{"id":2212,"date":"2021-06-03T12:11:05","date_gmt":"2021-06-03T19:11:05","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2212"},"modified":"2023-11-07T18:24:08","modified_gmt":"2023-11-07T23:24:08","slug":"zero-trust-identity-strategies-prevent-hacks","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","title":{"rendered":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 ID \uc804\ub7b5\uc73c\ub85c \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\ub294 \ubc29\ubc95"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\uc628\ub77c\uc778 \uc138\uacc4\ub294 \uc2e0\ub8b0\ub97c \uae30\ubc18\uc73c\ub85c \uc6b4\uc601\ub429\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ucd5c\uadfc \ubc1c\uc0dd\ud55c \ud574\ud0b9 \uc0ac\uac74\ub4e4\u2014\uc194\ub77c\uc708\uc988 \ud574\ud0b9\uacfc \ubbf8\uad6d \uad6d\uc81c\uac1c\ubc1c\ucc98(USAID) \ub178\ubca8\ub9ac\uc6c0 \uc545\uc6a9 \uc0ac\ub840\ub97c \ud3ec\ud568\ud558\uc5ec\u2014\uc740 \uc2e0\ub8b0\uac00 \ud070 \uc704\ud5d8 \uc694\uc18c\uac00 \ub420 \uc218 \uc788\uc74c\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \uc2e0\uc6d0 \uc804\ub7b5\uc740 \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\uace0 \uc0ac\uc6a9\uc790, \uae30\uc5c5, \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"author":2,"featured_media":2213,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Zero Trust Identity Strategies Can Prevent Hacks - RSA<\/title>\n<meta name=\"description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Zero Trust Identity Strategies Can Prevent Hacks\" \/>\n<meta property=\"og:description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T19:11:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T23:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Zero Trust Identity Strategies Can Prevent Hacks\" \/>\n<meta name=\"twitter:description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Zero Trust Identity Strategies Can Prevent Hacks\",\"datePublished\":\"2021-06-03T19:11:05+00:00\",\"dateModified\":\"2023-11-07T23:24:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\",\"name\":\"How Zero Trust Identity Strategies Can Prevent Hacks - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"datePublished\":\"2021-06-03T19:11:05+00:00\",\"dateModified\":\"2023-11-07T23:24:08+00:00\",\"description\":\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Zero Trust Identity Strategies Can Prevent Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 ID \uc804\ub7b5\uc73c\ub85c \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\ub294 \ubc29\ubc95 - RSA","description":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 ID \uc804\ub7b5\uc740 \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\uace0 \uc0ac\uc6a9\uc790, \ube44\uc988\ub2c8\uc2a4 \ubc0f \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ubcf4\ud638\ud558\uc5ec \uac00\uc7a5 \uc911\uc694\ud55c \uac83\uc744 \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","og_locale":"ko_KR","og_type":"article","og_title":"How Zero Trust Identity Strategies Can Prevent Hacks","og_description":"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.","og_url":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","og_site_name":"RSA","article_published_time":"2021-06-03T19:11:05+00:00","article_modified_time":"2023-11-07T23:24:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Zero Trust Identity Strategies Can Prevent Hacks","twitter_description":"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Zero Trust Identity Strategies Can Prevent Hacks","datePublished":"2021-06-03T19:11:05+00:00","dateModified":"2023-11-07T23:24:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","articleSection":["Zero Trust"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","name":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 ID \uc804\ub7b5\uc73c\ub85c \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\ub294 \ubc29\ubc95 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","datePublished":"2021-06-03T19:11:05+00:00","dateModified":"2023-11-07T23:24:08+00:00","description":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 ID \uc804\ub7b5\uc740 \ud574\ud0b9\uc744 \ubc29\uc9c0\ud558\uace0 \uc0ac\uc6a9\uc790, \ube44\uc988\ub2c8\uc2a4 \ubc0f \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \ubcf4\ud638\ud558\uc5ec \uac00\uc7a5 \uc911\uc694\ud55c \uac83\uc744 \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"How Zero Trust Identity Strategies Can Prevent Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548 \ubc0f \ub514\uc9c0\ud138 \ub9ac\uc2a4\ud06c \uad00\ub9ac \uc194\ub8e8\uc158","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"\uba5c\ub9b0\ub2e4 \uc624\ucf54\ub108","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/comments?post=2212"}],"version-history":[{"count":8,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2212\/revisions"}],"predecessor-version":[{"id":27172,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2212\/revisions\/27172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media\/2213"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media?parent=2212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/categories?post=2212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/tags?post=2212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}