• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project


Suk Ho Seo, Eun Jin Choi, Seungil Noh, Hyeon Ho Lee, Journal of Internet Computing and Services, Vol. 27, No. 1, pp. 147-155, Feb. 2026
10.7472/jksii.2026.27.1.147, Full Text:  HTML
Keywords: K-RMF, System security plan, Research and Development, Cyber Security, Weapon System

Abstract

Along with the implementation of the Instruction for K-RMF in 2024, the K-RMF was promoted to apply the battlefield management information system. Manage by connecting the K-RMF 6-step framework with the life cycle of weapons systems to prevent and mitigate security risks and Prepare a security plan for the life cycle to specify countermeasures against external threats. The Ministry of National Defense organizes and provides a table of contents of the security plan in the Instruction for K-RMF In order to apply it to R&D projects, it is necessary to specifically determine the items for each table of contents. Defense Agency for Technology and Quality conducted this study to specify the security plan. Federal standards and guidelines such as NIST RMF and FedRAMP were analyzed, and domestic business practices such as defense security systems and K-RMF pilot projects were also analyzed. Based on the analyzed results, the security plan provided by the Instruction for K-RMF was proposed to be specific. Through this study, it is judged that significant results were achieved in that the R&D agency improved the understanding of the security plan and laid the foundation for the smooth and stable implementation of K-RMF at the time of the full-scale implementation of the K-RMF system and the gradual expansion of application are expected.


Statistics
Show / Hide Statistics

Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Seo, S., Choi, E., Noh, S., & Lee, H. (2026). A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project. Journal of Internet Computing and Services, 27(1), 147-155. DOI: 10.7472/jksii.2026.27.1.147.

[IEEE Style]
S. H. Seo, E. J. Choi, S. Noh, H. H. Lee, "A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project," Journal of Internet Computing and Services, vol. 27, no. 1, pp. 147-155, 2026. DOI: 10.7472/jksii.2026.27.1.147.

[ACM Style]
Suk Ho Seo, Eun Jin Choi, Seungil Noh, and Hyeon Ho Lee. 2026. A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project. Journal of Internet Computing and Services, 27, 1, (2026), 147-155. DOI: 10.7472/jksii.2026.27.1.147.