2025-10-16 08:49:57
๋ฐ˜์‘ํ˜•

๐Ÿ“˜ Q278.

What is a benefit of using AWS serverless computing?

AWS ์„œ๋ฒ„๋ฆฌ์Šค ์ปดํ“จํŒ…์„ ์‚ฌ์šฉํ•˜๋ฉด ์–ด๋–ค ์ด์ ์ด ์žˆ์Šต๋‹ˆ๊นŒ?


โœ… ์ •๋‹ต: D. Management of infrastructure is offloaded to AWS.

์ธํ”„๋ผ ๊ด€๋ฆฌ๊ฐ€ AWS๋กœ ์˜คํ”„๋กœ๋“œ๋ฉ๋‹ˆ๋‹ค.


๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

ํ•ญ๋ชฉ ์„ค๋ช…
์„œ๋ฒ„๋ฆฌ์Šค(Serverless) ์‚ฌ์šฉ์ž๋Š” ์„œ๋ฒ„๋ฅผ ์ง์ ‘ ๊ด€๋ฆฌํ•˜์ง€ ์•Š๊ณ , ์ฝ”๋“œ ์‹คํ–‰์—๋งŒ ์ง‘์ค‘ํ•  ์ˆ˜ ์žˆ๋Š” ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋ชจ๋ธ์ž…๋‹ˆ๋‹ค.
ํ•ต์‹ฌ ๊ฐœ๋… - AWS๊ฐ€ ์ธํ”„๋ผ(์„œ๋ฒ„ ํ”„๋กœ๋น„์ €๋‹, ํ™•์žฅ, ํŒจ์น˜, ์œ ์ง€๋ณด์ˆ˜)๋ฅผ ์ž๋™์œผ๋กœ ๊ด€๋ฆฌ
- ์‚ฌ์šฉ์ž๋Š” ๋น„์ฆˆ๋‹ˆ์Šค ๋กœ์ง(์ฝ”๋“œ)๋งŒ ์ž‘์„ฑํ•˜๋ฉด ๋จ
๋Œ€ํ‘œ ์„œ๋น„์Šค ๐Ÿ”น AWS Lambda
๐Ÿ”น Amazon API Gateway
๐Ÿ”น AWS Fargate (์ปจํ…Œ์ด๋„ˆ์šฉ ์„œ๋ฒ„๋ฆฌ์Šค)
๐Ÿ”น Amazon EventBridge, Step Functions
์ด์  (Benefit) โœ… ์ธํ”„๋ผ ๊ด€๋ฆฌ ๋ถ€๋‹ด ๊ฐ์†Œ (offload to AWS)
โœ… ์ž๋™ ํ™•์žฅ (Auto Scaling)
โœ… ์‚ฌ์šฉํ•œ ๋งŒํผ๋งŒ ๊ณผ๊ธˆ (Pay-per-Use)
โœ… ๋น ๋ฅธ ๊ฐœ๋ฐœ ๋ฐ ๋ฐฐํฌ ์†๋„

โŒ ์˜ค๋‹ต ํ•ด์„ค

๋ณด๊ธฐ ๋‚ด์šฉ ์™œ ํ‹€๋ ธ๋Š”๊ฐ€
A. Application deployment and management are not required. ์•ฑ ๋ฐฐํฌ ๋ฐ ๊ด€๋ฆฌ๋Š” ์—ฌ์ „ํžˆ ๊ฐœ๋ฐœ์ž์˜ ์—ญํ•  โŒ ์ฝ”๋“œ ๋ฐฐํฌ๋Š” ์—ฌ์ „ํžˆ ํ•„์š”ํ•จ (Lambda ํ•จ์ˆ˜ ์—…๋กœ๋“œ ๋“ฑ)
B. Application security will be fully managed by AWS. AWS๋Š” ์ธํ”„๋ผ ๋ณด์•ˆ๋งŒ ์ฑ…์ž„์ง โŒ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ์€ ์—ฌ์ „ํžˆ ๊ณ ๊ฐ ์ฑ…์ž„
C. Monitoring and logging are not needed. ์„œ๋ฒ„๋ฆฌ์Šค์—์„œ๋„ CloudWatch ๋“ฑ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ฐ€๋Šฅ โŒ ์—ฌ์ „ํžˆ ๋ชจ๋‹ˆํ„ฐ๋ง๊ณผ ๋กœ๊น… ํ•„์š”

๐Ÿง  ํ•ต์‹ฌ ๊ฐœ๋… ์š”์•ฝ

๊ตฌ๋ถ„ ์„ค๋ช…
๊ด€๋ฆฌ ์ฃผ์ฒด ์ธํ”„๋ผ → AWS, ์ฝ”๋“œ → ์‚ฌ์šฉ์ž
์š”๊ธˆ ๋ชจ๋ธ ์‚ฌ์šฉํ•œ ๋งŒํผ(Pay-as-you-go)
ํ™•์žฅ์„ฑ ์ž๋™ ํ™•์žฅ (Auto Scaling ๋‚ด์žฅ)
์šด์˜ ๋ถ€๋‹ด ์ตœ์†Œํ™” (No server provisioning)

๐Ÿ“Š ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart LR
    A[๐Ÿ‘จ‍๐Ÿ’ป Developer] -->|Writes code only| B[โš™๏ธ AWS Lambda]
    B -->|Executes automatically| C[โ˜๏ธ AWS Infrastructure]
    C --> D[๐Ÿ“ˆ Auto Scaling, Monitoring, Maintenance]
    D --> E[โœ… No Server Management Required]
```

 


๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

โ˜๏ธ ์„œ๋ฒ„๋ฆฌ์Šค์˜ ๊ฐ€์žฅ ํฐ ์žฅ์ ์€ ์ธํ”„๋ผ ๊ด€๋ฆฌ๊ฐ€ ํ•„์š” ์—†๋‹ค๋Š” ๊ฒƒ!
๊ฐœ๋ฐœ์ž๋Š” ์ฝ”๋“œ ์‹คํ–‰๊ณผ ๋น„์ฆˆ๋‹ˆ์Šค ๋กœ์ง์—๋งŒ ์ง‘์ค‘ํ•˜๋ฉด ๋ฉ๋‹ˆ๋‹ค.


๐Ÿ“˜ Q282.

Which of the following is the customer’s responsibility under the AWS shared responsibility model? (Choose two)

๋‹ค์Œ ์ค‘ AWS ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ์— ๋”ฐ๋ฅธ ๊ณ ๊ฐ์˜ ์ฑ…์ž„์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ?
(2๊ฐœ ์„ ํƒ)


โœ… ์ •๋‹ต: C, D

  • C. Maintain the configuration of guest operating systems and applications
  • D. Manage decisions involving encryption options

๐Ÿ’ก ์ •๋‹ต ํ•ด์„ค

AWS ๊ณต์œ  ์ฑ…์ž„ ๋ชจ๋ธ์—์„œ๋Š”
๋ณด์•ˆ(Security) ๊ณผ ์ปดํ”Œ๋ผ์ด์–ธ์Šค(Compliance) ์— ๋Œ€ํ•ด
AWS์™€ ๊ณ ๊ฐ์ด ๊ฐ๊ฐ ๋‚˜๋ˆ„์–ด ์ฑ…์ž„์„ ์ง‘๋‹ˆ๋‹ค.


๐Ÿ”ธ AWS์˜ ์ฑ…์ž„ (Security of the Cloud)

“ํด๋ผ์šฐ๋“œ ์ž์ฒด์˜ ๋ณด์•ˆ”


ํ•ญ๋ชฉ ์„ค๋ช…
์ธํ”„๋ผ ๋ณด์•ˆ ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ์„œ๋ฒ„, ์Šคํ† ๋ฆฌ์ง€, ๋„คํŠธ์›Œํฌ ์žฅ๋น„ ๋“ฑ
๋ฌผ๋ฆฌ์  ๋ณด์•ˆ ์ถœ์ž… ํ†ต์ œ, ์ „๋ ฅ, ๋ƒ‰๊ฐ, ํ•˜๋“œ์›จ์–ด ์œ ์ง€๋ณด์ˆ˜
๊ฐ€์šฉ์„ฑ ๊ด€๋ฆฌ ๋ฆฌ์ „·AZ ๊ด€๋ฆฌ, ํ•˜์ดํผ๋ฐ”์ด์ € ๋ณด์•ˆ

๐Ÿ”น ๊ณ ๊ฐ์˜ ์ฑ…์ž„ (Security in the Cloud)

“ํด๋ผ์šฐ๋“œ ๋‚ด๋ถ€์˜ ๋ณด์•ˆ”


ํ•ญ๋ชฉ ์„ค๋ช…
๊ฒŒ์ŠคํŠธ OS ๊ด€๋ฆฌ ํŒจ์น˜, ๋ณด์•ˆ ์„ค์ •, ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™
์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ์ ‘๊ทผ ์ œ์–ด, ์•”ํ˜ธํ™” ํ‚ค ๊ด€๋ฆฌ
๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™” ์„œ๋ฒ„ ์ธก/ํด๋ผ์ด์–ธํŠธ ์ธก ์•”ํ˜ธํ™” ์„ ํƒ
๋„คํŠธ์›Œํฌ ์„ค์ • VPC, ์„œ๋ธŒ๋„ท, ๋ณด์•ˆ ๊ทธ๋ฃน ๊ตฌ์„ฑ

๐Ÿง  ๊ฐ ๋ณด๊ธฐ ํ•ด์„ ๋ฐ ํ‰๊ฐ€

๋ณด๊ธฐ ์„ค๋ช… ์ •๋‹ต ์—ฌ๋ถ€
A. Maintain the configuration of infrastructure devices ์ธํ”„๋ผ ์žฅ๋น„(์„œ๋ฒ„, ๋„คํŠธ์›Œํฌ ์žฅ์น˜)๋Š” AWS๊ฐ€ ๊ด€๋ฆฌ โŒ
B. Maintain patching and updates within hardware infrastructure ํ•˜๋“œ์›จ์–ด ํŒจ์น˜๋Š” AWS ์ฑ…์ž„ โŒ
C. Maintain the configuration of guest operating systems and applications EC2 OS ์„ค์ •, ๋ณด์•ˆ ์—…๋ฐ์ดํŠธ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ตฌ์„ฑ์€ ๊ณ ๊ฐ ์ฑ…์ž„ โœ…
D. Manage decisions involving encryption options ์–ด๋–ค ์•”ํ˜ธํ™” ๋ฐฉ์‹(KMS, SSE, CSE)์„ ์“ธ์ง€ ๊ฒฐ์ •ํ•˜๋Š” ๊ฒƒ์€ ๊ณ ๊ฐ ์ฑ…์ž„ โœ…
E. Maintain infrastructure hardware ๋ฌผ๋ฆฌ์  ์žฅ๋น„ ๊ด€๋ฆฌ(์„œ๋ฒ„, ์Šคํ† ๋ฆฌ์ง€)๋Š” AWS ์ฑ…์ž„ โŒ

๐Ÿงฉ ํ•ต์‹ฌ ๊ฐœ๋… ์ •๋ฆฌํ‘œ

๊ตฌ๋ถ„ ์ฑ…์ž„ ์ฃผ์ฒด ์ฃผ์š” ์˜ˆ์‹œ
AWS ์ฑ…์ž„ Security of the Cloud ํ•˜๋“œ์›จ์–ด, ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ๋ฌผ๋ฆฌ ๋ณด์•ˆ
๊ณ ๊ฐ ์ฑ…์ž„ Security in the Cloud OS ํŒจ์น˜, ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”, ์ ‘๊ทผ ์ œ์–ด

๐Ÿ“Š ์‹œ๊ฐ ์š”์•ฝ (Mermaid)

 
```mermaid
flowchart TD
    A[โ˜๏ธ AWS Responsibility] --> B[๐Ÿ”’ Data Center Security]
    A --> C[๐Ÿงฑ Network Infrastructure Protection]
    A --> D[๐Ÿงฐ Hardware Maintenance]

    E[๐Ÿ‘ฉ‍๐Ÿ’ป Customer Responsibility] --> F[๐Ÿ’พ OS & App Configuration]
    E --> G[๐Ÿ” Encryption Management]
    E --> H[๐Ÿง‘‍๐Ÿ’ผ Access Control & IAM Policies]
```
 

๐Ÿ“— ํ•œ ์ค„ ์š”์•ฝ

โ˜๏ธ AWS๋Š” ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ๋ฅผ ๋ณดํ˜ธํ•˜๊ณ ,
๐Ÿ‘ฉ‍๐Ÿ’ป ๊ณ ๊ฐ์€ ํด๋ผ์šฐ๋“œ ๋‚ด๋ถ€์˜ ์„ค์ •·๋ฐ์ดํ„ฐ·์•”ํ˜ธํ™”๋ฅผ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.


 

๋ฐ˜์‘ํ˜•