๐Ÿ” Domain 1-1: Design Secure Access to AWS Resources

โœจ ํ•ต์‹ฌ ๊ฐœ๋…

  • ๋ณด์•ˆ์€ ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„ ์‹œ ๊ฐ€์žฅ ๋จผ์ € ๊ณ ๋ คํ•ด์•ผ ํ•  ์š”์†Œ
  • ์‚ฌ๋žŒ, ๋„๊ตฌ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์–ด๋–ป๊ฒŒ AWS ๋ฆฌ์†Œ์Šค์™€ ๋ฐ์ดํ„ฐ๋ฅผ ์ ‘๊ทผํ• ์ง€ ์ •์˜ํ•ด์•ผ ํ•จ
  • ์ ‘๊ทผ ์ œ์–ด ๋ฒ”์œ„:
    • ๋ˆ„๊ฐ€/๋ฌด์—‡์ด ๋ฆฌ์†Œ์Šค๋ฅผ ์‹œ์ž‘·์ค‘์ง€ํ•  ์ˆ˜ ์žˆ๋Š”์ง€
    • ์–ธ์ œ/์–ด๋–ป๊ฒŒ ์ ‘๊ทผ ๊ถŒํ•œ์„ ์ฃผ๊ณ  ์šด์˜ ๊ถŒํ•œ์„ ์ œ์–ดํ• ์ง€

๐Ÿงฑ ๊ธฐ๋ณธ ์ง€์‹ (Fundamentals)

  • ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ (Shared Responsibility Model)
  • AWS ๊ธ€๋กœ๋ฒŒ ์ธํ”„๋ผ (๋ฆฌ์ „, AZ, ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜)
  • ์„œ๋น„์Šค ๋‚ด๊ตฌ์„ฑ & ๊ฐ€์šฉ์„ฑ

๐Ÿง‘‍๐Ÿ’ป AWS ๊ณ„์ •๊ณผ IAM

  • AWS IAM์€ Global ์„œ๋น„์Šค → ๋ชจ๋“  ๋ฆฌ์ „ ๊ณตํ†ต์œผ๋กœ ์ ์šฉ
  • Root User
    • ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋˜๋Š” ์Šˆํผ ๊ณ„์ •
    • ๊ถŒํ•œ ๋ณ€๊ฒฝ ๋ถˆ๊ฐ€, ํƒˆ์ทจ ์‹œ ์ „์ฒด ํ™˜๊ฒฝ์ด ์œ„ํ—˜ → ์ ˆ๋Œ€ ์ผ์ƒ ์‚ฌ์šฉ ๊ธˆ์ง€
    • ๋ณดํ˜ธ ๋ฐฉ๋ฒ•: MFA ํ™œ์„ฑํ™”, ๋ณ„๋„ ๊ถŒํ•œ์ด ์ œํ•œ๋œ IAM ์‚ฌ์šฉ์ž ์ƒ์„ฑ
  • IAM User / Group / Role
    • ์‹ ๊ทœ IAM ์‚ฌ์šฉ์ž๋Š” ๊ธฐ๋ณธ ๊ถŒํ•œ ์—†์Œ
    • Least Privilege(์ตœ์†Œ ๊ถŒํ•œ ์›์น™) ์ ์šฉ → ํ•„์š” ์ตœ์†Œ ๊ถŒํ•œ๋งŒ ๋ถ€์—ฌ
    • Users : ํŠน์ • ์‚ฌ์šฉ์ž์—๊ฒŒ ์ง์ ‘ ๊ถŒํ•œ ๋ถ€์—ฌ
    • Groups : ๊ณตํ†ต ๊ถŒํ•œ์„ ์—ฌ๋Ÿฌ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ
    • Roles : AWS ๋ฆฌ์†Œ์Šค๋‚˜ ์™ธ๋ถ€ ์‚ฌ์šฉ์ž/์„œ๋น„์Šค๊ฐ€ ์ž„์‹œ๋กœ ๊ถŒํ•œ ํš๋“

๐Ÿ”‘ ๊ถŒํ•œ ๋ถ€์—ฌ (Policies)

  • Policy = ๊ถŒํ•œ์„ ์ •์˜ํ•˜๋Š” ๊ฐ์ฒด
  • Identity-based Policy
    • User/Group/Role์— ๋ถ€์ฐฉ → “๋ˆ„๊ฐ€ ๋ฌด์—‡์„ ํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€”
  • Resource-based Policy
    • S3, SQS, KMS, VPC Endpoint ๋“ฑ์— ๋ถ€์ฐฉ → “๋ˆ„๊ฐ€ ์ด ๋ฆฌ์†Œ์Šค์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€”
    • ์ฐจ์ด์ : Principal ๋ช…์‹œ ํ•„์š”
  • IAM Policy ๋ฌธ์„œ ๊ตฌ์กฐ
    • Version
    • Statement
      • Effect (Allow/Deny)
      • Action (์–ด๋–ค API ํ˜ธ์ถœ ๊ฐ€๋Šฅ?)
      • Resource (๋Œ€์ƒ ๋ฆฌ์†Œ์Šค)
      • Principal (๋ฆฌ์†Œ์Šค ์ •์ฑ…์—๋งŒ ์กด์žฌ)

๐ŸŒ ์—ฐ๋™ & Federation

  • STS(Security Token Service) → ์ž„์‹œ ๋ณด์•ˆ ์ž๊ฒฉ ์ฆ๋ช… ์ œ๊ณต
  • Federation
    • ํšŒ์‚ฌ AD(Active Directory)๋‚˜ ์™ธ๋ถ€ IdP์™€ ์—ฐ๋™ → AWS ๋ฆฌ์†Œ์Šค ์ ‘๊ทผ ์œ„์ž„
    • SAML 2.0, OIDC ๊ธฐ๋ฐ˜ ์‹ฑ๊ธ€์‚ฌ์ธ์˜จ(SSO) ํ™œ์šฉ

๐Ÿšซ ์ž˜๋ชป๋œ ์ ‘๊ทผ

  • ์•ฑ ์ฝ”๋“œ์— ํ•˜๋“œ์ฝ”๋”ฉ๋œ AWS ํ‚ค โŒ
  • ๋Œ€์‹  ์‚ฌ์šฉํ•ด์•ผ ํ•˜๋Š” ๋ฐฉ๋ฒ•:
    • IAM Role + Instance Profile (EC2, Lambda ๋“ฑ)
    • AWS SDK + IAM Role ์ž๋™ ์ธ์ฆ
    • AWS Secrets Manager / SSM Parameter Store

๐Ÿ“Š ์ถ”์  & ๋ชจ๋‹ˆํ„ฐ๋ง (Traceability)

  • ๋ˆ„๊ฐ€, ๋ฌด์—‡์ด, ์–ธ์ œ, ์–ด๋””์„œ ์ ‘๊ทผํ–ˆ๋Š”์ง€ ๊ธฐ๋ก/์ถ”์  ํ•„์ˆ˜
  • ๊ด€๋ จ ์„œ๋น„์Šค:
    • AWS CloudTrail (API ํ˜ธ์ถœ ๊ธฐ๋ก)
    • AWS Config (๋ฆฌ์†Œ์Šค ๋ณ€๊ฒฝ ์ถ”์ )
    • Amazon CloudWatch (๋กœ๊ทธ/๋ฉ”ํŠธ๋ฆญ)
    • GuardDuty, Security Hub, Inspector, Macie (์œ„ํ˜‘ ํƒ์ง€ & ๋ณด์•ˆ ๋ถ„์„)

๐Ÿ› ๋ฉ€ํ‹ฐ ๊ณ„์ • ๊ด€๋ฆฌ

  • AWS Organizations → ๋‹ค๊ณ„์ • ๊ตฌ์กฐ ๊ด€๋ฆฌ
  • Service Control Policies(SCP) → ๊ณ„์ • ๋‹จ์œ„ ๊ถŒํ•œ ์ œํ•œ
  • AWS Control Tower → ๊ณ„์ • ์ƒ์„ฑ·๊ฑฐ๋ฒ„๋„Œ์Šค ์ž๋™ํ™”

๐Ÿ“Œ ์ •๋ฆฌ

  • IAM = ๊ธ€๋กœ๋ฒŒ ์„œ๋น„์Šค, Root User๋Š” ๋ฐ˜๋“œ์‹œ ๋ณดํ˜ธ(MFA ํ•„์ˆ˜, ์‚ฌ์šฉ ์ง€์–‘)
  • ์‚ฌ์šฉ์ž ์ ‘๊ทผ: Users / Groups / Roles ์กฐํ•ฉ + ์ตœ์†Œ ๊ถŒํ•œ ์›์น™
  • ๊ถŒํ•œ ๋ถ€์—ฌ: Identity-based Policy vs Resource-based Policy ๊ตฌ๋ถ„
  • ์™ธ๋ถ€ ์‚ฌ์šฉ์ž ์ ‘๊ทผ: Federation + STS
  • ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ ‘๊ทผ: ์ ˆ๋Œ€ ํ‚ค ํ•˜๋“œ์ฝ”๋”ฉ ๊ธˆ์ง€ → Role/Secrets Manager ํ™œ์šฉ
  • ์ถ”์ ์„ฑ(Traceability) ํ™•๋ณด: CloudTrail, Config, GuardDuty ๋“ฑ
  • ๋ฉ€ํ‹ฐ ๊ณ„์ • ์ „๋žต: Organizations + SCP + Control Tower

'AWS > AWS SAA-C03' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

[AWS SAA-C03] - Domain 1 Review_ 3. Determine Appropriate Data Security Controls  (0) 2025.08.30
[AWS SAA-C03] - Domain 1 Review_ 2.Design Secure Workloads and Applications  (0) 2025.08.30

+ Recent posts