6a9\ud558\ub294 \uae30\ub2a5.<br\/> <em style=\"font-size: 17px; font-family: inherit; text-align: var(--bs-body-text-align);\">Gartner, \u201c\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant),\u201d \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"2-how-is-data-transformed-in-your-siem\">2. SIEM\uc5d0\uc11c\ub294 \ub370\uc774\ud130\uac00 \uc5b4\ub5bb\uac8c \ubcc0\ud658\ub418\ub294\uac00?<\/h3>\n\n<p>\ub370\uc774\ud130\uac00 \uc218\uc9d1\ub418\uba74, SIEM\uc740 \ubd84\uc11d\uc5d0 \ud65c\uc6a9\ud558\uace0 \uc2e4\ud589 \uac00\ub2a5\ud55c \ud6c4\uc18d \uc870\uce58\ub97c \ub3c4\ucd9c\ud560 \uc218 \uc788\ub3c4\ub85d \ub370\uc774\ud130\ub97c \uc0ac\uc6a9 \uac00\ub2a5\ud55c \ud615\uc2dd\uc73c\ub85c \ubcc0\ud658\ud569\ub2c8\ub2e4. \ub370\uc774\ud130\ub294 \uc815\uaddc\ud654, \uc778\ub9ac\uce58\uba3c\ud2b8, \uc0c1\uad00\uad00\uacc4 \ucc98\ub9ac \ub4f1\uc758 \ubcc0\ud658 \uacfc\uc815\uc744 \uac70\uce58\uac8c \ub429\ub2c8\ub2e4. \uc774\ub97c \ud1b5\ud574 \uc6d0\uc2dc \ub370\uc774\ud130\uac00 \ube44\ub85c\uc18c \uc758\ubbf8 \uc788\ub294 \uc778\uc0ac\uc774\ud2b8\ub85c \uc804\ud658\ub429\ub2c8\ub2e4. \uc815\ubcf4 \ubcf4\uc548 \ubd84\uc57c\uc758 \ubd84\uc11d \ub2f4\ub2f9\uc790\ub294 \ub2e4\uc591\ud55c \uc18c\uc2a4\ub85c\ubd80\ud130 \ub4e4\uc5b4\uc624\ub294 \ubc29\ub300\ud55c \ub370\uc774\ud130\uc758 \uc758\ubbf8\ub97c \ud30c\uc545\ud574\uc57c \ud558\ub294 \ub9c9\uc911\ud55c \uacfc\uc81c\uc5d0 \uc9c1\uba74\ud569\ub2c8\ub2e4. \uc801\uc808\ud55c \ub370\uc774\ud130 \ubcc0\ud658\uc774 \uc774\ub8e8\uc5b4\uc9c0\uba74 \uc774\ub7ec\ud55c \ub370\uc774\ud130\uac00 \ub354 \uc77c\uad00\ub418\uace0 \ubd84\uc11d\ud558\uae30 \uc26c\uc6b4 \ud615\ud0dc\ub85c \uc804\ud658\ub429\ub2c8\ub2e4.\u00a0<\/p>\n\n<p><a href=\"https:\/\/www.sumologic.com\/blog\/whats-going-on-normalization-cloud-siem\"><strong>\uc815\uaddc\ud654<\/strong><\/a> \uacfc\uc815\uc740 \ub124\ud2b8\uc6cc\ud06c \ud65c\ub3d9\uc744 \uc774\ud574\ud558\ub294 \ub370 \ud575\uc2ec\uc801\uc785\ub2c8\ub2e4. \uc815\uaddc\ud654\ub294 \uc5ec\ub7ec \ucd9c\ucc98\uc5d0\uc11c \ub4e4\uc5b4\uc624\ub294 \uc11c\ub85c \ub2e4\ub978 \ub370\uc774\ud130\ub97c \ub2e8\uc77c \ud615\uc2dd \ub610\ub294 \uc2a4\ud0a4\ub9c8\ub85c \ubcc0\ud658\ud558\uc5ec \ubd84\uc11d\uc744 \ub2e8\uc21c\ud654\ud569\ub2c8\ub2e4. \ub9ce\uc740 \uc194\ub8e8\uc158\uc774 \uc815\uaddc\ud654 \uae30\ub2a5\uc744 \uc81c\uacf5\ud55c\ub2e4\uace0 \uc8fc\uc7a5\ud558\uc9c0\ub9cc, \uc2e4\uc81c \uad6c\ud604 \uc2dc \ud6a8\uacfc\uc131\uacfc \uc0ac\uc6a9 \ud3b8\uc758\uc131 \uce21\uba74\uc5d0\uc11c \uae30\ub300\uc5d0 \ubbf8\uce58\uc9c0 \ubabb\ud558\ub294 \uacbd\uc6b0\uac00 \ub9ce\uc2b5\ub2c8\ub2e4. \uc815\uaddc\ud654\ub294 \ud0d0\uc9c0 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1, \uc704\ud611 \ud5cc\ud305, \ubcf4\uc548 \uc6b4\uc601\uc758 \uc911\uc2ec\ucd95\uc73c\ub85c, \uc6d0\uc2dc \uba54\uc2dc\uc9c0\ub97c \ud45c\uc900\ud654\ub41c \ub808\ucf54\ub4dc\ub85c \ubcc0\ud658\ud558\uc5ec \uc6d0\ud65c\ud55c \ucffc\ub9ac\uc640 \ubd84\uc11d\uc744 \uac00\ub2a5\ud558\uac8c \ud569\ub2c8\ub2e4.\u00a0<\/p>\n\n<p>\ubaa8\ub4e0 \uc2a4\ud0a4\ub9c8\uac00 \ub3d9\uc77c\ud558\uac8c \ub9cc\ub4e4\uc5b4\uc9c0\ub294 \uac83\uc740 \uc544\ub2d9\ub2c8\ub2e4. \uc815\uaddc\ud654\uc758 \uac15\uc810\uc740 \uc815\ud615 \ub370\uc774\ud130\uc640 \ube44\uc815\ud615 \ub370\uc774\ud130\ub97c \ubaa8\ub450 \ucc98\ub9ac\ud560 \uc218 \uc788\ub294 \ud30c\uc11c(parser)\uc640 \ub9e4\ud37c(mapper)\uc758 \ud65c\uc6a9\uc5d0 \uc788\uc2b5\ub2c8\ub2e4. \ud30c\uc11c\ub294 \uc6d0\uc2dc \ub370\uc774\ud130\ub97c \ub514\ucf54\ub529\ud558\uace0 \ud575\uc2ec \uc815\ubcf4\ub97c \ucd94\ucd9c\ud558\uc5ec \uc77d\uc744 \uc218 \uc788\ub3c4\ub85d \uad6c\uc870\ud654\ub41c \ud615\uc2dd\uc73c\ub85c \ubcc0\ud658\ud569\ub2c8\ub2e4. \uadf8\ub2e4\uc74c \ub9e4\ud37c\ub294 \uc774 \ub370\uc774\ud130\ub97c \uc0ac\uc804\uc5d0 \uc815\uc758\ub41c \uc2a4\ud0a4\ub9c8\uc5d0 \ub530\ub77c \uc815\ub82c\ud558\uc5ec \uc11c\ub85c \ub2e4\ub978 \ub370\uc774\ud130 \uc18c\uc2a4 \uac04\uc5d0 \uc77c\uad00\uc131\uc744 \ud655\ubcf4\ud569\ub2c8\ub2e4. \uc774 \uacfc\uc815\uc740 \ud2b9\ud788 \ud615\uc2dd\uacfc \ub0b4\uc6a9\uc774 \ub9e4\uc6b0 \ub2e4\uc591\ud558\uc9c0\ub9cc \uc911\uc694\ud55c \uc0ac\uc6a9\uc790 \uc815\uc758 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc778\uc0ac\uc774\ud2b8\ub97c \ud3ec\ud568\ud558\ub294 \uacbd\uc6b0\uac00 \ub9ce\uc740 \ube44\uc815\ud615 \ub370\uc774\ud130\ub97c \ucc98\ub9ac\ud560 \ub54c \ub354\uc6b1 \uc911\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n<p><a href=\"https:\/\/www.sumologic.com\/blog\/data-tagging-classification-enrichment\"><strong>\uc778\ub9ac\uce58\uba3c\ud2b8<\/strong><\/a>\ub294 \uc815\uaddc\ud654\ub41c \ub370\uc774\ud130\uc5d0 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ud53c\ub4dc, \uc790\uc0b0 \ub370\uc774\ud130 \ub4f1\uc758 \ucee8\ud14d\uc2a4\ud2b8 \uc815\ubcf4\ub97c \ucd94\uac00\ud558\uc5ec \ubd84\uc11d \ub2f4\ub2f9\uc790\uac00 \ub370\uc774\ud130\uc758 \uc758\ubbf8\ub97c \uc774\ud574\ud558\uace0 \uc704\ud611\uc744 \ub354 \uc27d\uac8c \ud0d0\uc9c0\ud558\uace0 \ub300\uc751\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uac00\uce58 \uc788\ub294 \ucee8\ud14d\uc2a4\ud2b8\ub97c \ub808\ucf54\ub4dc\uc5d0 \ucd94\uac00\ud558\uba74 \ub370\uc774\ud130\ub294 \ub354 \ud48d\ubd80\ud574\uc9c0\uace0 \uc2e4\ud589 \uac00\ub2a5\ud55c \uc815\ubcf4\uac00 \ub429\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \uba85\ub839\uc904(command-line) \ub370\uc774\ud130\uc5d0 <a href=\"https:\/\/www.sumologic.com\/application\/integrated-threat-intelligence\/\">\uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4<\/a>\ub97c \uacb0\ud569\ud558\uba74 \uc774\ubbf8 \uc54c\ub824\uc9c4 \uc545\uc758\uc801 \uba85\ub839\uc744 \uc2dd\ubcc4\ud560 \uc218 \uc788\uc5b4 \ud0d0\uc9c0\uc758 \uc815\ud655\ub3c4\uc640 \uc870\uc0ac \ud488\uc9c8\uc744 \ud5a5\uc0c1\uc2dc\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n<p><strong>\ub370\uc774\ud130 \ubcc0\ud658 \ud3c9\uac00 \uae30\uc900<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc815\uaddc\ud654\uc758 \ud6a8\uacfc: <\/strong>SIEM\uc774 \uacf5\ud1b5 \uc2a4\ud0a4\ub9c8\ub97c \uc77c\uad00\ub418\uace0 \uc815\ud655\ud558\uac8c \uc801\uc6a9\ud558\uba70 \ud544\ub4dc \uc774\ub984\uc744 \uc815\ud655\ud788 \ub9e4\ud551\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud30c\uc11c \ubc0f \ub9e4\ud37c \ud488\uc9c8: <\/strong>\ud30c\uc11c\uc758 \uc815\ud655\uc131, \ub9e4\ud37c\uc758 \ud6a8\uc728\uc131, \ud30c\uc11c \uc5c5\ub370\uc774\ud2b8\uc758 \uc6a9\uc774\uc131\uc744 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc131\ub2a5 \ubc0f \ud655\uc7a5\uc131:<\/strong> \ucc98\ub9ac \uc18d\ub3c4, \ub300\ub7c9 \ub370\uc774\ud130 \ucc98\ub9ac \ub2a5\ub825, \ube44\uc815\ud615 \ub370\uc774\ud130 \ucc98\ub9ac \ub2a5\ub825, \ub9ac\uc18c\uc2a4 \uc0ac\uc6a9 \ud6a8\uc728\uc131\uc744 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud1b5\ud569 \uc5ed\ub7c9: <\/strong>\ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc18c\uc2a4\uc640\uc758 \ud638\ud658\uc131, <a href=\"https:\/\/www.sumologic.com\/glossary\/api\">API<\/a> \ubc0f \ud50c\ub7ec\uadf8\uc778 \uc9c0\uc6d0, \uae30\uc874 \uc2dc\uc2a4\ud15c\uacfc\uc758 \uc0c1\ud638\uc6b4\uc6a9\uc131\uc744 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ucee8\ud14d\uc2a4\ud2b8 \ub370\uc774\ud130 \ud1b5\ud569: <\/strong>SIEM\uc740 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ud53c\ub4dc\uc640 \uc790\uc0b0 \ub370\uc774\ud130\ub97c \uc548\uc815\uc801\uc73c\ub85c \ud1b5\ud569\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc815\ud655\uc131\uacfc \uad00\ub828\uc131: <\/strong>SIEM \ub370\uc774\ud130 \ubcc0\ud658 \uacfc\uc815\uc5d0\uc11c \ucd94\uac00\ub418\ub294 \ucee8\ud14d\uc2a4\ud2b8 \uc815\ubcf4\uac00 \uc5bc\ub9c8\ub098 \uc815\ud655\ud558\uace0 \uad00\ub828\uc131\uc774 \ub192\uc740\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc0ac\uc6a9 \ud3b8\uc758\uc131: <\/strong>\uc0ac\uc6a9\uc790 \uc778\ud130\ud398\uc774\uc2a4\uac00 \uc9c1\uad00\uc801\uc778\uc9c0, \uc124\uc815\uc774 \ub2e8\uc21c\ud558\uace0 \uc720\uc5f0\ud55c\uc9c0, \uc790\ub3d9\ud654 \ubc0f \uc870\uc0ac \ud2b8\ub9ac\uac70 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294\uc9c0, \uc9c0\uc6d0\uc774 \ucda9\ubd84\ud55c\uc9c0\ub97c \uac80\ud1a0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud0d0\uc9c0 \ubc0f \ub300\uc751\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5:<\/strong> SIEM\uc774 \ud0d0\uc9c0 \uc815\ud655\ub3c4\uc640 \uc870\uc0ac \ud6a8\uc728\uc131\uc744 \ud5a5\uc0c1\uc2dc\ud0ac \uc218 \uc788\ub294 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc131\ub2a5 \ubc0f \ud655\uc7a5\uc131: <\/strong>SIEM\uc774 \ub370\uc774\ud130 \uc99d\uac00\uc5d0 \ub530\ub77c \ud0c4\ub825\uc801\uc73c\ub85c \ud655\uc7a5\ub418\uace0 \ub300\ub7c9 \ub370\uc774\ud130\ub97c \ud6a8\uc728\uc801\uc73c\ub85c \ucc98\ub9ac\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud544\uc218 \uae30\ub2a5<\/strong>: \ubd84\uc11d, \ub370\uc774\ud130 \uc815\uaddc\ud654, \uc218\uc9d1, \uc778\ub9ac\uce58\uba3c\ud2b8\uc640 \uac19\uc740 \uc601\uc5ed\uc5d0\uc11c SIEM \ubca4\ub354 \ucf58\ud150\uce20\uc640 \uace0\uac1d\uc774 \uc0dd\uc131\ud55c \ucf58\ud150\uce20\ub97c \uc9c0\uc6d0\ud560 \uc218 \uc788\ub294 \uae30\ub2a5.<br\/><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud45c\uc900 \uae30\ub2a5<\/strong>: \ud0c0\uc0ac \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc81c\uacf5\ub418\ub294 \uc815\uaddc\ud654, \uc778\ub9ac\uce58\uba3c\ud2b8, \uc704\ud5d8 \uc810\uc218 \ub370\uc774\ud130.<br\/><em>Gartner, \u201c\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant),\u201d \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"3-does-your-siem-offer-advanced-analytics\">3. SIEM\uc740 \uace0\uae09 \ubd84\uc11d \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294\uac00?<\/h3>\n\n<p>\ub370\uc774\ud130 \ubd84\uc11d\uc740 SIEM \uc194\ub8e8\uc158\uc5d0\uc11c \uc815\uad50\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc744 \ud0d0\uc9c0\ud558\ub294 \ud575\uc2ec \ub3d9\ub825\uc785\ub2c8\ub2e4. AI \uae30\ubc18 \uc704\ud611 \ud0d0\uc9c0 \ubc0f \uc778\uc0ac\uc774\ud2b8 \uad00\ub9ac \ub4f1 \uace0\uae09 \ubd84\uc11d \uae30\ub2a5\uc740 <a href=\"https:\/\/www.sumologic.com\/guides\/machine-data-analytics\/\">\uba38\uc2e0\ub7ec\ub2dd\uc744 \ud65c\uc6a9\ud574 \ubc29\ub300\ud55c \ub370\uc774\ud130\ub97c \ubd84\uc11d<\/a>\ud558\uace0 \uae30\uc874 \ubc29\uc2dd\uc73c\ub85c\ub294 \ub193\uce60 \uc218 \uc788\ub294 \ud328\ud134\uc744 \uc2dd\ubcc4\ud569\ub2c8\ub2e4. \uba38\uc2e0\ub7ec\ub2dd \ubaa8\ub378\uc744 \ud1b5\ud569\ud55c SIEM \uc194\ub8e8\uc158\uc740 \uc0c8\ub85c\uc6b4 \uc704\ud611 \ud328\ud134\uc5d0 \uc801\uc751\ud558\uba74\uc11c \uc2dc\uac04\uc774 \uc9c0\ub0a0\uc218\ub85d \ud0d0\uc9c0 \ub2a5\ub825\uc744 \ud5a5\uc0c1\uc2dc\ucf1c \uc704\ud611 \ud0d0\uc9c0\ub97c \uac15\ud654\ud569\ub2c8\ub2e4.<\/p>\n\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/ueba\">\uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud130\ud2f0 \ud589\ub3d9 \ubd84\uc11d<\/a>(UEBA)\uc740 \ud604\ub300\uc801\uc778 SIEM \uc194\ub8e8\uc158\uc5d0\uc11c \ub9e4\uc6b0 \uc911\uc694\ud55c \uc694\uc18c\ub85c, \uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud130\ud2f0 \ud65c\ub3d9\uc5d0 \ub300\ud55c \uc2ec\uce35\uc801 \uc778\uc0ac\uc774\ud2b8\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. UEBA\ub294 \uc815\uc0c1 \ud589\ub3d9\uc5d0 \ub300\ud55c \uc0c1\uc138\ud55c \ud504\ub85c\ud30c\uc77c\uc744 \uc0dd\uc131\ud558\uace0 \ud3b8\ucc28\ub97c \ud0d0\uc9c0\ud558\uc5ec \uae30\uc874 \ubaa8\ub2c8\ud130\ub9c1 \ubc29\uc2dd\uc73c\ub85c\ub294 \ub193\uce60 \uc218 \uc788\ub294 \ubcf4\uc548 \uc704\ud611\uc744 \ub354 \uc815\ud655\ud558\uac8c \uc2dd\ubcc4\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4. \ud2b9\ud788 <em>\uc5d4\ud130\ud2f0 \uc911\uc2ec<\/em>\uc758 \ud0d0\uc9c0 \uc0c1\uad00\uad00\uacc4\uc640 \ud328\ud134 \uc778\uc2dd\uc740 \ud6a8\uacfc\uc801\uc778 \uc704\ud611 \ud0d0\uc9c0\uc758 \ud575\uc2ec \uad6c\uc131 \uc694\uc18c\uc785\ub2c8\ub2e4. SIEM \uc194\ub8e8\uc158\uc740 \ub2e4\uc591\ud55c \uc18c\uc2a4\uc5d0\uc11c \uc218\uc9d1\ub41c \ub370\uc774\ud130\ub97c \uc5f0\uacb0\ud558\uc5ec \uac1c\ubcc4 \ub370\uc774\ud130\ub9cc\uc73c\ub85c\ub294 \ub4dc\ub7ec\ub098\uc9c0 \uc54a\ub294 \ubcf5\uc7a1\ud55c \uacf5\uaca9 \ud328\ud134\uc744 \uc2dd\ubcc4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/saas\">SaaS<\/a> \uae30\ubc18 SIEM \uc194\ub8e8\uc158\uc740 \uc870\uc815\ud560 \uc218 \uc788\ub294 <a href=\"https:\/\/help.sumologic.com\/docs\/cse\/get-started-with-cloud-siem\/insight-generation-process\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc0ac\uc6a9\uc790 \uc9c0\uc815 \uaddc\uce59 \uc5d4\uc9c4<\/a> \ub4f1 \uc720\uc9c0\uad00\ub9ac, \uc5c5\ub370\uc774\ud2b8, \ud0d0\uc9c0 \uaddc\uce59 \uc0dd\uc131 \uce21\uba74\uc5d0\uc11c \ud070 \uc774\uc810\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. <a href=\"https:\/\/www.sumologic.com\/blog\/iaas-paas-saas\">SaaS \uc81c\uacf5 \ubaa8\ub378<\/a>\uc758 \ub610 \ub2e4\ub978 \ud575\uc2ec \uc694\uc18c\ub294 \uc804\ubb38 \uc704\ud611 \uc5f0\uad6c\ud300\uc774 \ud050\ub808\uc774\uc158\ud55c \uc0c8\ub85c\uc6b4 \ud0d0\uc9c0 \uaddc\uce59\uacfc \uc5c5\ub370\uc774\ud2b8\ub41c \uaddc\uce59\uc744 \uc989\uc2dc \ubc18\uc601\ud574 \ubcf4\uc548 \ucf58\ud150\uce20\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uace0 \uc0c8\ub85c\uc6b4 \uacf5\uaca9\uc5d0 \ub300\ube44\ud560 \uc218 \uc788\ub2e4\ub294 \uc810\uc785\ub2c8\ub2e4.<\/p>\n\n<p>\uc774\ub7ec\ud55c AI \uae30\ubc18 \uae30\ub2a5\uc744 \ud1b5\ud569\ud558\uba74 SIEM \uc194\ub8e8\uc158\uc774 \uc870\uc9c1\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \ud544\uc694\ud55c \ub3c4\uad6c\ub97c \ubcf4\uc548 \ud300\uc5d0 \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. SaaS \uc81c\uacf5 \ubaa8\ub378\uc740 \ucd5c\uc2e0 \uc704\ud611 \ud0d0\uc9c0 \ubc0f \ubd84\uc11d \uae30\uc220\ub85c SIEM\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud558\uc5ec \uc2e0\uc885 \uc704\ud611\uc5d0 \ub300\ud55c \uc9c0\uc18d\uc801\uc778 \ubcf4\ud638\ub97c \ubcf4\uc7a5\ud55c\ub2e4\ub294 \uc810\uc5d0\uc11c \uc774\ub7ec\ud55c \uc5ed\ub7c9\uc744 \ub354\uc6b1 \uac15\ud654\ud569\ub2c8\ub2e4.<\/p>\n\n<p><strong>\uace0\uae09 \ubd84\uc11d \ud3c9\uac00 \uae30\uc900<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc774\uc0c1 \uc9d5\ud6c4 \ud0d0\uc9c0<\/strong>: SIEM\uc774 \uc0ac\uc6a9\uc790 \ubc0f \uc2dc\uc2a4\ud15c\uc758 \uc815\uc0c1 \ud589\ub3d9\uc5d0\uc11c \ubc97\uc5b4\ub09c \ud3b8\ucc28\ub97c \uac15\uc870 \ud45c\uc2dc\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \uc7a0\uc7ac\uc801 \ubcf4\uc548 \uc0ac\uace0 \uc2dd\ubcc4\uc5d0 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud589\ub3d9 \ubd84\uc11d<\/strong>: SIEM\uc774 \uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud130\ud2f0 \ud65c\ub3d9\uc744 \uc5bc\ub9c8\ub098 \uc798 \ubaa8\ub2c8\ud130\ub9c1\ud574 \ube44\uc815\uc0c1 \ud589\ub3d9\uc744 \ud0d0\uc9c0\ud558\ub294\uc9c0 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 \uc704\ud611\uacfc \ub0b4\ubd80\uc790 \uc704\ud611\uc744 \uc2dd\ubcc4\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ucd1d\uccb4\uc801 \uad00\uc810<\/strong>: UEBA \uae30\ub2a5\uc774 \uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud130\ud2f0 \uc804\ubc18\uc758 \ud65c\ub3d9\uc744 \ud3ec\uad04\uc801\uc73c\ub85c \ud30c\uc545\ud574 \ub2e8\uc77c \uc9c0\uc810 \ubaa8\ub2c8\ud130\ub9c1\uc73c\ub85c\ub294 \ub193\uce60 \uc218 \uc788\ub294 \uc0c1\uad00\uad00\uacc4\ub97c \uc2dd\ubcc4\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud5a5\uc0c1\ub41c \ucee8\ud14d\uc2a4\ud2b8 \ubd84\uc11d \ubc0f \uc0c1\ud669 \uc778\uc2dd<\/strong>: SIEM\uc774 \ub2e4\uc591\ud55c \ub370\uc774\ud130 \uc18c\uc2a4\ub97c \ud1b5\ud569\ud574 \ub354 \uc815\ud655\ud55c \uc704\ud611 \ud0d0\uc9c0\ub97c \uc218\ud589\ud558\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc704\ud5d8 \ud3c9\uac00, \uc54c\ub9bc \uc6b0\uc120\uc21c\uc704 \uc9c0\uc815, \uc624\ud0d0 \uac10\uc18c\ub97c \uc704\ud574 \ucee8\ud14d\uc2a4\ud2b8 \uc815\ubcf4\ub97c \ud65c\uc6a9\ud558\ub294\uc9c0 \uac80\ud1a0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc5d4\ud130\ud2f0 \ud504\ub85c\ud30c\uc77c\ub9c1 \ubc0f \ud589\ub3d9 \uae30\uc900\uc120<\/strong>: SIEM\uc774 \uac01 \uc5d4\ud130\ud2f0\uc5d0 \ub300\ud55c \uc885\ud569\uc801\uc778 \ud504\ub85c\ud30c\uc77c\uc744 \uad6c\ucd95\ud558\uace0 \ud589\ub3d9 \uae30\uc900\uc120\uc744 \uc124\uc815\ud574 \uc774\uc0c1 \uc9d5\ud6c4 \ud0d0\uc9c0\ub97c \ud5a5\uc0c1\uc2dc\ud0a4\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc9c0\uc18d\uc801\uc778 \uc5c5\ub370\uc774\ud2b8 \ubc0f \uc720\uc9c0\uad00\ub9ac \ubd80\ub2f4 \uac10\uc18c<\/strong>: SIEM\uc774 \uc9c4\uc815\ud55c SaaS \uc194\ub8e8\uc158\uc778\uc9c0 \ud655\uc778\ud558\uc5ec \ucd5c\uc2e0 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4\ub85c \ud0d0\uc9c0 \uaddc\uce59\uacfc \ubaa8\ub378\uc774 \uc9c0\uc18d\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ub418\uace0 \uc720\uc9c0\uad00\ub9ac \ubd80\ub2f4\uc744 \uc904\uc774\ub294\uc9c0 \uac80\uc99d\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>AI \ub0b4\uc7ac \uae30\ub2a5<\/strong>: SIEM\uc774 AI \uae30\ubc18 \ub85c\uadf8 \ud074\ub7ec\uc2a4\ud130\ub9c1 \ubc0f \ub178\uc774\uc988 \uac10\uc18c\uc640 \uac19\uc740 \uae30\ub2a5\uc744 \uac16\ucd94\uc5b4 \uacc4\uc808\uc131(seasonality) \ubcc0\ud654\ub97c \uc790\ub3d9\uc73c\ub85c \uc870\uc815\ud558\uace0 \uc54c\ub9bc \ud53c\ub85c(alert fatigue)\ub97c \uc904\uc77c \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud655\uc7a5\uc131\uacfc \uc720\uc5f0\uc131<\/strong>: \ucd5c\uc801\uc758 \uc131\ub2a5\uacfc \ube44\uc6a9 \ud6a8\uc728\uc131\uc744 \uc704\ud574 \uc218\uc694\uc5d0 \ub530\ub77c \ub9ac\uc18c\uc2a4\ub97c \uc5bc\ub9c8\ub098 \uc798 \ud655\uc7a5\ud558\uace0 \uc870\uc815\ud560 \uc218 \uc788\ub294\uc9c0 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud22c\uba85\uc131 \ubc0f \uc0ac\uc6a9\uc790 \uc9c0\uc815 \uc6a9\uc774\uc131<\/strong>: SIEM\uc774 \uc0ac\uc6a9\uc790 \uce5c\ud654\uc801\uc778 \uc778\ud130\ud398\uc774\uc2a4\ub97c \uae30\ubc18\uc73c\ub85c \uaddc\uce59\uc744 \uc27d\uac8c \uad6c\uc131\ud558\uace0 \uc6b4\uc601\uc758 \uac00\uc2dc\uc131\uc744 \ud655\ubcf4\ud558\uba70, \ucee4\uc2a4\ud130\ub9c8\uc774\uc9d5\uc744 \uc218\uc6d4\ud558\uac8c \uc218\ud589\ud560 \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc0ac\uc804 \uc815\uc758\ub41c \uaddc\uce59 \ubc0f \ud15c\ud50c\ub9bf<\/strong>: \ub9de\ucda4\ud615 \ud0d0\uc9c0 \uc804\ub7b5\uc5d0 \ud65c\uc6a9\ud560 \uc218 \uc788\ub294 \uc0ac\uc6a9\uc790 \uc9c0\uc815 \uac00\ub2a5 \uc0ac\uc804 \uc815\uc758 \uaddc\uce59\uacfc \ud15c\ud50c\ub9bf \ub77c\uc774\ube0c\ub7ec\ub9ac\ub97c \uac80\ud1a0\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uaddc\uce59 \ud14c\uc2a4\ud2b8 \ubc0f \uc2dc\ubbac\ub808\uc774\uc158<\/strong>: \uaddc\uce59\uc744 \ubc30\ud3ec\ud558\uae30 \uc804\uc5d0 \uc131\ub2a5\uacfc \uc815\ud655\uc131 \ubcf4\uc7a5\uc744 \uc704\ud55c \ud14c\uc2a4\ud2b8\uc640 \uc2dc\ubbac\ub808\uc774\uc158 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud544\uc218 \uae30\ub2a5<\/strong>: \ucd5c\uc885 \uc0ac\uc6a9\uc790\uac00 \uc0c1\uad00\uad00\uacc4 \uae30\ubc18, \ubd84\uc11d \uae30\ubc18, \uc2dc\uadf8\ub2c8\ucc98 \uae30\ubc18 \uae30\ubc95\uc744 \ud65c\uc6a9\ud574 \uc704\ud611 \ud0d0\uc9c0 \uc0ac\uc6a9 \uc0ac\ub840\ub97c \uc9c1\uc811 \uac1c\ubc1c\u00b7\uc218\uc815\u00b7\uc720\uc9c0\ud560 \uc218 \uc788\ub294 \uae30\ub2a5.<br\/><strong>Gartner\u00ae\uc5d0\uc11c \uc81c\uc2dc\ud558\ub294 \ud45c\uc900 \uae30\ub2a5<\/strong>: \uc0ac\uc6a9\uc790 \ubc0f \uc5d4\ud130\ud2f0 \ud589\ub3d9 \ubd84\uc11d(UEBA)\uacfc \ub370\uc774\ud130 \uacfc\ud559(\uc608: \uac10\ub3c5 \ubc0f \ube44\uac10\ub3c5 \uba38\uc2e0\ub7ec\ub2dd, \ub525\ub7ec\ub2dd\/\uc21c\ud658 \uc2e0\uacbd\ub9dd)\uc744 \ud65c\uc6a9\ud55c \uace0\uae09 \ubd84\uc11d \uae30\ub2a5, \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4\ub97c \uad00\ub9ac\ud558\uace0 \uc704\ud611\uc5d0 \ub300\ud55c \ucee8\ud14d\uc2a4\ud2b8 \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\ub294 \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ud50c\ub7ab\ud3fc(TIP) \uae30\ub2a5.<br\/><em>Gartner, \u201c\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant),\u201d \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"4-does-your-siem-offer-effective-investigation\">4. SIEM\uc740 \ud6a8\uacfc\uc801\uc778 \uc870\uc0ac\ub97c \uc81c\uacf5\ud558\ub294\uac00?<\/h3>\n\n<p>\uc7a0\uc7ac\uc801 \uc704\ud611\uc744 \uc2dd\ubcc4\ud558\ub294 \uac83\uc740 \uc2dc\uc791\uc5d0 \ubd88\uacfc\ud569\ub2c8\ub2e4. \ud6a8\uacfc\uc801\uc778 <a href=\"https:\/\/www.sumologic.com\/solutions\/threat-detection-investigation\/\">\uc704\ud611 \uc870\uc0ac<\/a>\ub294 \ubcf4\uc548 \uc0ac\uace0\uc758 \uc804\uccb4 \ubc94\uc704\uc640 \uc601\ud5a5\uc744 \ud30c\uc545\ud558\ub294 \ub370 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774 \uacfc\uc815\uc5d0\ub294 \uc138\ubd80 \ubd84\uc11d, <a href=\"https:\/\/help.sumologic.com\/docs\/observability\/root-cause-explorer\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uadfc\ubcf8 \uc6d0\uc778<\/a> \uc2dd\ubcc4, \uc2e4\uc81c \uc704\ud611\uc744 \ucc98\ub9ac\ud558\uba74\uc11c \uc624\ud0d0\uc744 \uc2e0\uc18d\ud788 \ucd5c\uc18c\ud654\ud558\ub294 \ud6a8\uc728\uc801\uc778 \uc54c\ub9bc \uad00\ub9ac\uac00 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n\n<p>SIEM \uc194\ub8e8\uc158\uc758 \ubcf4\uc548 \uc870\uc0ac \uae30\ub2a5\uc740 \uc774\ubca4\ud2b8\ub97c \uc2ec\uce35\uc801\uc73c\ub85c \ud0d0\uc0c9\ud558\uace0, \uc0c1\uc138 \ud0c0\uc784\ub77c\uc778\uc744 \ud655\uc778\ud558\uba70, \uc11c\ub85c \ub2e4\ub978 \ub370\uc774\ud130 \uc18c\uc2a4\uc5d0 \uac78\uce5c \uad00\ub828 \uc774\ubca4\ud2b8\ub97c \uc0c1\uad00 \ubd84\uc11d\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc6d0\ud574\uc57c \ud569\ub2c8\ub2e4. \uadfc\ubcf8 \uc6d0\uc778 \ubd84\uc11d\uc740 \ubcf4\uc548 \uc0ac\uace0\uc758 \uae30\uc800 \uc6d0\uc778\uc744 \ud30c\uc545\ud558\uace0, \uc0ac\uace0\uc758 \ubc1c\uc0dd \uc9c0\uc810\uacfc \ud655\uc0b0 \uacbd\ub85c\ub97c \uc774\ud574\ud558\uba70, \ud5a5\ud6c4 \uc7ac\ubc1c\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \ud6a8\uacfc\uc801\uc778 \uc54c\ub9bc \ud2b8\ub9ac\uc544\uc9c0\uc640 \uc624\ud0d0 \uac10\uc18c \uae30\ub2a5\uc740 \ubcf4\uc548 \ud300\uc774 \uc2e4\uc81c \uc704\ud611\uc5d0 \uc9d1\uc911\ud560 \uc218 \uc788\ub3c4\ub85d \ub3d5\uc2b5\ub2c8\ub2e4.<\/p>\n\n<p><strong>\uc870\uc0ac \uae30\ub2a5 \ud3c9\uac00 \uae30\uc900<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\ucd08\uae30 \uce68\ud574 \uc9c0\uc810 \uc2dd\ubcc4:<\/strong> SIEM\uc774 \uc0ac\uace0\ub97c <a href=\"https:\/\/www.sumologic.com\/glossary\/indicators-of-compromise\">\ucd5c\ucd08 \uce68\ud574 \uc9c0\uc810<\/a>\uae4c\uc9c0 \ucd94\uc801\ud558\uc5ec \ucc98\uc74c \uc601\ud5a5\uc744 \ubc1b\uc740 \uc2dc\uc2a4\ud15c \ub610\ub294 \uc0ac\uc6a9\uc790, \uc704\ud611\uc774 \ud658\uacbd\uc5d0 \uc9c4\uc785\ud55c \uacbd\uc704\ub97c \ud30c\uc545\ud558\ub3c4\ub85d \uc9c0\uc6d0\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc704\ud611 \ud655\uc0b0 \ucd94\uc801:<\/strong> \uc704\ud611\uc758 \ub124\ud2b8\uc6cc\ud06c \uc218\ud3c9 \uc774\ub3d9(lateral movement)\uc744 \ucd94\uc801\ud560 \uc218 \uc788\ub294 \ub3c4\uad6c\ub97c \ud3c9\uac00\ud558\uace0, \uc774\ub97c \ud1b5\ud574 \uc601\ud5a5\uc744 \ubc1b\uc740 \uc2dc\uc2a4\ud15c\uacfc \uacf5\uaca9\uc790\uc758 \uae30\ubc95\uc744 \uc774\ud574\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc601\ud5a5 \ubc94\uc704 \uc0b0\uc815:<\/strong> SIEM\uc774 \ub370\uc774\ud130 \uc720\ucd9c, \uc2dc\uc2a4\ud15c \uc911\ub2e8, \uaddc\uc81c \uc900\uc218\uc640 \uad00\ub828\ub41c \uc7a0\uc7ac\uc801 \ubb38\uc81c \ub4f1 \uc0ac\uace0\ub85c \uc778\ud55c \uc804\uccb4 \uc601\ud5a5\uc744 \uc815\ub7c9\ud654\ud558\ub3c4\ub85d \uc9c0\uc6d0\ud558\ub294\uc9c0 \uac80\uc99d\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc54c\ub9bc \uc6b0\uc120\uc21c\uc704 \uc9c0\uc815:<\/strong> SIEM\uc774 \uc2ec\uac01\ub3c4\uc640 \uc7a0\uc7ac\uc801 \uc601\ud5a5\uc744 \uae30\ubc18\uc73c\ub85c \uc54c\ub9bc\uc744 \uc6b0\uc120\uc21c\uc704\ud654\ud558\uc5ec \ubd84\uc11d \ub2f4\ub2f9\uc790\uac00 \uc911\uc694\ud55c \uc704\ud611\ubd80\ud130 \ucc98\ub9ac\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ucee8\ud14d\uc2a4\ud2b8 \uc815\ubcf4:<\/strong> \uc54c\ub9bc\uc5d0 \uad00\ub828 \uc790\uc0b0, \uc0ac\uc6a9\uc790, \uc5f0\uad00\ub41c \uc704\ud611 \uc778\ud154\ub9ac\uc804\uc2a4 \ub4f1\uc774 \ud3ec\ud568\ub418\uc5b4 \uc788\uc5b4 \ubd84\uc11d \ub2f4\ub2f9\uc790\uac00 \uae34\uae09\uc131\uacfc \uc801\ud569\uc131\uc744 \ube60\ub974\uac8c \ud310\ub2e8\ud560 \uc218 \uc788\ub294\uc9c0 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc790\ub3d9\ud654\ub41c \ud2b8\ub9ac\uc544\uc9c0:<\/strong> <a href=\"https:\/\/www.sumologic.com\/solutions\/machine-learning-powered-analytics\/\">\uba38\uc2e0\ub7ec\ub2dd<\/a>\uacfc \uc0ac\uc804 \uc815\uc758\ub41c \uaddc\uce59\uc744 \uacb0\ud569\ud55c \uc790\ub3d9 \ud2b8\ub9ac\uc544\uc9c0 \uae30\ub2a5\uc774 \uc81c\uacf5\ub418\uc5b4 \ucd08\uae30 \uc54c\ub9bc \ud3c9\uac00\uc5d0 \uc18c\uc694\ub418\ub294 \ubd84\uc11d \ub2f4\ub2f9\uc790\uc758 \uc2dc\uac04\uc744 \uc904\uc774\uace0 \uc54c\ub9bc\uc744 \uc790\ub3d9\uc73c\ub85c \ubd84\ub958\u00b7\uc6b0\uc120\uc21c\uc704\ud654\ud560 \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc624\ud0d0 \uac10\uc18c:<\/strong> SIEM\uc774 \ud0d0\uc9c0 \uaddc\uce59\uc744 \uc815\uad50\ud654\ud558\uace0 \ubd84\uc11d \ub2f4\ub2f9\uc790\uc758 \ud53c\ub4dc\ubc31\uc744 \ubc18\uc601\ud558\uc5ec \uc624\ud0d0\uc744 \ucd5c\uc18c\ud654\ud558\uace0 \uc54c\ub9bc\uc758 \uc2e0\ub8b0\uc131\uacfc \uc2e4\ud589 \uac00\ub2a5\uc131\uc744 \ub192\uc774\uba70, \uc54c\ub9bc\uc5d0 \ub530\ub978 \ud53c\ub85c\ub97c \uc904\uc5ec \ud6a8\uc728\uc131\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294\uc9c0 \uac80\uc99d\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc2e0\uc18d\ud55c \uadfc\ubcf8 \uc6d0\uc778 \ud30c\uc545:<\/strong> SIEM\uc774 \ub0b4\uc7a5\ud615 \ucffc\ub9ac \uc5d4\uc9c4\uc744 \ud1b5\ud55c \uc0ac\uc6a9\uc790 \uc9c0\uc815 \uac80\uc0c9, \ubc18\ubcf5 \ub85c\uadf8\ub97c \uc904\uc774\uace0 \uc911\ubcf5 \uc81c\uac70\ud558\ub294 \uba38\uc2e0\ub7ec\ub2dd \uae30\ub2a5 \ub4f1\uc744 \ud65c\uc6a9\ud558\uc5ec \ubc29\ub300\ud55c \ub370\uc774\ud130\ub97c \uc2e0\uc18d\ud788 \uc120\ubcc4\ud558\uace0 \uc628\ud504\ub808\ubbf8\uc2a4 \ubc0f \ud074\ub77c\uc6b0\ub4dc \ud658\uacbd \uc804\ubc18\uc5d0\uc11c \uc644\uc804\ud55c \uac00\uc2dc\uc131\uc744 \uc81c\uacf5\ud558\uace0 \uc2e0\uc18d\ud558\uac8c \uadfc\ubcf8 \uc6d0\uc778\uc744 \uc2dd\ubcc4\ud560 \uc218 \uc788\ub3c4\ub85d \uc720\uc5f0\ud55c \uc0ac\ub840 \uad00\ub9ac \uc6cc\ud06c\ud50c\ub85c\ub97c \uac16\ucd94\uace0 \uc788\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Gartner\u00ae\uac00 \uc815\uc758\ud55c \ud544\uc218 \uae30\ub2a5<\/strong>: \uc0ac\ub840 \uad00\ub9ac \uc81c\uacf5 \ubc0f \uc0ac\uace0 \ub300\uc751 \ud65c\ub3d9 \uc9c0\uc6d0.<br\/><strong>Gartner\u00ae\uac00 \uc815\uc758\ud55c \ud45c\uc900 \uae30\ub2a5<\/strong>: \uc870\uc0ac\ub97c \uac15\ud654\ud558\uace0 \uc0ac\uace0\uc758 \uc601\ud5a5\uc744 \ucd5c\uc18c\ud654\ud558\uae30 \uc704\ud55c \uc791\uc5c5 \ubc0f \uc6cc\ud06c\ud50c\ub85c\uc758 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158 \ubc0f \uc790\ub3d9\ud654.<br\/><em>Gartner, \u201c\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant),\u201d \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"5-how-does-your-siem-facilitate-response\">5. SIEM\uc740 \uc5b4\ub5bb\uac8c \ub300\uc751\uc744 \ucd09\uc9c4\ud558\ub294\uac00?<\/h3>\n\n<p><a href=\"https:\/\/www.sumologic.com\/blog\/cloud-messaging-and-collaboration\">\ud611\uc5c5<\/a>\uc740 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc0ac\uace0\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uad00\ub9ac\ud558\uace0 \ub300\uc751\ud558\ub294\ub370 \ubc18\ub4dc\uc2dc \ud544\uc694\ud569\ub2c8\ub2e4. \ud2b9\ud788 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc218\uc900\uc5d0\uc11c \uc0ac\uace0\ub098 \uce68\ud574\uac00 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub294 \ud604\ub300 \ud658\uacbd\uc5d0\uc11c\ub294 \ub354\uc6b1 \uadf8\ub807\uc2b5\ub2c8\ub2e4.\u00a0<a href=\"https:\/\/www.sumologic.com\/blog\/kubernetes-logs\">Kubernetes<\/a> \ucee8\ud14c\uc774\ub108, GitHub \ub9ac\ud3ec\uc9c0\ud1a0\ub9ac, \ubcf4\uc548\uc774 \ucde8\uc57d\ud55c <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-infrastructure\">\ud074\ub77c\uc6b0\ub4dc \uc778\ud504\ub77c<\/a> \uad6c\uc131 \uc694\uc18c \ub4f1\uc774 \ubaa8\ub450 \uacf5\uaca9 \uc2dc \uc545\uc6a9\ub420 \uc218 \uc788\uc9c0\ub9cc, \ubcf4\uc548\ud300\uc774 \uc774\ub97c \uc77c\uc0c1\uc801\uc73c\ub85c \ubaa8\ub2c8\ud130\ub9c1\ud558\uac70\ub098 \uc720\uc9c0 \uad00\ub9ac\ud558\uc9c0\ub294 \uc54a\uc2b5\ub2c8\ub2e4. \ub610\ud55c <a href=\"https:\/\/www.sumologic.com\/blog\/devsecops-log-analysis-app-security\">DevSecOps<\/a>\ud300 \ubaa8\ub450 \uc778\ub825\uc774 \uc81c\ud55c\uc801\uc778 \uc0c1\ud669\uc5d0\uc11c, \uac15\ub825\ud55c \uc790\ub3d9\ud654 \uae30\ub2a5\uc744 \ud65c\uc6a9\ud558\ub294 \uac83\uc774 \uc18d\ub3c4\uc640 \ud6a8\uc728\uc131\uc744 \ub192\uc774\ub294 \ub370 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n<p>\ud611\uc5c5\uacfc \ucee4\ubba4\ub2c8\ucf00\uc774\uc158\uc744 \ucd09\uc9c4\ud558\ub294 SIEM \uc194\ub8e8\uc158\uc740 \uc0ac\uc6a9\uc790 \uc815\uc758 \ub300\uc2dc\ubcf4\ub4dc, \uc790\ub3d9\ud654\ub41c \ubcf4\uace0, \uaddc\uc815 \uc900\uc218 \ucd94\uc801, \uac04\uc18c\ud654\ub41c \ub300\uc751 \uc808\ucc28\uc640 \uac19\uc740 \uae30\ub2a5\uc744 \ud1b5\ud574 \ubcf4\uc548\ud300\uc758 \ud6a8\uc728\uc131\uacfc \ud6a8\uacfc\uc131\uc744 \ud06c\uac8c \ud5a5\uc0c1\uc2dc\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c SIEM\uc758 \ub300\uc751 \uae30\ub2a5\uc740 \uc0ac\uace0\ub97c \uc2e0\uc18d\ud558\uace0 \ud6a8\uacfc\uc801\uc73c\ub85c \uad00\ub9ac\ud558\ub294 \ub370 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \uc0ac\uc804 \uc815\uc758\ub418\uac70\ub098 \uc0ac\uc6a9\uc790 \uc815\uc758 \uac00\ub2a5\ud55c <a href=\"https:\/\/www.sumologic.com\/blog\/quickest-response-not-best-cybersecurity\">\uc0ac\uace0 \ub300\uc751<\/a> \uc6cc\ud06c\ud50c\ub85c, \ubc18\ubcf5 \uc791\uc5c5\uc758 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uadf8\ub9ac\uace0 \ubcf4\uc548 \ud0dc\uc138\ub97c \uc9c0\uc18d\uc801\uc73c\ub85c \uac1c\uc120\ud558\uae30 \uc704\ud55c \uc0ac\ud6c4 \ub9ac\ubdf0 \uac80\ud1a0\uac00 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n\n<p>\ud55c\ub54c \ubcc4\ub3c4 \uc194\ub8e8\uc158\uc73c\ub85c \ubd84\ub9ac\ub418\uc5c8\ub358 \ubcf4\uc548 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uc790\ub3d9\ud654 \ubc0f \ub300\uc751(<a href=\"https:\/\/www.sumologic.com\/ko\/solutions\/cloud-soar\">SOAR<\/a>)\uc740 \uc774\uc81c SIEM \uae30\ub2a5\uc758 \uc0ac\uc2e4\uc0c1 \uae30\ubcf8 \uc694\uc18c\ub85c \uc790\ub9ac \uc7a1\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n<p><a href=\"https:\/\/www.sumologic.com\/ko\/blog\/how-using-cloud-siem-dashboards-metrics-for-daily-standups-improves-soc-efficiency\">SIEM \ub300\uc2dc\ubcf4\ub4dc<\/a>\ub294 \uc870\uc9c1\uc758 \ubcf4\uc548 \ud0dc\uc138\ub97c \ud6a8\uc728\uc801\uc73c\ub85c \ubaa8\ub2c8\ud130\ub9c1\ud560 \uc218 \uc788\ub3c4\ub85d \ubcf4\uc548 \ub370\uc774\ud130\ub97c \uc2e4\uc2dc\uac04\uc73c\ub85c \uc2dc\uac01\ud654\ud574 \uc81c\uacf5\ud569\ub2c8\ub2e4.\u00a0<a href=\"https:\/\/help.sumologic.com\/docs\/dashboards\/scheduled-report\/#create-a-scheduled-report\" target=\"_blank\" rel=\"noreferrer noopener\">\ubcf4\uace0 \uae30\ub2a5<\/a>\uc740 \uc870\uc9c1 \ub0b4\u00b7\uc678\ubd80 \uc774\ud574\uad00\uacc4\uc790\uc5d0\uac8c \uc870\uc0ac \uacb0\uacfc, \uc9c4\ud589 \uc0c1\ud669, \ub300\uc751 \uacb0\uacfc\ub97c \uc804\ub2ec\ud558\ub294 \ub370 \ud575\uc2ec\uc801\uc785\ub2c8\ub2e4.<a href=\"https:\/\/help.sumologic.com\/docs\/integrations\/sumo-apps\/cse\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM\uc758 \uaddc\uc815 \uc900\uc218 \uae30\ub2a5<\/a>\uc740 \uaddc\uc81c \uc694\uad6c\uc0ac\ud56d \ubc0f \uc0b0\uc5c5 \ud45c\uc900\uc744 \uc900\uc218\ud558\ub3c4\ub85d \uc9c0\uc6d0\ud558\uba70, \uc774\ub294 \ubc8c\uae08\uc744 \ubc29\uc9c0\ud558\uace0 \uc2e0\ub8b0\ub97c \uc720\uc9c0\ud558\ub294 \ub370 \ub9e4\uc6b0 \uc911\uc694\ud569\ub2c8\ub2e4. \uacac\uace0\ud55c \ub300\uc751 \uae30\ub2a5\uc740 \ubcf4\uc548 \uc0ac\uace0\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uad00\ub9ac\ud558\uace0 \uc644\ud654\ud558\ub294 \ub370 \ud544\uc218\uc801\uc785\ub2c8\ub2e4.<\/p>\n\n<p><strong>\ub300\uc751 \ud3c9\uac00 \uae30\uc900<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc0ac\uc6a9\uc790 \uc815\uc758 \ub300\uc2dc\ubcf4\ub4dc<\/strong>: \uc0ac\uc6a9\uc790\uac00 \uc790\uc2e0\uc758 \uc5ed\ud560\uc5d0 \ub9de\ub294 \ud575\uc2ec \uc9c0\ud45c, \ud2b8\ub80c\ub4dc, \uacbd\uace0 \ub4f1\uc744 \ud45c\uc2dc\ud558\ub294 \ub300\uc2dc\ubcf4\ub4dc\ub97c \uc0dd\uc131\ud558\uace0, \uc2e4\uc2dc\uac04 \uc5c5\ub370\uc774\ud2b8\ub97c \ud1b5\ud574 \uc704\ud611\uc5d0 \uc2e0\uc18d\ud788 \ub300\uc751\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub2e8\uc77c \uc9c4\uc2e4 \uacf5\uae09\uc6d0(Single source of truth)<\/strong>: SIEM\uc774 \ubaa8\ub4e0 \ud575\uc2ec \ub370\uc774\ud130\ub97c \ud55c\uacf3\uc5d0 \ubaa8\uc544 DevSecOps \uc2e4\ud589\uc744 \uac00\ub2a5\ud558\uac8c \ud558\uace0 \ud300 \uac04 \ud611\uc5c5\uc744 \uac15\ud654\ud560 \uc218 \uc788\ub294\uc9c0 \ud655\uc778\ud569\ub2c8\ub2e4. \ub610\ud55c \ubaa8\ub4e0 \uad00\ub828 \ud300\uc774 \uc194\ub8e8\uc158\uc744 \ud65c\uc6a9\ud560 \uc218 \uc788\ub3c4\ub85d \uc0ac\uc6a9\uc790 \uc218 \uc81c\ud55c\uc774 \uc5c6\ub294 \uac00\uaca9 \ubc0f \uc18c\ube44 \ubaa8\ub378\uc744 \uace0\ub824\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.sumologic.com\/glossary\/role-based-access-control\"><strong>\uc5ed\ud560 \uae30\ubc18 \uc811\uadfc \uc81c\uc5b4<\/strong><\/a><strong> \ubc0f \ubdf0<\/strong>: \uac01 \ud300 \uad6c\uc131\uc6d0\uc5d0\uac8c \uad00\ub828 \uc815\ubcf4\uac00 \uc81c\uacf5\ub418\ub3c4\ub85d \uc5ed\ud560\ubcc4\ub85c \uad8c\ud55c\uc744 \ubd80\uc5ec\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \ub370\uc774\ud130\uc758 \uc720\uc758\uc131\uacfc \uc0ac\uc6a9\uc131\uc744 \ub192\uc5ec\uc90d\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc790\ub3d9 \ubc0f \uc0ac\uc6a9\uc790 \uc815\uc758 \ubcf4\uace0<\/strong>: \uc790\ub3d9 \ubcf4\uace0\uc11c \uc0dd\uc131 \uae30\ub2a5\uc774 \uc77c\uad00\uc131\uc744 \ubcf4\uc7a5\ud558\uace0 \uc2dc\uac04\uc744 \uc808\uc57d\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud558\uba70, \ud2b9\uc815 \uc694\uad6c(\uc608: \uaddc\uc815 \uc900\uc218 \uac10\uc0ac, \uacbd\uc601\uc9c4 \ubcf4\uace0)\ub97c \ucda9\uc871\ud560 \uc218 \uc788\ub294 \uc0ac\uc6a9\uc790 \uc815\uc758 \ubcf4\uace0 \uae30\ub2a5\ub3c4 \ud544\uc694\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uaddc\uc815 \uc900\uc218<\/strong>: \ud22c\uba85\uc131\uc744 \uc704\ud55c \ud3ec\uad04\uc801\uc778 \uac10\uc0ac \ucd94\uc801\uc744 \ud1b5\ud574 SIEM\uc774 GDPR, HIPAA, PCI-DSS\uc640 \uac19\uc740 \uaddc\uc815\uc5d0 \ub300\ud55c \ub370\uc774\ud130 \uc218\uc9d1, \ubcf4\uc874 \ubc0f \ubcf4\uace0\ub97c \uc5bc\ub9c8\ub098 \uc798 \uc9c0\uc6d0\ud558\ub294\uc9c0 \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uaddc\uc815 \uc900\uc218 \ub300\uc2dc\ubcf4\ub4dc \ubc0f \ubcf4\uace0<\/strong>: <a href=\"https:\/\/www.sumologic.com\/brief\/audit-and-compliance-guide\/\">\uaddc\uc81c \uc900\uc218 \uc0c1\ud0dc<\/a>\ub97c \ubaa8\ub2c8\ud130\ub9c1\ud558\uace0 \uc99d\ube59\ud560 \uc218 \uc788\ub294 \uc804\ubb38 \ub3c4\uad6c\ub97c \ud3c9\uac00\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc0ac\uace0 \ub300\uc751 \uc6cc\ud06c\ud50c\ub85c<\/strong>: \uc0ac\uc804\uc5d0 \uc815\uc758\ub418\uc5c8\uac70\ub098 \uc0ac\uc6a9\uc790 \uc815\uc758 \uac00\ub2a5\ud55c \uc6cc\ud06c\ud50c\ub85c\uac00 \ubd84\uc11d \ub2f4\ub2f9\uc790\uac00 \ubcf4\uc548 \uc0ac\uace0\ub97c \ucc98\ub9ac\ud558\ub294 \uc804 \uacfc\uc815\uc744 \uc548\ub0b4\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158<\/strong>: SIEM\uc774 \ub85c\uadf8 \ubd84\uc11d \ud50c\ub7ab\ud3fc \ubc0f \uc678\ubd80 <a href=\"https:\/\/www.sumologic.com\/guides\/soar\/#:~:text=SOAR%20(security%2C%20orchestration%2C%20automation,response%20and%20security%20operations%20automation.\">SOAR \ub3c4\uad6c<\/a>\uc640 \uc5bc\ub9c8\ub098 \uc798 \ud1b5\ud569\ub418\uc5b4 \ub300\uc751 \uc791\uc5c5\uc744 \uc790\ub3d9\ud654\ud558\uace0 \ud6a8\uc728\uc131\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\uba70, \uc0ac\ub78c \uc911\uc2ec \uc6cc\ud06c\ud50c\ub85c \uc124\uacc4\ub97c \uc9c0\uc6d0\ud558\ub294 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud611\uc5c5 \ub3c4\uad6c<\/strong>: SIEM\uc774 \uc0ac\uace0 \ub300\uc751 \uc911 \uacf5\uc720 \uc6cc\ud06c\uc2a4\ud398\uc774\uc2a4\uc640 \uc2e4\uc2dc\uac04 \ucc44\ud305\uc744 \ud1b5\ud574 \ud6a8\uacfc\uc801\uc778 \ucee4\ubba4\ub2c8\ucf00\uc774\uc158\uacfc \uc870\uc728\uc774 \uc774\ub8e8\uc5b4\uc9c8 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc6d0\ud558\ub294\uc9c0 \uac80\uc99d\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc0ac\ud6c4 \ub9ac\ubdf0<\/strong>: \uc194\ub8e8\uc158\uc774 \ub300\uc751 \ud6a8\uacfc \ubd84\uc11d, \uac1c\uc120 \uc601\uc5ed \uc2dd\ubcc4, \ub300\uc751 \uacc4\ud68d \uc5c5\ub370\uc774\ud2b8\ub97c \uc9c0\uc6d0\ud558\uc5ec \uc9c0\uc18d\uc801\uc778 \ubcf4\uc548 \ud5a5\uc0c1\uc744 \uac00\ub2a5\ud558\uac8c \ud558\ub294\uc9c0 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Gartner\u00ae\uac00 \uc815\uc758\ud55c \ud544\uc218 \uae30\ub2a5<\/strong>: \ube44\uc988\ub2c8\uc2a4, \uaddc\uc815 \uc900\uc218, \uac10\uc0ac \uc694\uad6c\ub97c \uc9c0\uc6d0\ud558\uae30 \uc704\ud55c \ubcf4\uace0\uc11c \uc0dd\uc131 \uae30\ub2a5.<br\/><strong>Gartner\u00ae\uac00 \uc815\uc758\ud55c \ud45c\uc900 \uae30\ub2a5<\/strong>: \ud544\uc218 \ubcf4\uc548 \uc774\ubca4\ud2b8 \ub370\uc774\ud130\ub97c \uc7a5\uae30 \uc800\uc7a5\ud558\uace0 \uac80\uc0c9\ud560 \uc218 \uc788\ub3c4\ub85d \uc81c\uacf5\ud558\ub294 \uae30\ub2a5. \uc644\uc804\ud55c \uae30\ub2a5\uc744 \uac16\ucd98 \ubcf4\uc548 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uc790\ub3d9\ud654 \ubc0f \ub300\uc751(SOAR).<br\/><em>Gartner, \u201c\ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant),\u201d \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"1590\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Scorecard_800x530_x3.gif\" alt=\"\" class=\"wp-image-3087\" title=\"\"><\/figure>\n\n<p><\/p>\n\n<p><em>\uba74\ucc45 \uc870\ud56d:<\/em><\/p>\n\n<p><em>Gartner, \ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac \ub9e4\uc9c1 \ucffc\ub4dc\ub7f0\ud2b8(Security Information and Event Management Magic Quadrant), \uc800\uc790: Andrew Davies, Mitchell Schneider, Rustam Malik, Eric Ahlm, 2024\ub144 5\uc6d4 8\uc77c.<\/em><\/p>\n\n<p><em>GARTNER\ub294 Gartner, Inc. \ubc0f\/\ub610\ub294 \uadf8 \uacc4\uc5f4\uc0ac\uc758 \ubbf8\uad6d \ubc0f \uae30\ud0c0 \uad6d\uac00\uc5d0\uc11c\uc758 \ub4f1\ub85d\ub41c \uc0c1\ud45c\uc774\uc790 \uc11c\ube44\uc2a4 \ub9c8\ud06c\uc774\uba70, MAGIC QUADRANT\ub294 Gartner, Inc. \ubc0f\/\ub610\ub294 \uadf8 \uacc4\uc5f4\uc0ac\uc758 \ub4f1\ub85d\ub41c \uc0c1\ud45c\ub85c\uc11c \ubcf8 \ubb38\uc11c\uc5d0\uc11c\ub294 \ud5c8\uac00\ub97c \ubc1b\uc544 \uc0ac\uc6a9\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ubaa8\ub4e0 \uad8c\ub9ac \ubcf4\uc720.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc0c8\ub85c\uc6b4 \ubcf4\uc548 \uc815\ubcf4 \ubc0f \uc774\ubca4\ud2b8 \uad00\ub9ac(SIEM) \uc194\ub8e8\uc158\uc774 \ud544\uc694\ud55c\uc9c0 \uc5b4\ub5bb\uac8c \uc54c \uc218 \uc788\uc744\uae4c\uc694? \ub2e4\uc74c\uc740 \uc0c8\ub85c\uc6b4 SIEM \uc194\ub8e8\uc158\uc744 \uac80\ud1a0\ud574\uc57c \ud560 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \uc774\uc720\ub4e4\uc785\ub2c8\ub2e4. \ud604\uc7ac \uc0ac\uc6a9 \uc911\uc778 SIEM\uc740 \uba87 \uc138\ub300\uc778\uac00? SIEM \uc194\ub8e8\uc158\uc744 \ud3c9\uac00\ud558\ub824\uba74 \ud604\uc7ac \uc0ac\uc6a9 \uc911\uc778 SIEM\uc774 \uc5b4\ub290 \uc138\ub300\uc5d0 \uc18d\ud558\ub294\uc9c0 \uc774\ud574\ud574\uc57c \ud569\ub2c8\ub2e4. \ucd5c\uc2e0 \uc138\ub300 SIEM \uace7 \ucd9c\uc2dc\ub420 5\uc138\ub300 SIEM\uc740 \uc774\uc804 \uc138\ub300\ub97c \ud06c\uac8c \ub6f0\uc5b4\ub118\ub294 \ubc1c\uc804\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \uadf8 \ud575\uc2ec \ud2b9\uc9d5\uc740 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28663,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"\ube14\ub85c\uadf8 \uc77d\uae30","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[337],"resource-solution":[336],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[337],"resource-solution":[336],"class_list":["post-63056","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-guides","resource-solution-training-and-certification-ko"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource\/63056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/users\/4"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media\/28663"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media?parent=63056"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource-type?post=63056"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource-solution?post=63056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}