AWS Well-architected Framework - Security Pillar

AWS ๊ณ ๊ฐ๋“ค์ด ์‹ค์ˆ˜ํ•˜๊ธฐ ์‰ฌ์šด ๋ณด์•ˆ ์ด์Šˆ๋ฅผ ๋‹ค๋ค„์š”

๋ณด์•ˆ ๋””์ž์ธ ์›์น™

๊ฐ•๋ ฅํ•œ Identity ๊ด€๋ฆฌ ๊ธฐ๋ฐ˜์„ ๊ตฌํ˜„

  • ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ ์›์น™ ์„ ๊ตฌํ˜„ํ•˜๊ณ , AWS Resource ๊ฐ„์˜ ์ƒํ˜ธ ์ž‘์šฉ์— ๋Œ€ํ•œ ์ธ๊ฐ€ ๊ณผ์ •์—์„œ ์ ์ ˆํ•˜๊ฒŒ ์ง๋ฌด ๋ถ„๋ฆฌ ํ†ต์ œ ์ ์šฉ

์ฑ…์ž„ ์ถ”์ ์„ฑ ํ™•๋ณด

  • ๋ชจ๋“  ๋ณ€๊ฒฝ ์‚ฌํ•ญ๊ณผ ์ž‘์—…๋“ค์„ ์‹ค์‹œ๊ฐ„ ๋ชจ๋‹ˆํ„ฐ๋ง/๋กœ๊น…/๊ฐ์‚ฌ

  • ์ž๋™ ๋Œ€์‘ ํ™˜๊ฒฝ ๊ตฌ์„ฑ

๋ชจ๋“  ๊ณ„์ธต์— ๋ณด์•ˆ ์ ์šฉ

  • ๋‹จ์ผ ๋ณด์•ˆ ๊ณ„์ธต์ด ์•„๋‹Œ ๋ชจ๋“  ๊ณ„์ธต (Edge, VPC, ELB, EC2, OS ๋ฐ application) ์— ํ•„์š”ํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ ์šฉ ๋ฐ ํ†ต์ œ

Best practice ์ž๋™ ์ ์šฉ

  • ๊ฒ€์ฆ๋œ ๋ณด์•ˆ๊ธฐ์ค€์ด ์„  ์ ์šฉ๋˜์–ด ๋ฒ„์ „ ๊ด€๋ฆฌ๋˜๋Š” Template ๊ธฐ๋ฐ˜ ์œผ๋กœ, ์ž๋™์œผ๋กœ ์•ˆ์ „ํ•˜๊ฒŒ Scailing ํ™˜๊ฒฝ์„ ์ง€์›ํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ตฌํ˜„

์ „์†ก ์ค‘ ๋ฐ ์œ ํœด ์‹œ Data ๋ณดํ˜ธ

  • Data๋ฅผ ๋ฏผ๊ฐ๋„ level๋กœ ๋ถ„๋ฅ˜ ํ•˜๊ณ ,

  • ํ•„์š”์‹œ์•”ํ˜ธํ™”, ํ† ํฐํ™” ๋ฐ access ์ œ์–ด

Data๋กœ ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž๋ฅผ ์ตœ๋Œ€ํ•œ ๊ฒฉ๋ฆฌ

  • ๊ด€๋ฆฌ์ž์˜ ์‹ค์ˆ˜ ๋ฐฉ์ง€๋ฅผ ์œ„ํ•ด ์ž๋™ ์ฒ˜๋ฆฌ process๋ฅผ ์ ์šฉํ•˜๊ณ , data ์ง์ ‘ access ๋ฐ ์ˆ˜๋™ ์ฒ˜๋ฆฌ ๊ณผ์ •์„ ์ตœ์†Œํ™”

    • but, ๋‹ค๋ฅธ ์ˆ˜๋‹จ์ด ๋™๋ฐ˜๋˜์–ด์•ผ ํ•จ

๋ณด์•ˆ ์ด๋ฒคํŠธ์— ๋Œ€ํ•œ ์ถฉ๋ถ„ํ•œ ๋Œ€๋น„

  • ๋ณด์•ˆ ์‚ฌ๊ณ  ๋Œ€์‘ simulation ์„ ์ค€๋น„ ๋ฐ ์‹คํ–‰

  • ์ž๋™ํ™”๋œ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ํƒ์ง€/์กฐ์‚ฌ ๋ฐ ๋ณต๊ตฌ ์†๋„ ํ–ฅ์ƒ

1. ๋ณด์•ˆ governance

Sec 1) Workload๋ฅผ ์–ผ๋งˆ๋‚˜ ์•ˆ์ „ํ•˜๊ฒŒ ์šด์˜ํ•˜๊ณ  ์žˆ๋Š”๊ฐ€?

๋ชจ๋ฒ” ์‚ฌ๋ก€

  1. Multi-account ๋กœ workload ๋ถ„๋ฆฌ ์šด์˜

  2. AWS account๋กœ์˜ ์•ˆ์ „ํ•œ ์ ‘๊ทผ ๊ตฌํ˜„

  3. ๋ณด์•ˆ ํ†ต์ œ ๋ชฉํ‘œ๋ฅผ ์ˆ˜๋ฆฝ ํ•˜๊ณ , ์ง€์†์ ์ธ ๊ฒ€์ฆ ์ˆ˜ํ–‰

  4. ์ตœ์‹  ๋ณด์•ˆ ์œ„ํ˜‘์— ๋Œ€์‘ ์ฒด๊ณ„ ํ™•๋ณด

  5. ์ตœ์‹  ๋ณด์•ˆ ์š”๊ฑด, trend, ๊ทœ์ • ๋“ค์„ workload์— ๋ฐ˜์˜

  6. Process๋‚˜ ๋ฐฐํฌ pipeline ์ƒ์— ์ž๋™ํ™”๋œ Testing ๋ฐ ๊ฒ€์ฆ ๋‹จ๊ณ„ ๊ตฌํ˜„

  7. ์œ„ํ˜‘๋ชจ๋ธ์„ ํ†ตํ•ด ์ž ์žฌ์ ์ธ ์œ„ํ˜‘๋“ค์„ ์‹๋ณ„ ํ•˜๊ณ  ์šฐ์„ ์ˆœ์œ„ ๋ถ€์—ฌ

  8. ์ฃผ๊ธฐ์ ์œผ๋กœ ์ƒˆ๋กœ์šด ๋ณด์•ˆ ์„œ๋น„์Šค / ๊ธฐ๋Šฅ / ์ œํ’ˆ ์— ๋Œ€ํ•ด ํ‰๊ฐ€ ๋ฐ ์ ์šฉ

    • New feature ๊ฐ€ ๊ณ„์† update ๋˜๊ณ  ์žˆ์Œ

      • ์ด๊ฒƒ์— ๋Œ€ํ•œ ํ‰๊ฐ€ ๋ฐ ์ ์šฉ ํ•„์š”!

AWS Account Planning

  • ์‚ฌ์—…๋ถ€ ๋ณ„

  • ๊ฐœ๋ฐœ์ฃผ๊ธฐ ๋ณ„

  • ํ”„๋กœ์ ํŠธ ๋ณ„

AWS Landing Zone

  • AWS ์ง์›์ด ํˆฌ์ž…๋˜์–ด CloudFormation ์„ ๊ตฌ์ถ•ํ•ด์คŒ

AWS Control Tower

https://aws.amazon.com/controltower/

  • Landing Zone ์ž๋™ ๊ตฌ์„ฑ ์„œ๋น„์Šค

  • 2๊ฐœ์˜ core account ์ƒ์„ฑ

    1. Log_archive

    2. Audit

  • Core/Custom OU ๊ตฌ์กฐ์™€ Account Factory wprhd

  • AWS SSO๋ฅผ ์ด์šฉํ•œ Single Sign-On ์ œ๊ณต

    • with Active Directory custom option

  • ํƒ์ง€ ๋ฐ ๋ฐฉ์ง€ ์šฉ 25๊ฐœ์˜ Built-In guard rail ์ œ๊ณต

2. Identity& Access ๊ด€๋ฆฌ

Sec 2) ์‚ฌ์šฉ์ž์™€ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ Identity๋ฅผ ์–ด๋–ป๊ฒŒ ๊ด€๋ฆฌํ•˜๋Š”๊ฐ€?

๋ชจ๋ฒ” ์‚ฌ๋ก€

  1. MFA ๋“ฑ ๊ฐ•๋ ฅํ•œ ์ธ์ฆ ๊ธฐ๋ฒ• ์ ์šฉ

  2. ์ƒ์‹œ ์ž๊ฒฉ์ฆ๋ช… ๋Œ€์‹  ์ž„์‹œ ์ž๊ฒฉ์ฆ๋ช… ํ™œ์šฉ

  3. ์ž๊ฒฉ์ฆ๋ช…์„ ์•ˆ์ „ํ•˜๊ฒŒ ๋ณด๊ด€ ๋ฐ ๊ด€๋ฆฌ

  4. ์ค‘์•™ํ™”๋œ IDP (identity provider) ํ™˜๊ฒฝ ๊ตฌ์ถ•๊ณผ ์ธ์‚ฌ ์ด๋ฒคํŠธ ์—ฐ๋™

  5. ์ƒ์‹œ ์ž๊ฒฉ์ฆ๋ช…์˜ ์ฃผ๊ธฐ์ ์ธ ๊ต์ฒด ์™€ ๊ฐ์‚ฌ

  6. IDP์— ์ •์˜๋œ ์‚ฌ์šฉ์ž ๊ทธ๋ฃน๊ณผ ์†์„ฑ์„ ์ ‘๊ทผ์ œ์–ด์— ์ ๊ทน ํ™œ์šฉ

    • ์‚ฌ์šฉ์ž๊ฐ€ ๋ฌด์Šจ ์†์„ฑ์„ ๊ฐ€์ง€๊ณ ์žˆ๊ณ , ๋ถ€์„œ๊ฐ€ ์–ด๋–ป๊ฒŒ ๋˜๋Š”์ง€ ๋“ฑ์˜ ์†์„ฑ์„ ํ™œ์šฉํ•˜์—ฌ ๊ถŒํ•œ์„ align ํ•œ๋‹ค

      • ์†์„ฑ์— ๋”ฐ๋ผ ์ž๋™์œผ๋กœ ์ ์šฉ๋˜๋Š” ๊ฒƒ์ด ํฌ์ธํŠธ!

    • ์†์„ฑ์— tagging์„ ํ•ด์„œ ๊ด€๋ฆฌํ•˜๋ฏ€๋กœ, ์†์„ฑ๋งŒ ๋ฐ”๊พธ๋ฉด ์‚ฌ์šฉ์ž์˜ ๊ถŒํ•œ์„ ๋ฐ”๊ฟ€ ์ˆ˜ ์žˆ์–ด์„œ ๊ฐ„ํŽธ!

AWS SSO

  • AWS SSO enables administrators to configure and maintain all the necessary permissions for your accounts automatically, without requiring any additional setup in the individual accounts.

Credential Report & Config Rule

Config Rule

  • ๊ด€๋ฆฌํ˜• ๊ทœ์น™ (access-keys-rotated) ์ด์šฉ

    • Parameter (maxAccessKeyAge) ์ผ์ˆ˜ ๊ธฐ์ค€ ์ดˆ๊ณผ๋œ Acess key๋“ค์„ ์ฃผ๊ธฐ์ ์œผ๋กœ ์ ๊ฒ€

      • ์ฃผ๊ธฐ์ ์œผ๋กœ Access key๋ฅผ ๋ณ€๊ฒฝํ–ˆ๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ timestamp๋กœ ๊ธฐ๋กํ•˜๋Š” ๋“ฑ ๊ทœ์น™์„ ์ •ํ•ด์„œ ๊ถŒํ•œ ๊ด€๋ฆฌ

        • ์ฃผ๊ธฐ ์„ค์ • ํ•„์š”ํ•จ!

          • How?

            • AWS CLI ์— ์‚ฌ์šฉ์‹œ๋งˆ๋‹ค ์ž„์‹œ ์ž๊ฒฉ์ฆ๋ช…์„ ๋ฐ›์•„์˜ค๋Š” script๋ฅผ mapping ํ•ด์„œ ์ž๊ฒฉ์ฆ๋ช…์„ ๊ต์ฒด

  • ๊ธฐ๋ณธ ๊ฐ’

    • 90์ผ

  • ์ ๋ฐœ๋œ ๋Œ€์ƒ์„ ์ž๋™์œผ๋กœ ๊ต์ฒดํ•˜๊ณ  ์†Œ์œ ์ž์—๊ฒŒ ์•Œ๋ ค์ฃผ๋Š” ๋žŒ๋‹ค ํ•จ์ˆ˜ ๋“ฑ์˜ ์‘์šฉ ๊ฐ€๋Šฅ

AWS Secret Manager

image-20201002012732026

์„œ๋ฒ„ ์‚ฌ์šฉ์ž ๊ด€๋ฆฌ ์ผ€์ด์Šค

1. AWS AD Domain Join

2. Session Manager

3. Instance Connect

  • SendSSHPublicKey Action์„ ํ†ตํ•ด SSH ๊ณต๊ฐœํ‚ค๋ฅผ instance metadata์— ์ž๋™ ๋ฐฐํฌ

    • 60์ดˆ ๋™์•ˆ๋งŒ ์กด์žฌ (short-term)

Sec3) ์‚ฌ์šฉ์ž์™€ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ๊ถŒํ•œ์„ ์–ด๋–ป๊ฒŒ ๊ด€๋ฆฌํ•˜๋Š”๊ฐ€?

๋ชจ๋ฒ” ์‚ฌ๋ก€

  1. ์‚ฌ์šฉ์ž ์œ ํ˜•, ์ ‘๊ทผ ์ˆ˜๋‹จ ๋“ฑ ๊ฐ ์ ‘๊ทผ ์ œ์–ด ์ผ€์ด์Šค๋ณ„ ์ƒ์„ธ ๊ถŒํ•œ ์š”๊ฑด ์ •์˜ ํ•˜๊ธฐ

  2. ์ตœ๋Œ€ํ•œ ์ƒ์„ธํ•œ ๋ ˆ๋ฒจ์—์„œ ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ ์›์น™ ์ค€์ˆ˜

  3. ๋น„์ƒ์‹œ ์ ‘๊ทผ ์Šน์ธ ํ”„๋กœ์„ธ์Šค ๊ทœ์ •

  4. ๋ฏธ์‚ฌ์šฉ ๊ถŒํ•œ์— ๋Œ€ํ•œ ์ƒ์‹œ ํšŒ์ˆ˜ ์ ˆ์ฐจ ๊ตฌ์„ฑ

  5. ์œ„์ž„ ์ฒด๊ณ„๋ฅผ ์ง€์›ํ•˜๋Š” ๊ถˆํ•œ ๊ฐ€๋“œ๋ ˆ์ผ ์„ค์ •

  6. ์ธ์‚ฌ ์ด๋ฒคํŠธ์™€ ์—ฐ๋™๋˜๋Š” ๊ถŒํ•œ ์ƒ์„ฑ, ๋ณ€๊ฒฝ, ํšŒ์ˆ˜ ์ ˆ์ฐจ ๊ตฌ์„ฑ

  7. ํผ๋ธ”๋ฆญ ๋ฐ ์–ด์นด์šดํŠธ ๊ฐ„ ์ ‘๊ทผ ์— ๋Œ€ํ•œ ์ƒ์‹œ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ๊ฒฝ๋ถ€ ์ฒด๊ณ„ ๊ตฌ์„ฑ

  8. ๊ณต์œ  ๋ฆฌ์†Œ์Šค ๋“ค์— ๋Œ€ํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ๊ฑฐ๋ฒ„๋‹ ๊ฐ•ํ™”

IAM Access Advisor

  • Identity ๊ธฐ๋ฐ˜ ์ •์ฑ…์— ๋Œ€ํ•œ ์ตœ์†Œ ๊ตฌ๋„ˆํ•œ ๋ถ€์—ฌ ๊ฒ€์ฆ

  • ์‹คํ–‰ action์— ๋Œ€ํ•œ ์ด๋ ฅ ์ œ๊ณต

    • S3

IAM Access Analyzer

  • Resource ๊ธฐ๋ฐ˜ ์ •์ฑ…์— ๋Œ€ํ•œ ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ ๊ฒ€์ฆ

  • ๋Œ€์ƒ resource์— ๋Œ€ํ•œ ์ ‘๊ทผ ์ •์ฑ…์„ ๋ถ„์„ํ•˜์—ฌ public ๋˜๋Š” ํƒ€ account ์ ‘๊ทผ์ด ํ—ˆ์šฉ๋œ ๋ถ€๋ถ„์„ ์•Œ๋ ค์คŒ

  • ์ƒ์‹œ ๋ชจ๋‹ˆํ„ฐ๋ง/ํƒ์ƒ‰์œผ๋กœ ์ •์ฑ…์ด ๋ณ€๊ฒฝ๋˜๋Š” ์ˆœ๊ฐ„ ํƒ์ง€

    • ํƒ์ง€ ํ›„ Security Hub ๋กœ ์ „๋‹ฌ

  • ์˜๋„์น˜ ์•Š์€ ๋ณ€๊ฒฝ์˜ ๊ฒฝ์šฐ, ์ฆ‰๊ฐ ์กฐ์น˜

IAM Policy -Permission Boundary

image-20201002014036573
  • ์‚ฌ์šฉ์ž๊ฐ€ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” ์ตœ๋Œ€ ๊ถŒํ•œ์„ ์ œํ•œ

    • ์œ ์ €๋ณ„๋กœ ์ตœ๋Œ€ํ•œ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” permission์— ๋Œ€ํ•œ boundary ๋ฅผ ์„ค์ •

    • Identity-based ์ •์ฑ…์œผ๋กœ ๋ถ€์—ฌ๋œ ๊ถŒํ•œ๊ณผ ๊ต์ง‘ํ•ฉ ํ˜•ํƒœ๋กœ ์ ์šฉ๋œ๋‹ค (ํ•„ํ„ฐ์—ญํ• )

      • Group ๋ณ„๋กœ๋Š” ์ง€์ •ํ•  ์ˆ˜ ์—†๋‹ค๊ณ  ํ•จ!

Hands-On: AWS ํ™˜๊ฒฝ์—์„œ์˜ ์นจํ•ด์‚ฌ๊ณ  ๋Œ€์‘ workshop

http://gslim-public-workshops.s3-website.ap-northeast-2.amazonaws.com/incidentresponseworkshop/

+

Look it up

Last updated

Was this helpful?