2025-10-10 15:54:05
๋ฐ˜์‘ํ˜•

๐Ÿ“˜ Q105.

Which tasks are the customer’s responsibility, according to the AWS shared responsibility model? (Choose two)

AWS ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ์— ๋”ฐ๋ฅด๋ฉด ๊ณ ๊ฐ์˜ ์ฑ…์ž„์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ? (2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต

B. Perform client-side data encryption
C. Configure IAM credentials


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€ ์„ค๋ช…
B. Perform client-side data encryption ๊ณ ๊ฐ์€ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™” ๋ฐฉ์‹(์„œ๋ฒ„ ์ธก, ํด๋ผ์ด์–ธํŠธ ์ธก, ํ‚ค ๊ด€๋ฆฌ ๋“ฑ) ์„ ์ง์ ‘ ์„ ํƒํ•˜๊ณ  ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ฆ‰, ํด๋ผ์ด์–ธํŠธ ์ธก ์•”ํ˜ธํ™”(Client-side encryption) ์€ ๊ณ ๊ฐ์˜ ์ฑ…์ž„์ž…๋‹ˆ๋‹ค. ๐Ÿ”
C. Configure IAM credentials IAM ์‚ฌ์šฉ์ž, ๊ทธ๋ฃน, ์—ญํ• , ์ •์ฑ… ์„ค์ • ๋ฐ MFA(๋‹ค์ค‘ ์ธ์ฆ) ํ™œ์„ฑํ™”๋Š” ๋ชจ๋‘ ๊ณ ๊ฐ์˜ ์ฑ…์ž„์ž…๋‹ˆ๋‹ค. ๐Ÿ‘ค

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ ์„ค๋ช… ์ด์œ 
A. Establish the global infrastructure AWS์˜ ์ „ ์„ธ๊ณ„ ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ๋ฆฌ์ „, AZ ๊ตฌ์ถ•์€ AWS๊ฐ€ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. โŒ AWS ์ฑ…์ž„
D. Secure edge locations CloudFront ๊ฐ™์€ ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜ ๋ณด์•ˆ์€ AWS๊ฐ€ ๋‹ด๋‹นํ•ฉ๋‹ˆ๋‹ค. โŒ AWS ์ฑ…์ž„
E. Patch Amazon RDS DB instances Amazon RDS๋Š” ๊ด€๋ฆฌํ˜• ์„œ๋น„์Šค(Managed Service) ๋กœ,
DB ์—”์ง„ ํŒจ์น˜๋Š” AWS๊ฐ€ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค.
โŒ AWS ์ฑ…์ž„

๐Ÿงฉ ์‹œ๊ฐํ™” ์š”์•ฝ (Mermaid)

```mermaid
flowchart TD
    A["โ˜๏ธ AWS Responsibility<br>(Security of the Cloud)"] -->|๐Ÿ—๏ธ ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ๋„คํŠธ์›Œํฌ, ํ•˜๋“œ์›จ์–ด| B["๐Ÿข ๋ฌผ๋ฆฌ์  ๋ณด์•ˆ & ๊ธ€๋กœ๋ฒŒ ์ธํ”„๋ผ"]
    A --> C["๐ŸŒŽ ๋ฆฌ์ „, AZ, ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜ ๊ด€๋ฆฌ"]
    D["๐Ÿ‘ค Customer Responsibility<br>(Security in the Cloud)"] -->|๐Ÿ”’ ๋ฆฌ์†Œ์Šค ๋ณด์•ˆ| E["๐Ÿ”‘ IAM ์„ค์ •, ์ ‘๊ทผ ์ œ์–ด, ์•”ํ˜ธํ™”"]
    D -->|๐Ÿ’พ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ| F["๐Ÿ—„๏ธ ํด๋ผ์ด์–ธํŠธ ์ธก ์•”ํ˜ธํ™”, ๋ฐฑ์—…, ๋ณด์•ˆ ๊ทธ๋ฃน ๊ตฌ์„ฑ"]
```
 

๐Ÿ’ฌ ๊ตฌ์„ฑ ์„ค๋ช…

โ˜๏ธ AWS Responsibility (Security of the Cloud)

  • ๐Ÿ—๏ธ ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ๋„คํŠธ์›Œํฌ, ํ•˜๋“œ์›จ์–ด → ๋ฌผ๋ฆฌ์  ๋ณด์•ˆ ๋ฐ ๊ธ€๋กœ๋ฒŒ ์ธํ”„๋ผ ๊ด€๋ฆฌ
  • ๐ŸŒŽ ๋ฆฌ์ „, AZ, ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜ ๊ด€๋ฆฌ → ์•ˆ์ •์  ์„œ๋น„์Šค ์ œ๊ณต์„ ์œ„ํ•œ ์ธํ”„๋ผ ๊ณ„์ธต ์šด์˜

๐Ÿ‘ค Customer Responsibility (Security in the Cloud)

  • ๐Ÿ”’ ๋ฆฌ์†Œ์Šค ๋ณด์•ˆ → IAM, ์ ‘๊ทผ ์ œ์–ด, ์•”ํ˜ธํ™” ์„ค์ • ๊ด€๋ฆฌ
  • ๐Ÿ’พ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ → ๋ฐฑ์—…, ํด๋ผ์ด์–ธํŠธ ์•”ํ˜ธํ™”, ๋ณด์•ˆ ๊ทธ๋ฃน ๊ตฌ์„ฑ

โœ… ํ•ต์‹ฌ ์ •๋ฆฌ

๊ตฌ๋ถ„ ์ฑ…์ž„ ์ฃผ์ฒด ์˜ˆ์‹œ
Security of the Cloud AWS ๋ฆฌ์ „, AZ, ์—ฃ์ง€ ๋กœ์ผ€์ด์…˜, ํ•˜๋“œ์›จ์–ด, ๋„คํŠธ์›Œํฌ
Security in the Cloud ๊ณ ๊ฐ IAM, ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”, ๋ณด์•ˆ ๊ทธ๋ฃน, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์„ค์ •

๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

AWS๋Š” “ํด๋ผ์šฐ๋“œ์˜ ๋ณด์•ˆ”์„,
๊ณ ๊ฐ์€ “ํด๋ผ์šฐ๋“œ ์•ˆ์˜ ๋ณด์•ˆ”์„ ์ฑ…์ž„์ง„๋‹ค.
์ฆ‰, IAM๊ณผ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”๋Š” ๊ณ ๊ฐ์˜ ๋ชซ์ž…๋‹ˆ๋‹ค. ๐Ÿ”’


๐Ÿ“˜ Q106.

A developer has been hired by a large company and needs AWS credentials.
Which are security best practices that should be followed? (Choose two)

๊ฐœ๋ฐœ์ž๊ฐ€ ๋Œ€๊ธฐ์—…์— ์ƒˆ๋กœ ์ž…์‚ฌํ–ˆ์œผ๋ฉฐ AWS ์ž๊ฒฉ ์ฆ๋ช…์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.
์–ด๋–ค ๋ณด์•ˆ ๋ชจ๋ฒ” ์‚ฌ๋ก€๋ฅผ ๋”ฐ๋ผ์•ผ ํ•ฉ๋‹ˆ๊นŒ? (2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต

A. Grant the developer access to only the AWS resources needed to perform the job.
E. Ensure the account password policy requires a minimum length.


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€์„ค๋ช…
A. Grant the developer access to only the AWS resources needed to perform the job. ์ตœ์†Œ ๊ถŒํ•œ์˜ ์›์น™(Principle of Least Privilege) — ์‚ฌ์šฉ์ž๊ฐ€ ์ž์‹ ์˜ ์—…๋ฌด์— ํ•„์š”ํ•œ ์ตœ์†Œํ•œ์˜ ๋ฆฌ์†Œ์Šค์—๋งŒ ์ ‘๊ทผํ•˜๋„๋ก IAM ์ •์ฑ…์„ ๊ตฌ์„ฑํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๐Ÿ‘ค
E. Ensure the account password policy requires a minimum length. ๊ฐ•๋ ฅํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ •์ฑ…(Password Policy) ์„ค์ •์€ IAM ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ์ž…๋‹ˆ๋‹ค. ์ตœ์†Œ ๊ธธ์ด, ์ˆซ์ž·ํŠน์ˆ˜๋ฌธ์ž ํฌํ•จ ๋“ฑ์„ ์š”๊ตฌํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๐Ÿ”’

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ์„ค๋ช…์™œ ํ‹€๋ ธ๋Š”๊ฐ€
B. Share the AWS account root user credentials with the developer. ๋ฃจํŠธ ๊ณ„์ •์€ ์ ˆ๋Œ€ ๊ณต์œ ํ•˜์ง€ ์•Š์Œ. MFA๋ฅผ ์ ์šฉํ•˜๊ณ  ๋น„์ƒ์‹œ์—๋งŒ ์‚ฌ์šฉํ•ด์•ผ ํ•จ. โŒ ์‹ฌ๊ฐํ•œ ๋ณด์•ˆ ์œ„๋ฐ˜
C. Add the developer to the administrator’s group. ๊ด€๋ฆฌ ๊ถŒํ•œ(AdministratorAccess)์€ ๋„ˆ๋ฌด ๊ด‘๋ฒ”์œ„ํ•จ. ์ตœ์†Œ ๊ถŒํ•œ ์›์น™์— ์–ด๊ธ‹๋‚จ. โŒ ์ž˜๋ชป๋œ ๊ถŒํ•œ ๋ถ€์—ฌ
D. Configure password policy that prevents password changes. ์‚ฌ์šฉ์ž๊ฐ€ ์ฃผ๊ธฐ์ ์œผ๋กœ ๋น„๋ฐ€๋ฒˆํ˜ธ๋ฅผ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•จ. โŒ ๋ณด์•ˆ ์œ ์—ฐ์„ฑ ๊ฒฐ์—ฌ

๐Ÿงฉ ๊ฐœ๋… ์ •๋ฆฌ: IAM ๋ณด์•ˆ ๋ชจ๋ฒ” ์‚ฌ๋ก€ (Best Practices)

ํ•ญ๋ชฉ์„ค๋ช…
๐Ÿงฑ ๋ฃจํŠธ ๊ณ„์ • ์ตœ์†Œํ™” ๋ฃจํŠธ ๊ณ„์ •์€ ์˜ค์ง ๊ฒฐ์ œ๋‚˜ ์ดˆ๊ธฐ ์„ค์ •์šฉ์œผ๋กœ๋งŒ ์‚ฌ์šฉ
๐Ÿ”‘ IAM ์‚ฌ์šฉ์ž/์—ญํ• (Role) ์‚ฌ์šฉ ๊ฐœ๋ณ„ IAM ์‚ฌ์šฉ์ž ์ƒ์„ฑ, ํ•„์š”์‹œ ์—ญํ•  ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ๋ถ€์—ฌ
โš™๏ธ ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ (Least Privilege) ์—…๋ฌด ์ˆ˜ํ–‰์— ๊ผญ ํ•„์š”ํ•œ ๊ถŒํ•œ๋งŒ ๋ถ€์—ฌ
๐Ÿ”’ MFA(Multi-Factor Authentication) ๋ฃจํŠธ ๊ณ„์ • ๋ฐ ์ค‘์š” IAM ์‚ฌ์šฉ์ž์— ๋‹ค์ค‘ ์ธ์ฆ ์ ์šฉ
๐Ÿ” ๋น„๋ฐ€๋ฒˆํ˜ธ ์ •์ฑ… ์„ค์ • ์ตœ์†Œ ๊ธธ์ด, ๋ณต์žก๋„, ์ฃผ๊ธฐ์  ๋ณ€๊ฒฝ ๋“ฑ ์ ์šฉ
๐Ÿ“Š CloudTrail ํ™œ์„ฑํ™” ๋ชจ๋“  IAM/API ํ™œ๋™ ๋กœ๊น… ๋ฐ ๊ฐ์‚ฌ ์ถ”์  ์œ ์ง€

๐Ÿง  ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

```mermaid
flowchart TD
    A[๐Ÿ” IAM Best Practices] --> B[๐Ÿงฑ Root ๊ณ„์ • ์ œํ•œ ์‚ฌ์šฉ]
    A --> C[โš™๏ธ ์ตœ์†Œ ๊ถŒํ•œ ์›์น™ ์ ์šฉ]
    A --> D[๐Ÿ”‘ MFA ์„ค์ •]
    A --> E[๐Ÿ“ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ •์ฑ… ์„ค์ •]
    A --> F[๐Ÿงฉ IAM Role ๋ฐ ๊ฐœ๋ณ„ ์‚ฌ์šฉ์ž ์ƒ์„ฑ]
```

๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

IAM ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ ์›์น™:
“์ตœ์†Œ ๊ถŒํ•œ(Least Privilege)” + “๊ฐ•๋ ฅํ•œ ์•”ํ˜ธ ์ •์ฑ…(Strong Password Policy)” = ์•ˆ์ „ํ•œ AWS ๊ณ„์ • ๐Ÿ”’


๐Ÿ“˜ Q128.

A company has a compute workload that is steady, predictable, and uninterruptible.
Which Amazon EC2 instance purchasing options meet these requirements MOST cost-effectively?
(Choose two)

ํ•œ ํšŒ์‚ฌ๋Š” ์•ˆ์ •์ ์ด๊ณ  ์˜ˆ์ธก ๊ฐ€๋Šฅํ•˜๋ฉฐ ์ค‘๋‹จ๋  ์ˆ˜ ์—†๋Š” ์ปดํ“จํŒ… ์›Œํฌ๋กœ๋“œ๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.
์ด๋Ÿฌํ•œ ์š”๊ตฌ์‚ฌํ•ญ์„ ๊ฐ€์žฅ ๋น„์šฉ ํšจ์œจ์ ์œผ๋กœ ์ถฉ์กฑํ•˜๋Š” EC2 ๊ตฌ๋งค ์˜ต์…˜์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ? (2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต

B. Reserved Instances
D. Savings Plans


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€์„ค๋ช…์ด์œ 
B. Reserved Instances (RI) 1๋…„ ๋˜๋Š” 3๋…„ ์•ฝ์ •์„ ํ†ตํ•ด EC2 ์ธ์Šคํ„ด์Šค๋ฅผ ์˜ˆ์•ฝ ๊ตฌ๋งคํ•จ์œผ๋กœ์จ On-Demand ๋Œ€๋น„ ์ตœ๋Œ€ 72% ์ ˆ๊ฐ ๊ฐ€๋Šฅ โœ” ์žฅ๊ธฐ์ ์ด๊ณ  ์˜ˆ์ธก ๊ฐ€๋Šฅํ•œ ์›Œํฌ๋กœ๋“œ์— ์ด์ƒ์ 
D. Savings Plans 1๋…„ ๋˜๋Š” 3๋…„ ์•ฝ์ •์œผ๋กœ ์ผ์ • ๊ธˆ์•ก์˜ ์ปดํ“จํŒ… ์‚ฌ์šฉ๋Ÿ‰(commitment)์„ ์•ฝ์†ํ•˜๊ณ , AWS๊ฐ€ ์ž๋™์œผ๋กœ ๊ฐ€์žฅ ์ €๋ ดํ•œ ์š”๊ธˆ์œผ๋กœ ์ ์šฉ โœ” ์œ ์—ฐ์„ฑ ๋†’์Œ — EC2, Fargate, Lambda์—๋„ ์ ์šฉ ๊ฐ€๋Šฅ

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ์„ค๋ช…์™œ ํ‹€๋ ธ๋Š”๊ฐ€
A. On-Demand Instances ํ•„์š”ํ•  ๋•Œ ์ฆ‰์‹œ ์‚ฌ์šฉ ๊ฐ€๋Šฅ, ์•ฝ์ • ์—†์Œ โŒ ์žฅ๊ธฐ ์‚ฌ์šฉ ์‹œ ๊ฐ€์žฅ ๋น„์Œˆ
C. Spot Instances ๋ฏธ์‚ฌ์šฉ EC2 ์šฉ๋Ÿ‰์„ ๊ฒฝ๋งค์‹์œผ๋กœ ๊ตฌ๋งค, 90% ์ €๋ ด โŒ ์˜ˆ์ธก ๋ถˆ๊ฐ€, ์–ธ์ œ๋“  ์ค‘๋‹จ ๊ฐ€๋Šฅ — “uninterruptible” ์กฐ๊ฑด์— ๋งž์ง€ ์•Š์Œ
E. Dedicated Hosts ์ „์šฉ ๋ฌผ๋ฆฌ ์„œ๋ฒ„ ์ œ๊ณต (BYOL ํ™˜๊ฒฝ ๋“ฑ) โŒ ๋ณด์•ˆ·๊ทœ์ • ์ค€์ˆ˜์—๋Š” ์ ํ•ฉํ•˜์ง€๋งŒ ๋น„์šฉ ํšจ์œจ์„ฑ ๋‚ฎ์Œ

๐Ÿงฉ ๋น„๊ต ํ‘œ ์ •๋ฆฌ

๊ตฌ๋งค ์˜ต์…˜์•ฝ์ •๋น„์šฉ ์ ˆ๊ฐ๋ฅ ์œ ์—ฐ์„ฑ์›Œํฌ๋กœ๋“œ ์œ ํ˜•
On-Demand ์—†์Œ ๐Ÿ’ธ 0% ๋งค์šฐ ๋†’์Œ ์ผ์‹œ์ /๋ถˆ๊ทœ์น™์ 
Reserved Instances (RI) 1๋…„ / 3๋…„ ๐Ÿ’ฐ ์ตœ๋Œ€ 72% ์ค‘๊ฐ„ ์˜ˆ์ธก ๊ฐ€๋Šฅ, ๊ณ ์ •๋œ ์›Œํฌ๋กœ๋“œ
Savings Plans 1๋…„ / 3๋…„ ๐Ÿ’ฐ ์ตœ๋Œ€ 72% ๋งค์šฐ ๋†’์Œ ์˜ˆ์ธก ๊ฐ€๋Šฅ, ์œ ์—ฐํ•œ ํ™˜๊ฒฝ
Spot Instances ์—†์Œ ๐Ÿ’ฐ ์ตœ๋Œ€ 90% ๋‚ฎ์Œ ๋น„ํ•ต์‹ฌ, ์ค‘๋‹จ ๊ฐ€๋Šฅ ์ž‘์—…
Dedicated Hosts 1๋…„ / 3๋…„ ๐Ÿ’ฐ ๋‚ฎ์Œ ์ œํ•œ์  ๊ทœ์ • ์ค€์ˆ˜ / ๋ผ์ด์„ ์Šค ํ•„์š” ํ™˜๊ฒฝ

๐Ÿ“ˆ ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

```mermaid
graph TD
    A[๐Ÿ’ป ์›Œํฌ๋กœ๋“œ ํŠน์„ฑ<br>Steady, Predictable, Uninterruptible] --> B[๐Ÿท๏ธ Reserved Instances<br>1~3๋…„ ์•ฝ์ •, ๊ณ ์ • ์›Œํฌ๋กœ๋“œ์— ์ ํ•ฉ]
    A --> C[๐Ÿ’ก Savings Plans<br>์œ ์—ฐํ•œ ์•ฝ์ • ๊ธฐ๋ฐ˜ ํ• ์ธ, ์„œ๋น„์Šค ๊ฐ„ ์ž๋™ ์ ์šฉ]
    B -.->|์ตœ๋Œ€ 72% ์ ˆ๊ฐ| D[๐Ÿ’ฐ Cost Efficient]
    C -.->|Flexible + Predictable| D
```

 


๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

์˜ˆ์ธก ๊ฐ€๋Šฅํ•œ ์žฅ๊ธฐ ์›Œํฌ๋กœ๋“œ์—๋Š”
๐Ÿ’ก “Reserved Instances + Savings Plans” ์กฐํ•ฉ์ด ๊ฐ€์žฅ ๊ฒฝ์ œ์ ์ด๋‹ค.


๐Ÿ“˜ Q131.

A company wants to migrate its on-premises workloads to the AWS Cloud.
The company wants to separate workloads for chargeback to different departments.


Which AWS services or features will meet these requirements? (Choose two)

ํšŒ์‚ฌ๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ์›Œํฌ๋กœ๋“œ๋ฅผ AWS ํด๋ผ์šฐ๋“œ๋กœ ๋งˆ์ด๊ทธ๋ ˆ์ด์…˜ํ•˜๋ ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค.
๊ฐ ๋ถ€์„œ๋ณ„๋กœ ์›Œํฌ๋กœ๋“œ๋ฅผ ๋ถ„๋ฆฌํ•˜๊ณ  ๋น„์šฉ์„ ๋ถ€์„œ๋ณ„๋กœ ๋ฐฐ๋ถ„(Chargeback)ํ•˜๋ ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค.
์–ด๋–ค AWS ์„œ๋น„์Šค/๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•ด์•ผ ํ• ๊นŒ์š”? (2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต

B. Consolidated Billing
E. Multiple AWS Accounts


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€์„ค๋ช…
B. Consolidated Billing AWS Organizations ๊ธฐ๋Šฅ ์ค‘ ํ•˜๋‚˜๋กœ, ์—ฌ๋Ÿฌ ๊ณ„์ •์„ ํ•˜๋‚˜์˜ ๊ฒฐ์ œ ๊ณ„์ •(Payer Account) ์•„๋ž˜ ํ†ตํ•ฉํ•˜์—ฌ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ๊ฐ ๋ถ€์„œ(Linked Account)๋ณ„ ๋น„์šฉ ์ถ”์  ๋ฐ ๋น„์šฉ ์ ˆ๊ฐ(๋ณผ๋ฅจ ํ• ์ธ) ํšจ๊ณผ๋ฅผ ๋™์‹œ์— ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๐Ÿ’ฐ
E. Multiple AWS Accounts ๋ถ€์„œ๋‚˜ ํ”„๋กœ์ ํŠธ๋ณ„๋กœ ๋ณ„๋„์˜ ๊ณ„์ •(Account) ์„ ์ƒ์„ฑํ•˜๋ฉด, ๋ฆฌ์†Œ์Šค์™€ ๊ณผ๊ธˆ์ด ๋ช…ํ™•ํžˆ ๋ถ„๋ฆฌ๋˜์–ด Chargeback(๋น„์šฉ ๋ฐฐ๋ถ„) ์ด ์šฉ์ดํ•ฉ๋‹ˆ๋‹ค. ๐Ÿงฉ

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ์„ค๋ช…์™œ ํ‹€๋ ธ๋Š”๊ฐ€
A. Placement groups EC2 ์ธ์Šคํ„ด์Šค ๊ฐ„ ๋ฌผ๋ฆฌ์  ๋ฐฐ์น˜ ์ „๋žต(Cluster, Spread, Partition)์„ ์ง€์ •ํ•˜๋Š” ๊ธฐ๋Šฅ โŒ ๋น„์šฉ์ด๋‚˜ ๋ถ€์„œ ๋ถ„๋ฆฌ์™€ ๋ฌด๊ด€
C. Edge locations CloudFront ์ฝ˜ํ…์ธ  ์ „์†ก์„ ์œ„ํ•œ ์ „ ์„ธ๊ณ„ CDN ๋…ธ๋“œ โŒ ๋น„์šฉ ๊ด€๋ฆฌ์™€ ๋ฌด๊ด€
D. AWS Config ๋ฆฌ์†Œ์Šค ๊ตฌ์„ฑ์„ ์ถ”์ ํ•˜๊ณ  ๊ทœ์ • ์ค€์ˆ˜ ์—ฌ๋ถ€๋ฅผ ํ‰๊ฐ€ํ•˜๋Š” ์„œ๋น„์Šค โŒ ๋น„์šฉ ๊ด€๋ฆฌ ๋ชฉ์ ์ด ์•„๋‹˜

๐Ÿงญ ๊ฐœ๋… ์š”์•ฝ

๊ฐœ๋…์„ค๋ช…
AWS Organizations ์—ฌ๋Ÿฌ AWS ๊ณ„์ •์„ ์ค‘์•™์—์„œ ์ƒ์„ฑ·๊ด€๋ฆฌ·ํ†ต์ œํ•  ์ˆ˜ ์žˆ๋Š” ์„œ๋น„์Šค
Consolidated Billing ์—ฌ๋Ÿฌ ๊ณ„์ •์˜ ๊ฒฐ์ œ๋ฅผ ํ†ตํ•ฉ ๊ด€๋ฆฌํ•˜๋ฉด์„œ, ๊ฐ ๊ณ„์ •๋ณ„๋กœ ๋น„์šฉ ๋ณด๊ณ  ๋ฐ ๋ถ„์„ ๊ฐ€๋Šฅ
Linked Account ๊ตฌ์กฐ ๋ฃจํŠธ ๊ณ„์ •(Payer Account) + ๋ถ€์„œ๋ณ„ ์—ฐ๊ฒฐ ๊ณ„์ •(Linked Accounts) ๊ตฌ์„ฑ
Chargeback ์‹ค์ œ ๋ฆฌ์†Œ์Šค ์‚ฌ์šฉ๋Ÿ‰ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ถ€์„œ๋ณ„ ๋น„์šฉ์„ ๋‚ด๋ถ€ ํšŒ๊ณ„์— ๋ฐ˜์˜ํ•˜๋Š” ์ ˆ์ฐจ

๐Ÿ“Š ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart TD
    A["๐Ÿข ํšŒ์‚ฌ ๊ณ„์ • ๊ตฌ์กฐ"] --> B["๐Ÿงพ Payer Account<br>Consolidated Billing"]
    B --> C["๐Ÿ“‚ Dept A Account<br>R&D"]
    B --> D["๐Ÿ“‚ Dept B Account<br>Marketing"]
    B --> E["๐Ÿ“‚ Dept C Account<br>Finance"]
    B -.-> F["๐Ÿ’ฐ ๋น„์šฉ ํ†ตํ•ฉ ๊ด€๋ฆฌ ๋ฐ ์ฒญ๊ตฌ ๋ณด๊ณ "]
```
 

๐Ÿ’ฌ ๊ตฌ์„ฑ ์„ค๋ช…

  • ๐Ÿข ํšŒ์‚ฌ ๊ณ„์ • ๊ตฌ์กฐ (Organization)
    AWS Organizations ๊ธฐ๋ฐ˜์œผ๋กœ ์ „์ฒด ๊ณ„์ • ๊ตฌ์กฐ ๊ด€๋ฆฌ
  • ๐Ÿงพ Payer Account (Consolidated Billing)
    ๋ชจ๋“  ๋ถ€์„œ ๊ณ„์ •์˜ ๋น„์šฉ์„ ํ†ตํ•ฉ ์ฒญ๊ตฌ ๋ฐ ๊ด€๋ฆฌ
  • ๐Ÿ“‚ Dept A / B / C Accounts
    ๊ฐ ๋ถ€์„œ๋ณ„๋กœ ๋…๋ฆฝ์ ์ธ AWS ๋ฆฌ์†Œ์Šค ์šด์˜ (R&D, Marketing, Finance ๋“ฑ)
  • ๐Ÿ’ฐ ๋น„์šฉ ํ†ตํ•ฉ ๊ด€๋ฆฌ ๋ฐ ์ฒญ๊ตฌ ๋ณด๊ณ 
    ๋น„์šฉ ์ ˆ๊ฐ, ๋ฆฌ์†Œ์Šค ๊ฐ€์‹œ์„ฑ, ์˜ˆ์‚ฐ ์ถ”์  ๊ฐ€๋Šฅ

๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

๋ถ€์„œ๋ณ„๋กœ ๋น„์šฉ์„ ๋ถ„๋ฆฌํ•˜๋ ค๋ฉด
Multiple AWS Accounts + Consolidated Billing (AWS Organizations) ์กฐํ•ฉ์ด ์ •๋‹ต์ž…๋‹ˆ๋‹ค. ๐Ÿงพ


๐Ÿ“˜ Q137.

Which options are AWS Cloud Adoption Framework (AWS CAF) security perspective capabilities? (Choose two)

AWS Cloud Adoption Framework(AWS CAF) ๋ณด์•ˆ ๊ด€์ (Security Perspective)์—์„œ ์ œ๊ณตํ•˜๋Š” ๊ธฐ๋Šฅ์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ?
(2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต

C. Incident Response
D. Infrastructure Protection


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€ ์„ค๋ช…
C. Incident Response ๋ณด์•ˆ ์‚ฌ๊ณ  ๋ฐœ์ƒ ์‹œ ๊ฐ์ง€, ๋Œ€์‘, ๋ณต๊ตฌ ์ ˆ์ฐจ๋ฅผ ์ •์˜ํ•˜๋Š” ๋Šฅ๋ ฅ์ž…๋‹ˆ๋‹ค. AWS์—์„œ๋Š” Amazon GuardDuty, AWS CloudTrail, AWS Security Hub ๋“ฑ์„ ํ†ตํ•ด ์ž๋™ํ™”๋œ ์‚ฌ๊ณ  ๋Œ€์‘์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. โšก
D. Infrastructure Protection ๋„คํŠธ์›Œํฌ, ์ปดํ“จํŒ…, ์Šคํ† ๋ฆฌ์ง€, ๋ฐ์ดํ„ฐ ๊ณ„์ธต์—์„œ ๋ณด์•ˆ ์ œ์–ด(๋ฐฉํ™”๋ฒฝ, ์ ‘๊ทผ ์ œ์–ด, ์•”ํ˜ธํ™” ๋“ฑ) ๋ฅผ ๊ตฌํ˜„ํ•˜๋Š” ๋Šฅ๋ ฅ์ž…๋‹ˆ๋‹ค. VPC ๋ณด์•ˆ ๊ทธ๋ฃน, WAF, Shield, NACL ๋“ฑ์ด ์—ฌ๊ธฐ์— ํ•ด๋‹นํ•ฉ๋‹ˆ๋‹ค. ๐Ÿ›ก๏ธ

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ ์„ค๋ช… ์™œ ํ‹€๋ ธ๋Š”๊ฐ€
A. Observability ์šด์˜(Operations Perspective)์— ์†ํ•˜๋Š” ๊ฐœ๋…์œผ๋กœ, ๋ชจ๋‹ˆํ„ฐ๋ง๊ณผ ๋กœ๊น…์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. โŒ ๋ณด์•ˆ ๊ด€์  ์•„๋‹˜
B. Incident and Problem Management ์šด์˜(Operations Perspective) ์˜์—ญ์— ํฌํ•จ๋จ. ๋ฌธ์ œ ๊ด€๋ฆฌ์™€ ์žฌ๋ฐœ ๋ฐฉ์ง€ ์ค‘์‹ฌ โŒ ์šด์˜ ๊ด€์ 
E. Availability and Continuity ๋น„์ฆˆ๋‹ˆ์Šค ๊ด€์ (Business Perspective) — ๊ณ ๊ฐ€์šฉ์„ฑ, ์žฌํ•ด ๋ณต๊ตฌ ๊ณ„ํš ์ˆ˜๋ฆฝ ๊ด€๋ จ โŒ ๋ณด์•ˆ์ด ์•„๋‹Œ ๋น„์ฆˆ๋‹ˆ์Šค ์—ฐ์†์„ฑ ์˜์—ญ

๐Ÿงญ AWS Cloud Adoption Framework (CAF) 6 Perspectives

Perspective ์ฃผ์š” ๋ชฉ์  ์ฃผ์š” Capabilities ์˜ˆ์‹œ
Business ๋น„์ฆˆ๋‹ˆ์Šค ๊ฐ€์น˜ ์ฐฝ์ถœ, ROI ๋ถ„์„ IT ์žฌ๋ฌด ๊ด€๋ฆฌ, ํฌํŠธํด๋ฆฌ์˜ค ๊ด€๋ฆฌ
People ์ธ์žฌ ๋ฐ ์กฐ์ง ๋ณ€ํ™” ๊ด€๋ฆฌ ๋ฆฌ๋”์‹ญ ๊ฐœ๋ฐœ, ์ธ์žฌ ์—ญ๋Ÿ‰ ๊ฐ•ํ™”
Governance ์œ„ํ—˜ ๊ด€๋ฆฌ ๋ฐ ๊ทœ์ • ์ค€์ˆ˜ ๋น„์šฉ ๊ด€๋ฆฌ, ์ •์ฑ… ๋ฐ ํ‘œ์ค€ํ™”
Platform ๊ธฐ์ˆ ์  ๊ธฐ๋ฐ˜ ๊ตฌ์ถ• ์ธํ”„๋ผ ์ž๋™ํ™”, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํฌํŠธํด๋ฆฌ์˜ค
Security ๋ณด์•ˆ, ๊ทœ์ • ์ค€์ˆ˜, ์œ„ํ—˜ ์™„ํ™” Incident Response, Infrastructure Protection, Identity & Access Management, Detection
Operations IT ์„œ๋น„์Šค ๊ด€๋ฆฌ ๋ฐ ์ง€์†์  ์šด์˜ ๋ชจ๋‹ˆํ„ฐ๋ง, ์ด๋ฒคํŠธ ๊ด€๋ฆฌ, ๋ณ€๊ฒฝ ๊ด€๋ฆฌ

๐Ÿงฉ ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart TD
    A[๐Ÿ”’ AWS CAF Security Perspective] --> B[๐Ÿ›ก๏ธ Infrastructure Protection]
    A --> C[๐Ÿšจ Incident Response]
    A --> D[๐Ÿ‘ค Identity & Access Management]
    A --> E[๐Ÿง  Detection]
```


๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

AWS CAF์˜ ๋ณด์•ˆ(Security) ๊ด€์ ์€ ์ธํ”„๋ผ ๋ณดํ˜ธ + ์‚ฌ๊ณ  ๋Œ€์‘ ์ค‘์‹ฌ์ด๋‹ค.
์ฆ‰, “์˜ˆ๋ฐฉ(Protect) + ๋Œ€์‘(Respond)” ์ด ํ•ต์‹ฌ ํ‚ค์›Œ๋“œ ๐Ÿ”

 


๐Ÿ“˜ Q140.

Which AWS services can a company use to achieve a loosely coupled architecture? (Choose two)

๋А์Šจํ•˜๊ฒŒ ๊ฒฐํ•ฉ๋œ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” AWS ์„œ๋น„์Šค๋Š” ๋ฌด์—‡์ž…๋‹ˆ๊นŒ? (2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต: B. Amazon Simple Queue Service (Amazon SQS)

E. AWS Step Functions


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

์„ ํƒ์ง€ ์„ค๋ช…
B. Amazon Simple Queue Service (SQS) ๋น„๋™๊ธฐ ๋ฉ”์‹œ์ง€ ํ ์„œ๋น„์Šค๋กœ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„์˜ ์ง์ ‘ ์—ฐ๊ฒฐ์„ ์ œ๊ฑฐํ•˜์—ฌ ์„œ๋น„์Šค ๊ฐ„ ์˜์กด์„ฑ์„ ๋‚ฎ์ถ”๋Š”(Decoupling) ๋ฐ ํ•ต์‹ฌ์ ์ž…๋‹ˆ๋‹ค. ๐Ÿ“จ
E. AWS Step Functions ์„œ๋ฒ„๋ฆฌ์Šค ์›Œํฌํ”Œ๋กœ์šฐ ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜ ์„œ๋น„์Šค๋กœ, ์—ฌ๋Ÿฌ AWS ์„œ๋น„์Šค(Lambda, ECS ๋“ฑ)์˜ ์‹คํ–‰ ์ˆœ์„œ๋ฅผ ์ œ์–ดํ•˜์—ฌ ๋А์Šจํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋œ ์ƒํƒœ๋กœ ๊ตฌ์„ฑ์š”์†Œ ๊ฐ„ ํ๋ฆ„์„ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๐Ÿ”„

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ ์„ค๋ช… ์™œ ํ‹€๋ ธ๋Š”๊ฐ€
A. Amazon WorkSpaces ๊ฐ€์ƒ ๋ฐ์Šคํฌํ†ฑ(VDI) ์„œ๋น„์Šค โŒ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์•„ํ‚คํ…์ฒ˜์™€ ๋ฌด๊ด€
C. Amazon Connect ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ฝœ์„ผํ„ฐ(Contact Center) ์„œ๋น„์Šค โŒ ์„œ๋น„์Šค ๊ฐ„ ๊ฒฐํ•ฉ๊ณผ ๊ด€๋ จ ์—†์Œ
D. AWS Trusted Advisor ๋น„์šฉ, ๋ณด์•ˆ, ์„ฑ๋Šฅ ๋“ฑ ๋ชจ๋ฒ” ์‚ฌ๋ก€ ์ ๊ฒ€ ๋„๊ตฌ โŒ ์•„ํ‚คํ…์ฒ˜ ๊ฒฐํ•ฉ๋„์™€ ๋ฌด๊ด€

๐Ÿง  ํ•ต์‹ฌ ๊ฐœ๋…: Loosely Coupled Architecture

๊ฐœ๋… ์„ค๋ช…
Loosely Coupled ๊ตฌ์„ฑ ์š”์†Œ๋“ค์ด ๋…๋ฆฝ์ ์œผ๋กœ ์ž‘๋™ํ•˜์—ฌ ํ•œ ๋ถ€๋ถ„์˜ ์˜ค๋ฅ˜๊ฐ€ ์ „์ฒด ์‹œ์Šคํ…œ์— ์˜ํ–ฅ์„ ์ฃผ์ง€ ์•Š์Œ
Tightly Coupled ๊ตฌ์„ฑ ์š”์†Œ๊ฐ€ ๋ฐ€์ ‘ํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋˜์–ด ํ•˜๋‚˜์˜ ์žฅ์• ๊ฐ€ ์ „์ฒด ์‹œ์Šคํ…œ์— ์˜ํ–ฅ์„ ์คŒ
AWS ์„œ๋น„์Šค ์˜ˆ์‹œ SQS (๋น„๋™๊ธฐ ๋ฉ”์‹œ์ง•), SNS (Publish/Subscribe), EventBridge, Step Functions ๋“ฑ

๐Ÿ“Š ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart LR
    A["๐ŸŸข Producer Service"] -->|๐Ÿ“ค ๋ฉ”์‹œ์ง€ ์ „์†ก| B["๐Ÿ“ฆ Amazon SQS Queue"]
    B -->|๐Ÿ“ฅ ๋ฉ”์‹œ์ง€ ์ˆ˜์‹ | C["๐Ÿ”ต Consumer Service"]
    C -->|๐ŸŽฏ ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜| D["๐Ÿงฉ AWS Step Functions"]
    D --> E["โš™๏ธ Lambda / ECS ๋“ฑ ์›Œํฌ๋กœ๋“œ"]
```
 

โœ… ์ •๋‹ต

B. Amazon Simple Queue Service (Amazon SQS)
E. AWS Step Functions


๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

SQS๋Š” ์„œ๋น„์Šค ๊ฐ„ ๋น„๋™๊ธฐ ํ†ต์‹ ์œผ๋กœ ๊ฒฐํ•ฉ๋„๋ฅผ ๋‚ฎ์ถ”๊ณ ,
Step Functions๋Š” ์—ฌ๋Ÿฌ ์›Œํฌํ”Œ๋กœ๋ฅผ ๋А์Šจํ•˜๊ฒŒ ์—ฐ๊ฒฐํ•˜์—ฌ ์•ˆ์ •์  ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๐Ÿš€


๐Ÿ“˜ Q146.

Which option is a customer responsibility under the AWS shared responsibility model?

AWS ๊ณต๋™ ์ฑ…์ž„ ๋ชจ๋ธ์—์„œ ๊ณ ๊ฐ์˜ ์ฑ…์ž„์— ํ•ด๋‹นํ•˜๋Š” ๊ฒƒ์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ?


โœ… ์ •๋‹ต: B. Application data security


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

AWS์™€ ๊ณ ๊ฐ์€ ๊ฐ๊ฐ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ์˜ ๋‹ค๋ฅธ ์ธก๋ฉด์„ ์ฑ…์ž„์ง‘๋‹ˆ๋‹ค.
์ด๋ฅผ “Security of the Cloud” (AWS์˜ ์ฑ…์ž„) vs “Security in the Cloud” (๊ณ ๊ฐ์˜ ์ฑ…์ž„) ์œผ๋กœ ๊ตฌ๋ถ„ํ•ฉ๋‹ˆ๋‹ค.

๊ตฌ๋ถ„ ์„ค๋ช… ์ฑ…์ž„ ์ฃผ์ฒด
Security of the Cloud AWS๊ฐ€ ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ ์ž์ฒด์˜ ๋ณด์•ˆ์„ ๊ด€๋ฆฌํ•จ (๋ฐ์ดํ„ฐ์„ผํ„ฐ, ํ•˜๋“œ์›จ์–ด, ๋„คํŠธ์›Œํฌ ๋“ฑ) ๐ŸŸฆ AWS
Security in the Cloud ๊ณ ๊ฐ์ด ํด๋ผ์šฐ๋“œ ์œ„์— ๋ฐฐํฌํ•˜๋Š” ๋ฐ์ดํ„ฐ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜, OS ๋ณด์•ˆ ๋“ฑ์„ ๊ด€๋ฆฌํ•จ ๐ŸŸฉ ๊ณ ๊ฐ

๐Ÿ” ๊ณ ๊ฐ ์ฑ…์ž„ ์˜ˆ์‹œ (Security in the Cloud)

  • ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”
  • ์‚ฌ์šฉ์ž ์ ‘๊ทผ ์ œ์–ด (IAM)
  • OS ๋ณด์•ˆ ํŒจ์น˜
  • ๋„คํŠธ์›Œํฌ ACL / ๋ณด์•ˆ ๊ทธ๋ฃน ์„ค์ •
  • ๋กœ๊น… ๋ฐ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ตฌ์„ฑ (CloudTrail, Config ๋“ฑ)

๐Ÿ”’ AWS ์ฑ…์ž„ ์˜ˆ์‹œ (Security of the Cloud)

  • ๋ฌผ๋ฆฌ์  ๋ฐ์ดํ„ฐ์„ผํ„ฐ ๋ณด์•ˆ (CCTV, ์ถœ์ž…ํ†ต์ œ ๋“ฑ)
  • ํ•˜์ดํผ๋ฐ”์ด์ €, ํ˜ธ์ŠคํŠธ ์„œ๋ฒ„, ๋„คํŠธ์›Œํฌ ์ธํ”„๋ผ
  • ํ•˜๋“œ์›จ์–ด ์œ ์ง€๋ณด์ˆ˜ ๋ฐ ํŒจ์น˜
  • ๊ธ€๋กœ๋ฒŒ ์ธํ”„๋ผ ๊ฐ€์šฉ์„ฑ ๋ฐ ํƒ„๋ ฅ์„ฑ ํ™•๋ณด

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ ์„ค๋ช… ์ด์œ 
A. Maintenance of underlying hardware of Amazon EC2 instances ๋ฌผ๋ฆฌ์  ์„œ๋ฒ„ ์œ ์ง€๋ณด์ˆ˜ โŒ AWS์˜ ์ฑ…์ž„
C. Physical security of data centers ๋ฐ์ดํ„ฐ์„ผํ„ฐ ์ ‘๊ทผ ์ œ์–ด, ์ „๋ ฅ, ๋ƒ‰๊ฐ ๋“ฑ ๋ฌผ๋ฆฌ์  ์ธํ”„๋ผ ๋ณด์•ˆ โŒ AWS์˜ ์ฑ…์ž„
D. Maintenance of VPC components VPC๋Š” ๊ณ ๊ฐ์ด ๊ตฌ์„ฑํ•˜์ง€๋งŒ, ๊ธฐ๋ณธ ์ธํ”„๋ผ๋Š” AWS๊ฐ€ ๊ด€๋ฆฌ โŒ VPC ์ธํ”„๋ผ ์ž์ฒด๋Š” AWS ๊ด€๋ฆฌ, ๋‹จ ์„ค์ •์€ ๊ณ ๊ฐ์ด ๊ด€๋ฆฌ

๐Ÿ“Š ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart LR
    A[AWS ์ฑ…์ž„] --> B[๐Ÿ”’ Security of the Cloud<br>๋ฌผ๋ฆฌ์  ์ธํ”„๋ผ, ๋„คํŠธ์›Œํฌ, ํ•˜๋“œ์›จ์–ด]
    A2[๊ณ ๊ฐ ์ฑ…์ž„] --> C[๐Ÿงฉ Security in the Cloud<br>๋ฐ์ดํ„ฐ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜, IAM, ์•”ํ˜ธํ™”]
```

๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

AWS๋Š” ํด๋ผ์šฐ๋“œ ์ž์ฒด๋ฅผ ๋ณดํ˜ธ(Security of the Cloud),
๊ณ ๊ฐ์€ ํด๋ผ์šฐ๋“œ ๋‚ด ์ž์‚ฐ์„ ๋ณดํ˜ธ(Security in the Cloud) ํ•œ๋‹ค. ๐Ÿ’ก


 

๋ฐ˜์‘ํ˜•