2025-08-30 16:54:59
๋ฐ˜์‘ํ˜•

1. Introduction

๐Ÿ” Domain 1-1: Design Secure Access to AWS Resources

โœจ ํ•ต์‹ฌ ๊ฐœ๋…

  • ๋ณด์•ˆ์€ ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„ ์‹œ ๊ฐ€์žฅ ๋จผ์ € ๊ณ ๋ คํ•ด์•ผ ํ•  ์š”์†Œ
  • ์‚ฌ๋žŒ, ๋„๊ตฌ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์–ด๋–ป๊ฒŒ AWS ๋ฆฌ์†Œ์Šค์™€ ๋ฐ์ดํ„ฐ๋ฅผ ์ ‘๊ทผํ• ์ง€ ์ •์˜ํ•ด์•ผ ํ•จ
  • ์ ‘๊ทผ ์ œ์–ด ๋ฒ”์œ„:
    • ๋ˆ„๊ฐ€/๋ฌด์—‡์ด ๋ฆฌ์†Œ์Šค๋ฅผ ์‹œ์ž‘·์ค‘์ง€ํ•  ์ˆ˜ ์žˆ๋Š”์ง€
    • ์–ธ์ œ/์–ด๋–ป๊ฒŒ ์ ‘๊ทผ ๊ถŒํ•œ์„ ์ฃผ๊ณ  ์šด์˜ ๊ถŒํ•œ์„ ์ œ์–ดํ• ์ง€

๐Ÿงฑ ๊ธฐ๋ณธ ์ง€์‹ (Fundamentals)

  • ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ (Shared Responsibility Model)
  • AWS ๊ธ€๋กœ๋ฒŒ ์ธํ”„๋ผ (๋ฆฌ์ „, AZ, ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜)
  • ์„œ๋น„์Šค ๋‚ด๊ตฌ์„ฑ & ๊ฐ€์šฉ์„ฑ

๐Ÿง‘‍๐Ÿ’ป AWS ๊ณ„์ •๊ณผ IAM

  • AWS IAM์€ Global ์„œ๋น„์Šค → ๋ชจ๋“  ๋ฆฌ์ „ ๊ณตํ†ต์œผ๋กœ ์ ์šฉ
  • Root User
    • ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋˜๋Š” ์Šˆํผ ๊ณ„์ •
    • ๊ถŒํ•œ ๋ณ€๊ฒฝ ๋ถˆ๊ฐ€, ํƒˆ์ทจ ์‹œ ์ „์ฒด ํ™˜๊ฒฝ์ด ์œ„ํ—˜ → ์ ˆ๋Œ€ ์ผ์ƒ ์‚ฌ์šฉ ๊ธˆ์ง€
    • ๋ณดํ˜ธ ๋ฐฉ๋ฒ•: MFA ํ™œ์„ฑํ™”, ๋ณ„๋„ ๊ถŒํ•œ์ด ์ œํ•œ๋œ IAM ์‚ฌ์šฉ์ž ์ƒ์„ฑ
  • IAM User / Group / Role
    • ์‹ ๊ทœ IAM ์‚ฌ์šฉ์ž๋Š” ๊ธฐ๋ณธ ๊ถŒํ•œ ์—†์Œ
    • Least Privilege(์ตœ์†Œ ๊ถŒํ•œ ์›์น™) ์ ์šฉ → ํ•„์š” ์ตœ์†Œ ๊ถŒํ•œ๋งŒ ๋ถ€์—ฌ
    • Users : ํŠน์ • ์‚ฌ์šฉ์ž์—๊ฒŒ ์ง์ ‘ ๊ถŒํ•œ ๋ถ€์—ฌ
    • Groups : ๊ณตํ†ต ๊ถŒํ•œ์„ ์—ฌ๋Ÿฌ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ
    • Roles : AWS ๋ฆฌ์†Œ์Šค๋‚˜ ์™ธ๋ถ€ ์‚ฌ์šฉ์ž/์„œ๋น„์Šค๊ฐ€ ์ž„์‹œ๋กœ ๊ถŒํ•œ ํš๋“

๐Ÿ”‘ ๊ถŒํ•œ ๋ถ€์—ฌ (Policies)

  • Policy = ๊ถŒํ•œ์„ ์ •์˜ํ•˜๋Š” ๊ฐ์ฒด
  • Identity-based Policy
    • User/Group/Role์— ๋ถ€์ฐฉ → “๋ˆ„๊ฐ€ ๋ฌด์—‡์„ ํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€”
  • Resource-based Policy
    • S3, SQS, KMS, VPC Endpoint ๋“ฑ์— ๋ถ€์ฐฉ → “๋ˆ„๊ฐ€ ์ด ๋ฆฌ์†Œ์Šค์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€”
    • ์ฐจ์ด์ : Principal ๋ช…์‹œ ํ•„์š”
  • IAM Policy ๋ฌธ์„œ ๊ตฌ์กฐ
    • Version
    • Statement
      • Effect (Allow/Deny)
      • Action (์–ด๋–ค API ํ˜ธ์ถœ ๊ฐ€๋Šฅ?)
      • Resource (๋Œ€์ƒ ๋ฆฌ์†Œ์Šค)
      • Principal (๋ฆฌ์†Œ์Šค ์ •์ฑ…์—๋งŒ ์กด์žฌ)

๐ŸŒ ์—ฐ๋™ & Federation

  • STS(Security Token Service) → ์ž„์‹œ ๋ณด์•ˆ ์ž๊ฒฉ ์ฆ๋ช… ์ œ๊ณต
  • Federation
    • ํšŒ์‚ฌ AD(Active Directory)๋‚˜ ์™ธ๋ถ€ IdP์™€ ์—ฐ๋™ → AWS ๋ฆฌ์†Œ์Šค ์ ‘๊ทผ ์œ„์ž„
    • SAML 2.0, OIDC ๊ธฐ๋ฐ˜ ์‹ฑ๊ธ€์‚ฌ์ธ์˜จ(SSO) ํ™œ์šฉ

๐Ÿšซ ์ž˜๋ชป๋œ ์ ‘๊ทผ

  • ์•ฑ ์ฝ”๋“œ์— ํ•˜๋“œ์ฝ”๋”ฉ๋œ AWS ํ‚ค โŒ
  • ๋Œ€์‹  ์‚ฌ์šฉํ•ด์•ผ ํ•˜๋Š” ๋ฐฉ๋ฒ•:
    • IAM Role + Instance Profile (EC2, Lambda ๋“ฑ)
    • AWS SDK + IAM Role ์ž๋™ ์ธ์ฆ
    • AWS Secrets Manager / SSM Parameter Store

๐Ÿ“Š ์ถ”์  & ๋ชจ๋‹ˆํ„ฐ๋ง (Traceability)

  • ๋ˆ„๊ฐ€, ๋ฌด์—‡์ด, ์–ธ์ œ, ์–ด๋””์„œ ์ ‘๊ทผํ–ˆ๋Š”์ง€ ๊ธฐ๋ก/์ถ”์  ํ•„์ˆ˜
  • ๊ด€๋ จ ์„œ๋น„์Šค:
    • AWS CloudTrail (API ํ˜ธ์ถœ ๊ธฐ๋ก)
    • AWS Config (๋ฆฌ์†Œ์Šค ๋ณ€๊ฒฝ ์ถ”์ )
    • Amazon CloudWatch (๋กœ๊ทธ/๋ฉ”ํŠธ๋ฆญ)
    • GuardDuty, Security Hub, Inspector, Macie (์œ„ํ˜‘ ํƒ์ง€ & ๋ณด์•ˆ ๋ถ„์„)

๐Ÿ› ๋ฉ€ํ‹ฐ ๊ณ„์ • ๊ด€๋ฆฌ

  • AWS Organizations → ๋‹ค๊ณ„์ • ๊ตฌ์กฐ ๊ด€๋ฆฌ
  • Service Control Policies(SCP) → ๊ณ„์ • ๋‹จ์œ„ ๊ถŒํ•œ ์ œํ•œ
  • AWS Control Tower → ๊ณ„์ • ์ƒ์„ฑ·๊ฑฐ๋ฒ„๋„Œ์Šค ์ž๋™ํ™”

๐Ÿ“Œ ์ •๋ฆฌ

  • IAM = ๊ธ€๋กœ๋ฒŒ ์„œ๋น„์Šค, Root User๋Š” ๋ฐ˜๋“œ์‹œ ๋ณดํ˜ธ(MFA ํ•„์ˆ˜, ์‚ฌ์šฉ ์ง€์–‘)
  • ์‚ฌ์šฉ์ž ์ ‘๊ทผ: Users / Groups / Roles ์กฐํ•ฉ + ์ตœ์†Œ ๊ถŒํ•œ ์›์น™
  • ๊ถŒํ•œ ๋ถ€์—ฌ: Identity-based Policy vs Resource-based Policy ๊ตฌ๋ถ„
  • ์™ธ๋ถ€ ์‚ฌ์šฉ์ž ์ ‘๊ทผ: Federation + STS
  • ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ ‘๊ทผ: ์ ˆ๋Œ€ ํ‚ค ํ•˜๋“œ์ฝ”๋”ฉ ๊ธˆ์ง€ → Role/Secrets Manager ํ™œ์šฉ
  • ์ถ”์ ์„ฑ(Traceability) ํ™•๋ณด: CloudTrail, Config, GuardDuty ๋“ฑ
  • ๋ฉ€ํ‹ฐ ๊ณ„์ • ์ „๋žต: Organizations + SCP + Control Tower

 

2. Design Secure Workloads and Applications

๐Ÿ›ก๏ธ Domain 1-2: Design Secure Workloads and Applications

โœจ ํ•ต์‹ฌ ์ฃผ์ œ

  • ์‚ฌ๋žŒ, ๋„๊ตฌ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์•ˆ์ „ํ•˜๊ฒŒ AWS ์„œ๋น„์Šค์— ์ ‘๊ทผํ•˜๋„๋ก ์„ค๊ณ„
  • VPC ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ๋ฐ ๋„คํŠธ์›Œํฌ ๊ณ„์ธต ๋ณด์•ˆ์ด ์ค‘์‹ฌ

๐ŸŒ Amazon VPC Fundamentals

  • VPC ์œ ํ˜•: Default VPC vs Custom VPC (์ดˆ๊ธฐ ๋ณด์•ˆ ์„ค์ • ๋‹ค๋ฆ„)
  • VPC ๋ฒ”์œ„: Regional ์„œ๋น„์Šค
  • Subnet: AZ ๋‹จ์œ„(= Zonal ์„œ๋น„์Šค)
  • ๊ตฌ์„ฑ ์š”์†Œ
    • Security Group (SG): ์ธ์Šคํ„ด์Šค ๋‹จ์œ„ ๊ฐ€์ƒ ๋ฐฉํ™”๋ฒฝ
    • NACL (Network ACL): ์„œ๋ธŒ๋„ท ๋‹จ์œ„ ๋„คํŠธ์›Œํฌ ํ•„ํ„ฐ
    • Route Table: ํŠธ๋ž˜ํ”ฝ ๋ผ์šฐํŒ… ์ œ์–ด
    • NAT Gateway: ํ”„๋ผ์ด๋น— ์„œ๋ธŒ๋„ท → ์•„์›ƒ๋ฐ”์šด๋“œ ์ธํ„ฐ๋„ท ์•ก์„ธ์Šค

๋„คํŠธ์›Œํฌ ์„ค๊ณ„ ๊ณ ๋ ค์‚ฌํ•ญ

  • Public Subnet ↔ Private Subnet ๊ตฌ๋ถ„
  • CIDR, ๋ผ์šฐํŒ…, ๋ณด์•ˆ ํ•„ํ„ฐ ์„ค๊ณ„
  • VPN, Direct Connect, Transit Gateway, VPC Peering, PrivateLink ํ™œ์šฉ

๐Ÿ”’ ์™ธ๋ถ€ ์—ฐ๊ฒฐ ๋ณด์•ˆ

  • VPN ์—ฐ๊ฒฐ
    • Site-to-Site VPN
    • Client VPN
  • Direct Connect: ์ „์šฉ์„ , ์•ˆ์ •์ ·๋ณด์•ˆ์  ์—ฐ๊ฒฐ
  • PrivateLink
    • ์„œ๋น„์Šค ๊ณต์œ  ์‹œ ์ธํ„ฐ๋„ท ๋…ธ์ถœ ์—†์ด ๋‹ค๋ฅธ VPC์—์„œ ์ ‘๊ทผ ๊ฐ€๋Šฅ
    • VPC Peering๋ณด๋‹ค ๋ณด์•ˆ์ ์ด๊ณ  ๊ด€๋ฆฌ ํšจ์œจ์ 

๐Ÿ“‚ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ & ๊ฐœ์ธ ์ •๋ณด (PII)

  • Amazon Macie: ML ๊ธฐ๋ฐ˜ S3 ๋‚ด PII(๊ฐœ์ธ์ •๋ณด) ํƒ์ง€/๋ณดํ˜ธ
  • Amazon Cognito: ์ธ์ฆ·์ธ๊ฐ€ (User Pool, Identity Pool, Federation)
  • Amazon GuardDuty: ์œ„ํ˜‘ ํƒ์ง€ ์„œ๋น„์Šค

๐Ÿ”‘ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ

  • Secrets ๊ด€๋ฆฌ
    • AWS Secrets Manager: ์ž๋™ Credential Rotation, Secret ์ €์žฅ
    • SSM Parameter Store: ์„ค์ •๊ฐ’/๋น„๋ฐ€ ๊ด€๋ฆฌ (Secrets Manager๋ณด๋‹ค ๋‹จ์ˆœ)
  • ๋ฐฉํ™”๋ฒฝ & ๋ณดํ˜ธ ์„œ๋น„์Šค
    • AWS WAF: ALB, API Gateway, CloudFront์— ์ ์šฉ ๊ฐ€๋Šฅ
    • AWS Shield:
      • Standard (๋ฌด๋ฃŒ, ๊ธฐ๋ณธ DDoS ๋ณดํ˜ธ)
      • Advanced (์ถ”๊ฐ€ DDoS ๋ณดํ˜ธ, SLA ๋ณด์žฅ)

๐Ÿ” ๊ธฐํƒ€ ๋ณด์•ˆ ์„œ๋น„์Šค ํ†ตํ•ฉ

  • IAM Identity Center (SSO)
  • AWS Systems Manager Parameter Store
  • Amazon CloudWatch & CloudTrail (์ถ”์ /๋ชจ๋‹ˆํ„ฐ๋ง)

๐Ÿ“Œ ์‹œํ—˜ ๋Œ€๋น„ ํ•ต์‹ฌ ์ฒดํฌ

  • VPC = Regional / Subnet = Zonal
  • SG vs NACL ์ฐจ์ด (์ƒํƒœ ์ €์žฅ ์—ฌ๋ถ€, ์ ์šฉ ๋‹จ์œ„)
  • Private Subnet ↔ NAT GW ↔ ์ธํ„ฐ๋„ท ์•„์›ƒ๋ฐ”์šด๋“œ ๊ตฌ์กฐ
  • PrivateLink vs VPC Peering → ๋Œ€๊ทœ๋ชจ ํ™•์žฅ ์‹œ PrivateLink ์„ ํƒ
  • Macie → PII ๋ณดํ˜ธ
  • Cognito → Federation & User Pool
  • Secrets Manager vs Parameter Store ์ฐจ์ด
  • WAF ๋ฐฐํฌ ๊ฐ€๋Šฅํ•œ ๋ฆฌ์†Œ์Šค ๊ธฐ์–ต (ALB, API GW, CloudFront)
  • Shield Standard vs Shield Advanced ์ฐจ์ด

๐Ÿ“Š ์‹œ๊ฐํ™” ๋‹ค์ด์–ด๊ทธ๋žจ

 
flowchart TD A[Secure Workloads & Applications] A --> B[VPC Security] B --> B1[Default vs Custom VPC] B --> B2[SG / NACL / Route Tables] B --> B3[Subnet (Public vs Private)] B --> B4[NAT GW, IGW] A --> C[Secure Connections] C --> C1[Site-to-Site VPN] C --> C2[Client VPN] C --> C3[Direct Connect] C --> C4[PrivateLink] A --> D[Data Security] D --> D1[Amazon Macie - PII] D --> D2[Encryption / Keys] D --> D3[Backup & DR] A --> E[App Security Services] E --> E1[Secrets Manager] E --> E2[Parameter Store] E --> E3[AWS WAF] E --> E4[AWS Shield] A --> F[Identity & Monitoring] F --> F1[Amazon Cognito] F --> F2[IAM Identity Center] F --> F3[GuardDuty] F --> F4[CloudWatch & CloudTrail]

โœ… ์ •๋ฆฌ

  • VPC ๋ณด์•ˆ ์„ค๊ณ„ ๋Šฅ๋ ฅ์ด ํ•ต์‹ฌ (SG, NACL, ์„œ๋ธŒ๋„ท, NAT, PrivateLink)
  • ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ์„œ๋น„์Šค (Macie, Cognito, GuardDuty ๋“ฑ) ์ˆ™์ง€
  • ๋น„๋ฐ€ ๊ด€๋ฆฌ ์ฐจ์ด์  (Secrets Manager vs Parameter Store)
  • ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ (VPN, Direct Connect, PrivateLink ํ™œ์šฉ)
  • WAF/Shield์˜ ํŠน์ง•๊ณผ ๋ฐฐํฌ ๊ฐ€๋Šฅํ•œ ์„œ๋น„์Šค ๊ตฌ๋ถ„

 3. Determine Appropriate Data Security Controls

๐Ÿ” Domain 1-3: Determine Appropriate Data Security Controls

โœจ ํ•ต์‹ฌ ์ฃผ์ œ

  • ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ(Data Protection) ๋Š” AWS ๋ณด์•ˆ ์„ค๊ณ„์˜ ์ค‘์‹ฌ
  • ๋ฐ์ดํ„ฐ๋Š” ์ €์žฅ ์‹œ(At Rest) ์™€ ์ „์†ก ์ค‘(In Transit) ๋ชจ๋‘ ์•”ํ˜ธํ™” ํ•„์š”
  • ์ตœ์†Œ ๊ถŒํ•œ ์›์น™(Least Privilege)๊ณผ ํ‚ค ๊ด€๋ฆฌ๊ฐ€ ํ•ต์‹ฌ

๐Ÿงฑ ์•”ํ˜ธํ™” Fundamentals

  • ์•”ํ˜ธํ™” ์œ ํ˜•
    • At Rest: ์ €์žฅ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ (S3, EBS, RDS ๋“ฑ)
    • In Transit: ์ „์†ก ์ค‘ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ (TLS/SSL, ACM ์ธ์ฆ์„œ)
  • ์šฉ์–ด
    • Plaintext: ์•”ํ˜ธํ™” ์ „ ๋ฐ์ดํ„ฐ (๋ฌธ์„œ, ์ด๋ฏธ์ง€, ์•ฑ ๋“ฑ)
    • Algorithm: ์•”ํ˜ธํ™” ์ฒ˜๋ฆฌ ๋กœ์ง
    • Key: ์•”ํ˜ธํ™”/๋ณตํ˜ธํ™” ๋น„๋ฐ€ (๋Œ€์นญ/๋น„๋Œ€์นญ)
    • Ciphertext: ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ
  • ์•”ํ˜ธํ™” ํ‚ค
    • ๋Œ€์นญํ‚ค (Symmetric): ํ•˜๋‚˜์˜ ํ‚ค๋กœ ์•”ํ˜ธํ™”·๋ณตํ˜ธํ™”
    • ๋น„๋Œ€์นญํ‚ค (Asymmetric): ๊ณต๊ฐœํ‚ค/๊ฐœ์ธํ‚ค ๋ถ„๋ฆฌ

๐Ÿ”‘ AWS ์•”ํ˜ธํ™” ์„œ๋น„์Šค

  • KMS (Key Management Service)
    • Managed key ๊ด€๋ฆฌ, ์ž๋™ ํšŒ์ „ ์ง€์›
    • ํ†ตํ•ฉ ์„œ๋น„์Šค ๋งŽ์Œ (EBS, S3, RDS, Lambda ๋“ฑ)
  • CloudHSM
    • ๊ณ ๊ฐ ์ „์šฉ HSM(Hardware Security Module)
    • ๊ทœ์ œ·๋ณด์•ˆ์„ฑ ๋†’์€ ํ™˜๊ฒฝ์—์„œ ์‚ฌ์šฉ
  • KMS + CloudHSM → ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํ‚ค ๊ด€๋ฆฌ ๊ฐ€๋Šฅ
  • AWS Certificate Manager (ACM)
    • SSL/TLS ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ ๋ฐ ์ž๋™ ๊ฐฑ์‹ 
  • S3 ์•”ํ˜ธํ™”
    • Client-side Encryption (ํด๋ผ์ด์–ธํŠธ์—์„œ ์•”ํ˜ธํ™” ํ›„ ์—…๋กœ๋“œ)
    • Server-side Encryption (SSE)
      • SSE-S3: S3 ๊ด€๋ฆฌ ํ‚ค
      • SSE-KMS: KMS ํ‚ค
      • SSE-C: ๊ณ ๊ฐ ์ œ๊ณต ํ‚ค

๐Ÿ“‹ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ & ์ปดํ”Œ๋ผ์ด์–ธ์Šค

  • ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ: AWS(์ธํ”„๋ผ ๋ณด์•ˆ) + ๊ณ ๊ฐ(๋ฐ์ดํ„ฐ/์ ‘๊ทผ ๊ด€๋ฆฌ)
  • AWS Artifact: ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๋ณด๊ณ ์„œ/์ธ์ฆ์„œ ํ™•์ธ
  • Cloud Adoption Framework (CAF) – Security Perspective
    • IAM
    • Detective Controls
    • Infrastructure Security
    • Data Protection
    • Incident Response

๐Ÿ›ก ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ํŒจํ„ด

  • ๋ฐฉ์–ด ์‹ฌ์ธต(Defense in Depth) → ์˜ˆ๋ฐฉ(Preventive) + ํƒ์ง€(Detective)
  • ๋ฐ์ดํ„ฐ ๋ถ„๋ฅ˜ → ๋ฏผ๊ฐ๋„์— ๋”ฐ๋ฅธ ๋ณด์•ˆ ์ •์ฑ… ์ ์šฉ
  • ์ ‘๊ทผ ํŒจํ„ด ๊ธฐ๋ฐ˜ ์ œ์–ด → S3 ๋ฒ„ํ‚ท/๊ฐ์ฒด ๋‹จ์œ„ ์ •์ฑ…, Lifecycle ๊ด€๋ฆฌ

๐Ÿ’พ ์Šคํ† ๋ฆฌ์ง€ ๋ณด์•ˆ & DR

  • ์Šคํ† ๋ฆฌ์ง€ ์œ ํ˜•: Object(S3), File(EFS), Block(EBS)
  • ํ™œ์šฉ ์‚ฌ๋ก€: Backup/Recovery, Migration, Compliance, Data Lakes
  • DR ์ „๋žต (Disaster Recovery)
    1. Backup & Restore (์ €๋น„์šฉ, ๊ธฐ๋ณธ DR)
    2. Pilot Light (์ตœ์†Œ ํ•ต์‹ฌ๋งŒ ์œ ์ง€, ํ•„์š” ์‹œ ํ™•์žฅ)
    3. Warm Standby (์ถ•์†Œ ๋ฒ„์ „ ์šด์˜, ์žฅ์•  ์‹œ ํ™•์žฅ)
    4. Multi-site Active-Active (๊ณ ๋น„์šฉ, ๊ณ ๊ฐ€์šฉ์„ฑ)
  • AWS Backup (์ค‘์•™ ๊ด€๋ฆฌ)
    • ์ง€์›: EBS, EC2, RDS, Aurora, DynamoDB, EFS, Storage Gateway, FSx
    • ํฌ๋กœ์Šค ๋ฆฌ์ „ ๋ฐฑ์—…, ๋ณต๊ตฌ ์‹œ์  ์„ ํƒ ์ง€์›
  • ์Šค๋ƒ…์ƒท/๋ณต์ œ ๊ธฐ๋Šฅ
    • EBS Snapshot
    • RDS/Aurora Snapshot
    • DynamoDB Backup
    • S3 Cross-Region Replication (๋ฒ„์ „ ๊ด€๋ฆฌ ํฌํ•จ)
  • Hybrid ํ™˜๊ฒฝ  AWS Storage Gateway

๐Ÿ“Š ์‹œํ—˜ ๋Œ€๋น„ ํ•ต์‹ฌ ๋น„๊ต

  • KMS vs CloudHSM → ๊ด€๋ฆฌํ˜• vs ์ „์šฉ HSM
  • S3 ์•”ํ˜ธํ™” ๋ฐฉ์‹ → SSE-S3 / SSE-KMS / SSE-C / Client-side
  • Secrets Manager vs Parameter Store (์ด์ „ Task Statement ์—ฐ๊ฒฐ)
  • DR ์ „๋žต 4๋‹จ๊ณ„ → Backup→Pilot Light→Warm Standby→Multi-site
  • ๋ฐ์ดํ„ฐ ์„ฑ๋Šฅ ์˜ํ–ฅ → KMS/RDS ์ผ๋ถ€ ์„ฑ๋Šฅ ์˜ํ–ฅ ๊ฐ€๋Šฅ, EBS ์•”ํ˜ธํ™” ์˜ํ–ฅ ๋ฏธ๋ฏธ

๐Ÿ“Š ์‹œ๊ฐํ™” ๋‹ค์ด์–ด๊ทธ๋žจ

 
flowchart TD A[Data Security Controls] A --> B[Encryption] B --> B1[At Rest] B --> B2[In Transit] B --> B3[Symmetric / Asymmetric] B --> B4[KMS vs CloudHSM] B --> B5[S3 SSE-S3 / SSE-KMS / SSE-C / Client-side] A --> C[Compliance] C --> C1[AWS Artifact] C --> C2[CAF - Security Perspective] A --> D[Storage & DR] D --> D1[Backup & Restore] D --> D2[Pilot Light] D --> D3[Warm Standby] D --> D4[Multi-site Active-Active] D --> D5[AWS Backup / Snapshots / Replication] A --> E[Access & Patterns] E --> E1[Least Privilege] E --> E2[Data Classification] E --> E3[Defense in Depth] E --> E4[S3 Lifecycle / Intelligent Tiering]

โœ… ์ •๋ฆฌ

  • ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ๋Š” At Rest + In Transit ์•”ํ˜ธํ™”๊ฐ€ ๊ธฐ๋ณธ
  • KMS, CloudHSM, ACM, S3 Encryption ๋ฐฉ์‹ ์ˆ™์ง€
  • AWS Artifact์™€ CAF Security ๊ด€์  ์ดํ•ด
  • DR ์ „๋žต(Backup → Active-Active) ์•”๊ธฐ ํ•„์ˆ˜
  • AWS Backup, Snapshots, Replication ์„œ๋น„์Šค ํ™œ์šฉ๋ฒ• ์ˆ™์ง€

 

๋ฐ˜์‘ํ˜•

'AWS > Skill Builder_AWS SAA-C03' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

[AWS SAA-C03] Domain 2 Review: AWS Certified Solutions Architect - Associate  (0) 2025.10.26