โ† IaC-based ISMS-P Cloud Security Consulting

Cloud Security Service Integration

AWS IAM ๊ณ„์ • ๊ด€๋ฆฌ์™€ MFA ์ ์šฉ ํ˜„ํ™ฉ, ํŠน์ˆ˜ ๊ณ„์ • ๋ณดํ˜ธ ์ฒด๊ณ„๋ฅผ ์ ๊ฒ€ํ•ฉ๋‹ˆ๋‹ค. ์ ‘๊ทผ๊ถŒํ•œ ๊ฒ€ํ†  ์ž๋™ํ™”์™€ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผํ†ต์ œ ํ˜„ํ™ฉ์„ ์ง„๋‹จํ•˜๊ณ  ISMS-P ์š”๊ตฌ์‚ฌํ•ญ์— ๋ถ€ํ•ฉํ•˜๋Š” ๊ฐœ์„ ๋ฐฉ์•ˆ์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค.

๊ณ„์ • ๋ฐ ์ธ์ฆ ๊ด€๋ฆฌ
ISMS-P 2.5.1 ์‚ฌ์šฉ์ž ๊ณ„์ • ๊ด€๋ฆฌ / 2.5.3 ์‚ฌ์šฉ์ž ์ธ์ฆ

๊ณ„์ • ๋ฐ ์ธ์ฆ ๊ด€๋ฆฌ

IAM ๊ณ„์ • ์ƒ๋ช…์ฃผ๊ธฐ ๊ด€๋ฆฌ์™€ MFA ๋“ฑ ๊ฐ•๋ ฅํ•œ ์ธ์ฆ ์ฒด๊ณ„๊ฐ€ ์ ์šฉ๋˜์–ด ์žˆ๋Š”์ง€ ์ ๊ฒ€ํ•ฉ๋‹ˆ๋‹ค.

์ ๊ฒ€๊ฒฐ๊ณผ: "๊ณ„์ • ๋ฐ ์ธ์ฆ ๊ด€๋ฆฌ ๋ฏธํก"

์›์ธ: ํ‡ด์ง์ž ๊ณ„์ • ์ž”์กด, MFA ๋ฏธ์ ์šฉ

๊ถŒ๊ณ : IAM ์ž๋™ํ™” ๋ฐ MFA ํ•„์ˆ˜ ์ •์ฑ… ์ ์šฉ

๊ถŒํ•œ ๊ด€๋ฆฌ
ISMS-P 2.5.5 ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ / 2.5.6 ์ ‘๊ทผ๊ถŒํ•œ ๊ฒ€ํ† 

ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ

Root ๊ณ„์ •, Admin ๊ถŒํ•œ ๋“ฑ ํŠน์ˆ˜ ๊ณ„์ •์ด ๋ณดํ˜ธ๋˜๊ณ  ์ ‘๊ทผ๊ถŒํ•œ์ด ์ •๊ธฐ ๊ฒ€ํ† ๋˜๋Š”์ง€ ์ ๊ฒ€ํ•ฉ๋‹ˆ๋‹ค.

์ ๊ฒ€๊ฒฐ๊ณผ: "๊ถŒํ•œ ๊ด€๋ฆฌ ์ฒด๊ณ„ ๋ฏธํก"

์›์ธ: Root ๊ณ„์ • ์‚ฌ์šฉ, ๋ฏธ์‚ฌ์šฉ ๊ถŒํ•œ ๋ฐฉ์น˜

๊ถŒ๊ณ : IAM Access Analyzer ๊ธฐ๋ฐ˜ ์ž๋™ ๊ฒ€ํ† 

๋„คํŠธ์›Œํฌ ๋ฐ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ
ISMS-P 2.6.1 ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ / 2.10.2 ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ

๋„คํŠธ์›Œํฌ ๋ฐ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ

VPC ๋„คํŠธ์›Œํฌ ์„ธ๋ถ„ํ™”์™€ ํด๋ผ์šฐ๋“œ ๋ฆฌ์†Œ์Šค ๋ณด์•ˆ ์„ค์ •์ด ์ ์ ˆํ•œ์ง€ ์ ๊ฒ€ํ•ฉ๋‹ˆ๋‹ค.

์ ๊ฒ€๊ฒฐ๊ณผ: "๋„คํŠธ์›Œํฌ ์ ‘๊ทผํ†ต์ œ ๋ฏธํก"

์›์ธ: ๊ณผ๋„ํ•œ ์ธ๋ฐ”์šด๋“œ ํ—ˆ์šฉ, 0.0.0.0/0 ๊ฐœ๋ฐฉ

๊ถŒ๊ณ : Security Group ๋ฐ NetworkPolicy ์ตœ์†Œํ™”

โ† Back to Overview