โ† Cloud Security Service Integration

ISMS-P 2.5.5 ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ High Risk

ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ์ด ์ ์ ˆํžˆ ๊ด€๋ฆฌ๋˜๊ณ  ์žˆ๋Š”๊ฐ€?

ISMS-P 2.5.5๋Š” ํŠน์ˆ˜ ๋ชฉ์  ๊ณ„์ •(Root, Admin)์„ ์ตœ์†Œํ•œ์œผ๋กœ ๋ถ€์—ฌํ•˜๊ณ  ๋ณ„๋„ ํ†ต์ œํ•˜๋„๋ก ์š”๊ตฌํ•ฉ๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋Š” Root ๊ณ„์ • Access Key ์‚ญ์ œ + IAM Role ๊ธฐ๋ฐ˜ ํŠน์ˆ˜ ๊ถŒํ•œ + SCP ํ†ต์ œ๋กœ ๊ตฌํ˜„ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

๐Ÿ“‹

ISMS-P ์ธ์ฆ ๊ธฐ์ค€

ISMS-P 2.5.5 ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ ์š”๊ตฌ์‚ฌํ•ญ

2.5.5

ํŠน์ˆ˜ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ

์ธ์ฆ ๊ธฐ์ค€ ์ •์˜

"์ •๋ณด์‹œ์Šคํ…œ ๊ด€๋ฆฌ, ๊ฐœ์ธ์ •๋ณด ๋ฐ ์ค‘์š”์ •๋ณด ๊ด€๋ฆฌ ๋“ฑ ํŠน์ˆ˜ ๋ชฉ์ ์„ ์œ„ํ•˜์—ฌ ์‚ฌ์šฉํ•˜๋Š” ๊ณ„์ • ๋ฐ ๊ถŒํ•œ์€ ์ตœ์†Œํ•œ์œผ๋กœ ๋ถ€์—ฌํ•˜๊ณ  ๋ณ„๋„๋กœ ์‹๋ณ„ํ•˜์—ฌ ํ†ต์ œํ•˜์—ฌ์•ผ ํ•œ๋‹ค."

๐Ÿ“Œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ ์ ์šฉ ํฌ์ธํŠธ

  • AWS Root ๊ณ„์ • Access Key ์‚ญ์ œ
  • Root ๊ณ„์ • MFA ํ•„์ˆ˜ (Hardware ๊ถŒ์žฅ)
  • AdministratorAccess๋Š” IAM Role๋กœ ๊ด€๋ฆฌ
  • ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ๋ณ„๋„ ๊ด€๋ฆฌ ๋ฐ ์ •๊ธฐ ๊ฒ€ํ† 
  • ์™ธ๋ถ€์ž ๊ณ„์ •์€ ๋งŒ๋ฃŒ์ผ ์ง€์ • ํ•„์ˆ˜

โš ๏ธ ๋ฏธ์ค€์ˆ˜ ์‹œ ์‹ฌ์‚ฌ ์˜ํ–ฅ

  • ๊ฒฐํ•จ: Root ๊ณ„์ • Access Key ์‚ฌ์šฉ
  • ๊ฒฐํ•จ: ํŠน์ˆ˜๊ถŒํ•œ์ž ๋ชฉ๋ก ๋ฏธ์ž‘์„ฑ
  • ๊ฒฐํ•จ: ์Šน์ธ ์ด๋ ฅ ์—†์ด ํŠน์ˆ˜ ๊ถŒํ•œ ๋ถ€์—ฌ
  • ๊ฒฐํ•จ: ์™ธ๋ถ€์ž ๊ณ„์ • ์ƒ์‹œ ํ™œ์„ฑํ™”
๐Ÿ“„ KISA ISMS-P ์ธ์ฆ๊ธฐ์ค€ ์•ˆ๋‚ด์„œ โ†— ๐Ÿ“– ISMS-P 2.5.5 ์ƒ์„ธ ์•ˆ๋‚ด โ†—
๐Ÿ“ฐ

์‹ค์ œ ๋ณด์•ˆ ์‚ฌ๊ณ  ์‚ฌ๋ก€

ํŠน์ˆ˜ ๊ถŒํ•œ ๊ด€๋ฆฌ ๋ฏธํก์œผ๋กœ ๋ฐœ์ƒํ•œ ํด๋ผ์šฐ๋“œ ์นจํ•ด ์‚ฌ๋ก€

2024

Root Access Key ํƒˆ์ทจ๋กœ ์ˆ˜๋งŒ ๋‹ฌ๋Ÿฌ ๋น„์šฉ

Root ๊ณ„์ •์˜ Access Key๋ฅผ ํƒˆ์ทจํ•˜์—ฌ ์ž์ฃผ ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š” Region์— ๊ณ ๋น„์šฉ EC2 ๋Œ€๋Ÿ‰ ์ƒ์„ฑ, ๋น„ํŠธ์ฝ”์ธ ์ฑ„๊ตด์— ์•…์šฉ. Root ๊ณ„์ •์€ ์–ด๋– ํ•œ ์ œํ•œ๋„ ์—†๋Š” Superuser ๊ถŒํ•œ.

๐Ÿ’ก ๊ตํ›ˆ: Root Access Key ์‚ญ์ œ ํ•„์ˆ˜, IAM User๋กœ ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ

์ถœ์ฒ˜: The Register โ†—
2024

๋…ธ์ถœ๋œ ์ž๊ฒฉ์ฆ๋ช…์œผ๋กœ 21๋ถ„ ๋‚ด ์นจํˆฌ

๊ณต๊ฒฉ์ž๊ฐ€ ํด๋ผ์šฐ๋“œ์—์„œ ๋…ธ์ถœ๋œ ์ž๊ฒฉ์ฆ๋ช…์„ ์ฐพ๋Š”๋ฐ 2๋ถ„, ์นจํˆฌ ๊ฐ€๋Šฅํ•œ ํด๋ผ์šฐ๋“œ๋ฅผ ์ฐพ์•„ ๊ณต๊ฒฉ ์‹œ์ž‘๊นŒ์ง€ 21๋ถ„. ์กฐ์ง์˜ 49%๊ฐ€ ๋ฏผ๊ฐํ•œ AWS ํ‚ค๋ฅผ VM ํŒŒ์ผ์‹œ์Šคํ…œ์— ์ €์žฅ.

๐Ÿ’ก ๊ตํ›ˆ: ํŠน์ˆ˜ ๊ถŒํ•œ ์ž๊ฒฉ์ฆ๋ช… ๋…ธ์ถœ ๋ฐฉ์ง€, Secrets Manager ์‚ฌ์šฉ

์ถœ์ฒ˜: ๋ฐ์ดํ„ฐ๋„ท โ†—
โšก

ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์˜ ์œ„ํ—˜

ํŠน์ˆ˜ ๊ถŒํ•œ ๊ด€๋ฆฌ๊ฐ€ ๋ฏธํกํ•œ ์ƒํ™ฉ

๋ฏธ๊ด€๋ฆฌ (์œ„ํ—˜)

Root

๐Ÿ‘‘

โ†’

Access Key

๐Ÿ”“

โ†’

์ „์ฒด ์žฅ์•…

๐Ÿ’ธ

Root Access Key ์กด์žฌ + ํŠน์ˆ˜ ๊ถŒํ•œ ๋ชฉ๋ก ์—†์Œ โ†’ ISMS-P 2.5.5 ๋ฏธ์ถฉ์กฑ

์ฒด๊ณ„์  ๊ด€๋ฆฌ (๊ถŒ์žฅ)

Root

๐Ÿ”’

โ†’

IAM Role

๐ŸŽญ

+

MFA

๐Ÿ“ฑ

Root ๋น„ํ™œ์„ฑํ™” + Role ๊ธฐ๋ฐ˜ ํŠน์ˆ˜ ๊ถŒํ•œ + ๋ชฉ๋ก ๊ด€๋ฆฌ โ†’ ์ธ์ฆ ๊ธฐ์ค€ ์ถฉ์กฑ

๐Ÿšจ

๋ฐœ๊ฒฌ ์‚ฌ๋ก€: Root ๊ณ„์ • Access Key ์กด์žฌ, AdministratorAccess ๊ด‘๋ฒ”์œ„ ๋ถ€์—ฌ

Root ๊ณ„์ •์— Access Key๊ฐ€ ์ƒ์„ฑ๋˜์–ด ์žˆ๊ณ , ๊ฐœ๋ฐœ์ž์—๊ฒŒ AdministratorAccess๊ฐ€ ์Šน์ธ ์ด๋ ฅ ์—†์ด ์ง์ ‘ ๋ถ€์—ฌ๋จ.

ํ˜„์žฌ ์ƒํƒœ - ๋ฌธ์ œ๊ฐ€ ๋˜๋Š” ์„ค์ •
# IAM ์‚ฌ์šฉ์ž์—๊ฒŒ AdministratorAccess ์ง์ ‘ ๋ถ€์—ฌ (์œ„ํ—˜)
resource "aws_iam_user" "developer" {
  name = "developer-user"
  # ํŠน์ˆ˜ ๊ถŒํ•œ ํƒœ๊ทธ ์—†์Œ
  # ์Šน์ธ ์ด๋ ฅ ์—†์Œ
}

resource "aws_iam_user_policy_attachment" "admin_access" {
  user       = aws_iam_user.developer.name
  policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
  # ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก์— ๋ฏธ๋“ฑ๋ก
}

# ์™ธ๋ถ€ ์œ ์ง€๋ณด์ˆ˜ ๊ณ„์ • - ์ƒ์‹œ ํ™œ์„ฑํ™” (์œ„ํ—˜)
resource "aws_iam_user" "vendor" {
  name = "external-vendor"
  # ๋งŒ๋ฃŒ์ผ ํƒœ๊ทธ ์—†์Œ
}

ISMS-P 2.5.5 ์œ„๋ฐ˜ ์‚ฌํ•ญ

โ—

Root ๊ณ„์ • Access Key ์กด์žฌ

โ—

ํŠน์ˆ˜ ๊ถŒํ•œ ์Šน์ธ ์ด๋ ฅ ๋ฏธ๊ด€๋ฆฌ

โ—

ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ๋ฏธ์ž‘์„ฑ

โ—

์™ธ๋ถ€์ž ๊ณ„์ • ์ƒ์‹œ ํ™œ์„ฑํ™”

๐Ÿ”

์‚ฌ์ „ ํƒ์ง€ ๋ฐฉ์•ˆ

IaC ์ฝ”๋“œ ๋ถ„์„ ๊ธฐ๋ฐ˜ ๋ฐฐํฌ ์ „ ์ ๊ฒ€

ํŠน์ˆ˜ ๊ถŒํ•œ ํƒ์ง€ ๋กœ์ง

ํŒ๋‹จ ์กฐ๊ฑด ์กฐ๊ฑด ๊ฐ’ ๊ฒฐ๊ณผ
๐Ÿ‘‘ AdministratorAccess ์ •์ฑ…
IAM User์— ์ง์ ‘ ๋ถ€์—ฌ Critical - ์ฐจ๋‹จ
IAM Role + MFA ์กฐ๊ฑด โ†’ ์Šน์ธ ํƒœ๊ทธ ๊ฒ€์‚ฌ
๐Ÿท๏ธ ํŠน์ˆ˜ ๊ถŒํ•œ ์Šน์ธ ํƒœ๊ทธ
ApprovalID ํƒœ๊ทธ ์—†์Œ High - ๊ฒฝ๊ณ 
์Šน์ธ ํƒœ๊ทธ ์กด์žฌ โœ“ ํ†ต๊ณผ
๐Ÿ”ง ์™ธ๋ถ€์ž ๊ณ„์ •
ExpirationDate ํƒœ๊ทธ ์—†์Œ High - ๊ฒฝ๊ณ 
๋งŒ๋ฃŒ์ผ ํƒœ๊ทธ ์กด์žฌ โœ“ ํ†ต๊ณผ
๐Ÿ””

์‚ฌํ›„ ๋Œ€์‘ ๋ฐฉ์•ˆ

๋Ÿฐํƒ€์ž„ ํŠน์ˆ˜ ๊ถŒํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง

ํŠน์ˆ˜ ๊ถŒํ•œ ๋Ÿฐํƒ€์ž„ ๋ชจ๋‹ˆํ„ฐ๋ง ๋กœ์ง

ํŒ๋‹จ ์กฐ๊ฑด ์กฐ๊ฑด ๊ฐ’ ๊ฒฐ๊ณผ
๐Ÿ‘‘ Root Account
Access Key ์กด์žฌ Critical - ์ฆ‰์‹œ ์‚ญ์ œ ์•Œ๋ฆผ
Console ๋กœ๊ทธ์ธ ๊ฐ์ง€ High - ์ฆ‰์‹œ ์•Œ๋ฆผ
๐Ÿ“‹ ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก
๋ฏธ๋“ฑ๋ก Admin ๊ถŒํ•œ ์‚ฌ์šฉ์ž Critical - ์กฐ์‚ฌ ํ•„์š”
๐Ÿ”ง ์™ธ๋ถ€์ž ๊ณ„์ •
๋งŒ๋ฃŒ์ผ ๊ฒฝ๊ณผ ํ›„ ํ™œ์„ฑํ™” High - ์ž๋™ ๋น„ํ™œ์„ฑํ™”
โœ“

์กฐ์น˜ ๊ฐ€์ด๋“œ

IAM Role ๊ธฐ๋ฐ˜ ํŠน์ˆ˜ ๊ถŒํ•œ ๊ด€๋ฆฌ

โŒ ๋ฌธ์ œ

Root Access Key ์กด์žฌ, User์— Admin ์ง์ ‘ ๋ถ€์—ฌ, ํŠน์ˆ˜ ๊ถŒํ•œ ๋ชฉ๋ก ์—†์Œ

โœ“ ์ ์šฉ

IAM Role + MFA ์กฐ๊ฑด + ์Šน์ธ ํƒœ๊ทธ

๊ถŒ์žฅ ์„ค์ • (๋ณต์‚ฌํ•˜์—ฌ ์ ์šฉ)
iam-privileged.tf
# ํŠน์ˆ˜ ๊ถŒํ•œ IAM Role - MFA ์กฐ๊ฑด ํ•„์ˆ˜
resource "aws_iam_role" "admin_role" {
  name = "AdminRole-Privileged"

  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [{
      Effect = "Allow"
      Principal = { AWS = "arn:aws:iam::123456789012:root" }
      Action = "sts:AssumeRole"
      Condition = {
        Bool = { "aws:MultiFactorAuthPresent" = "true" }
        NumericLessThan = { "aws:MultiFactorAuthAge" = "3600" }
      }
    }]
  })

  tags = {
    PrivilegedRole = "true"
    ApprovalID     = "PRIV-2024-0015"   # ์Šน์ธ ์ด๋ ฅ
    Owner          = "security-team@company.com"
    ISMS-P         = "2.5.5"
  }
}

# ์™ธ๋ถ€ ์œ ์ง€๋ณด์ˆ˜ ๊ณ„์ • - ๋งŒ๋ฃŒ์ผ ํƒœ๊ทธ ํ•„์ˆ˜
resource "aws_iam_user" "vendor" {
  name = "external-vendor"

  tags = {
    UserType       = "External"
    ExpirationDate = "2024-03-31"  # ๋งŒ๋ฃŒ์ผ ๋ช…์‹œ
    ApprovalID     = "EXT-2024-0023"
    ISMS-P         = "2.5.5"
  }
}

๐Ÿ’ก ํ•ต์‹ฌ: Root ๊ณ„์ •์€ Access Key๋ฅผ ์‚ญ์ œํ•˜๊ณ  MFA ํ•„์ˆ˜ ์ ์šฉํ•˜๋ฉฐ, ๋น„์ƒ ์‹œ์—๋งŒ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. AdministratorAccess ๋“ฑ ํŠน์ˆ˜ ๊ถŒํ•œ์€ IAM Role๋กœ ๊ด€๋ฆฌํ•˜๊ณ  MFA ์กฐ๊ฑด๊ณผ ์„ธ์…˜ ์‹œ๊ฐ„(1์‹œ๊ฐ„)์„ ์ œํ•œํ•ฉ๋‹ˆ๋‹ค. ๋ชจ๋“  ํŠน์ˆ˜ ๊ถŒํ•œ์— PrivilegedRole, ApprovalID ํƒœ๊ทธ๋กœ ๋ชฉ๋ก์„ ์ž๋™ ์ถ”์ถœํ•ฉ๋‹ˆ๋‹ค.

๐Ÿ“š ์ฐธ๊ณ  ์ž๋ฃŒ

๐Ÿ‘‘ AWS Root ๊ณ„์ • ๋ณด์•ˆ ๋ชจ๋ฒ”์‚ฌ๋ก€ โ†— ๐Ÿ›ก๏ธ AWS Organizations SCP โ†— ๐Ÿ”’ AWS ๊ณ„์ • ๋ณด์•ˆ ๋ชจ๋ฒ”์‚ฌ๋ก€ โ†—
๐Ÿ“Š

๋ฆฌํฌํŠธ ๋ฐฉ์•ˆ

ISMS-P ์‹ฌ์‚ฌ ์ฆ์  ๋ฐ ์ •๊ธฐ ๋ณด๊ณ 

๐Ÿ“‹ ์ง„๋‹จ ํ•ญ๋ชฉ

  • Root ๊ณ„์ • Access Key ์กด์žฌ ์—ฌ๋ถ€
  • AdministratorAccess ๋ถ€์—ฌ ํ˜„ํ™ฉ
  • ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ํ˜„ํ–‰ํ™” ์—ฌ๋ถ€
  • ์Šน์ธ ํƒœ๊ทธ ๋ถ€์ฐฉ ์—ฌ๋ถ€
  • ์™ธ๋ถ€์ž ๊ณ„์ • ๋งŒ๋ฃŒ์ผ ๊ด€๋ฆฌ ํ˜„ํ™ฉ

๐Ÿ“… ๋ฆฌํฌํŠธ ์ฃผ๊ธฐ

์‹ค์‹œ๊ฐ„

Root ๊ณ„์ • ๋กœ๊ทธ์ธ/Access Key ์•Œ๋ฆผ

์ฃผ๊ฐ„

ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ํ˜„ํ–‰ํ™” ๊ฒ€ํ† 

์›”๊ฐ„

ISMS-P ์ฆ์  (ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋Œ€์žฅ)

๐Ÿ“ค ๋ฐœ์†ก ๋ฐ ์ €์žฅ

๋ฐœ์†ก ์ฑ„๋„

Email Slack

์ €์žฅ์†Œ

S3 (5๋…„ ๋ณด๊ด€)
โšก

BSG ์ฐจ๋ณ„์ 

๊ธฐ์กด ๋„๊ตฌ๊ฐ€ ๋†“์น˜๋Š” ์ ๊ฒ€ ์˜์—ญ

๊ธฐ์กด ๋„๊ตฌ ๋ฐฉ์‹

AdministratorAccess ๋ถ€์—ฌ ์—ฌ๋ถ€๋งŒ ์ฒดํฌ

  • policy == AdministratorAccess
  • ์Šน์ธ ์ด๋ ฅ ๊ฒ€์ฆ ๋ถˆ๊ฐ€
  • ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ์ž๋™ ์ถ”์ถœ ๋ถˆ๊ฐ€

ํ•œ๊ณ„: ์™ธ๋ถ€์ž ๊ณ„์ • ๋งŒ๋ฃŒ ๊ด€๋ฆฌ ๋ฏธ์ง€์›, Root Access Key ์‚ญ์ œ ๊ถŒ๊ณ ๋งŒ ์ œ๊ณต

BSG ์ ‘๊ทผ ๋ฐฉ์‹

IaC ํƒœ๊ทธ ๋ถ„์„ + ๋Ÿฐํƒ€์ž„ ๋ชจ๋‹ˆํ„ฐ๋ง + ๋ชฉ๋ก ์ž๋™ํ™”

  • ๋ฐฐํฌ ์ „ ์Šน์ธ ํƒœ๊ทธ ๊ฒ€์ฆ
  • Root ๊ณ„์ • Access Key/๋กœ๊ทธ์ธ ์‹ค์‹œ๊ฐ„ ์•Œ๋ฆผ
  • ํŠน์ˆ˜ ๊ถŒํ•œ์ž ๋ชฉ๋ก ์ž๋™ ์ƒ์„ฑ ๋ฐ ํ˜„ํ–‰ํ™”

์ฐจ๋ณ„์ : ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ + ์™ธ๋ถ€์ž ๊ณ„์ • ๋งŒ๋ฃŒ ๊ด€๋ฆฌ + SCP ํ†ต์ œ

<- Cloud Security & Access Control๋กœ ๋Œ์•„๊ฐ€๊ธฐ