Digital Transformation Security: The need for new security policies centered on user experience. Key Technologies for Digital Transformation: Explores the importance of new security regulations for the third era of digital transformation (DT, DX, Digital Transformation), from RPA to cloud. Comparative analysis of global trends and changes in security policies centered on user experience.
Changes in public certificates and the user experience
When it comes to security in Korea’s IT environment, the first thing that comes to mind is authorization certificates. For quite a long time, they have been used without choice due to various regulations, and many users complained that they were forced to install unnecessary programs on their personal PCs. It was quite a hassle to use public certificates to do online banking or use public web pages, installing certificates and various security programs, rebooting, etc. Until recently, some regulations have changed, and public certificates can be used instead of traditional certificates, which are much more usable.
If you’ve ever used internet services in a foreign country when only traditional certificates were available, you’ll be amazed at the ease with which you can use financial and payment services. It’s the same internet banking, but in some places you have to install several programs, and in other places it’s as easy as using a portal with just a few clicks. What’s the difference? It’s the difference between user experience and technology, whether you see users as something that can cause problems and prevent them from happening, or whether you make them feel comfortable until they do, and then compensate them for it.

Domestic and international security policy differences and their impact
Security issues also show a similar difference in perception between domestic and international companies. Companies with more than a certain number of employees, especially affiliates of large domestic companies, already have internal security programs in place and are not allowed to capture or freely release documents for security reasons. This is understandable, as the goal is to prevent the leakage of sensitive company information. But do these security policies keep up with the changing landscape, and the answer is no. The core of corporate document security is not the circulation of documents within the organization, but the prevention of external viewing of documents through DRM, etc. when they leave the organization.
However, the security system of Korean companies has been in the direction of blocking and viewing unconditionally. This is also true for email. Many companies even delete emails automatically. However, it is questionable whether these deleted emails are kept separately. If you mechanically delete an email and then have a major lawsuit and need to recover it, do you even have an alternative? As you can see, employees are experiencing a significant loss of productivity for security reasons.
The Evolution of Security: A User-Centric Approach
In recent years, organizations’ security efforts have changed. This is due to the adoption of SaaS services, represented by the various digital tools described above. SaaS services are utilized by renting servers from service providers rather than owning them. One of the first problems large organizations face when adopting SaaS services is the confusion caused by the different security levels. The beauty of SaaS is that you can access the document you’re working on or the file you’re collaborating on from anywhere, anytime, with authentication.
However, if you translate this into a traditional security policy, you may find yourself storing documents for a period of time before deleting them, or accessing them from anywhere other than your company’s designated PC.
This is the same as how employees are viewed from a public service perspective. In our case, we view them as potential security risks and apply security in a way that restricts their ability to use many functions. So we have a policy of deleting materials or restricting access after a certain period of time. For a global organization, however, the approach is to leave things as open as possible for individuals, but to make them aware through training that there can be significant damages if something goes wrong.
With so much work being done from home, it’s easy for companies to see which PCs each employee is using and where they’re accessing from. They already know your work and home addresses, and they can tell if your access is legitimate or not just by looking at the IP address.
Then, when access is monitored from a completely different location than home or work, the security solution alerts you to the anomaly, and it’s up to your security team to track it down or immediately revoke the privileges. Rather than preventing access in the first place, the security solution can take action when an anomaly is detected, ensuring that employees can work uninterrupted from their favorite locations. This small difference makes a huge productivity difference in the real world.
Digital transformation security regulations and the need for them
In the DX journey, it’s sometimes the details that make the difference between starting a program to improve the digital capabilities of your employees and having it fall flat on its face and failing to produce real results. We’ve talked about document security before, but how many organizations in Korea are actually doing it right? Let’s say you have a confidential document that was created by Team A, and access to it is limited to Team A members and the company’s CEO and executives.
If a member of Team A moves internally to Team B, does that member immediately lose access to the confidential document they previously created? Most likely, they will have separate files on their personal PCs. Don’t assume you’re doing a good job with corporate security programs like public certificates if you don’t address this basic situation. If you’re looking to change your organization’s work culture with DX, you’ll also need to look at your existing security policies from the ground up. You’re bound to find something that needs to change.