N2SF (National Network Security Framework)
National Intelligence Service's National Network Security Framework - Transitioning the public sector security paradigm from network isolation to Multi-Level Security (MLS) to enable the use of AI and cloud technologies.
Library List
Connection with KAIC-1
- Supporting the adoption of cloud and AI-based innovative services in public institutions
- Applying flexible security controls based on data importance
- Enhancing actual security through the introduction of Zero Trust architecture
N2SF Overview
The National Network Security Framework (N2SF) is a new public security model that classifies security levels according to data importance and risk (MLS) instead of traditional physical network isolation, and applies optimized security controls accordingly. It aims to enable the public sector to safely use the latest technologies like AI and cloud while thoroughly protecting national information assets.
KAIC-1 certification is a key indicator for meeting the technical security requirements of N2SF:
- Verification of data protection and access control according to Multi-Level Security (MLS) requirements
- Detection and response to AI agent security threats in cloud-native environments
- Establishment of a continuous authentication and authorization system based on Zero Trust
Multi-Level Security (MLS) Layers
Check the mapping between N2SF (National Network Security Framework) requirements and KAIC-1 requirements.
National Core/Confidential Systems
Core information systems where maintaining national security and confidentiality is essential.
Key Requirements
- Strict data encryption and integrity assurance
- Strong controls equivalent to physical/logical network isolation
- Highest level of Zero Trust authentication framework
KAIC-1 Mappings
Administrative/Public Important Systems
Administrative service and data systems that require high safety and reliability, though not confidential.
Key Requirements
- Assuring confidentiality and availability of administrative data
- Granular Role-Based Access Control (RBAC)
- Continuous security monitoring and real-time threat response
KAIC-1 Mappings
Public/General Service Systems
Systems with the highest flexibility, such as using cloud and foreign SW, dealing with public information or low-risk data.
Key Requirements
- Security focused on service availability and user convenience
- Utilization of cloud-native security tools
- Preventing indiscriminate data training by AI services and ensuring transparency