๐Ÿ›ก๏ธ AWS์—์„œ CASB์™€ ์œ ์‚ฌํ•œ Threat Monitoring Lab ๊ตฌ์ถ• (์ดˆ๋ณด์ž ์นœํ™”)

๋ฐœํ–‰: (2025๋…„ 12์›” 18์ผ ์˜ค์ „ 04:59 GMT+9)
11 min read
์›๋ฌธ: Dev.to

Iโ€™m happy to translate the article for you, but I need the full text youโ€™d like translated. Could you please paste the content (or the portion you want translated) here? Iโ€™ll keep the source link at the top and preserve all formatting, code blocks, URLs, and technical terms as you requested.

๐Ÿ“Œ ํ”„๋กœ์ ํŠธ ์ˆœ์„œ

  • Partโ€ฏ1: AWS IAM ํ•˜๋“œ๋‹ โ€” ์ •์ฒด์„ฑ ๊ฒฝ๊ณ„ ๊ฐ•ํ™” ๋ฐ ์ธ์ฆ ์œ„์ƒ ๊ฐœ์„ 
  • Partโ€ฏ2: Security Hubโ€ฏ+โ€ฏAWS Config ๋ฅผ ํ™œ์šฉํ•œ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์ž์„ธ ๊ด€๋ฆฌ (CSPM)
  • Partโ€ฏ3: GuardDutyโ€ฏ+โ€ฏCloudTrail ๋กœ ๊ตฌํ˜„ํ•˜๋Š” CASBโ€‘์œ ์‚ฌ ๋ชจ๋‹ˆํ„ฐ๋ง โ€” ์‹ค์‹œ๊ฐ„ ํƒ์ง€, ์•ˆ์ „ํ•œ ์ด์ƒ ํ˜„์ƒ ์ƒ์„ฑ, ์œ„์ž„ ๊ด€๋ฆฌ์ž ํ–‰๋™, ๊ทธ๋ฆฌ๊ณ  AWS ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๊ฒฐ๊ณผ

๐Ÿ” ์™œ ์ด ์ง„ํ–‰์ด ์ค‘์š”ํ•œ๊ฐ€

ํ˜„๋Œ€ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํŒ€์€ ํ™˜๊ฒฝ์„ ์—ฌ๋Ÿฌ ๊ณ„์ธต์œผ๋กœ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค:

Identity first โ†’ Posture second โ†’ Threat detection next

Projectโ€ฏ3์€ behavioral visibility, anomaly detection, and eventโ€‘driven alerts๋ฅผ ์ถ”๊ฐ€ํ•ฉ๋‹ˆ๋‹คโ€”SOC ๋ถ„์„๊ฐ€, ํƒ์ง€ ์—”์ง€๋‹ˆ์–ด, ์œ„ํ˜‘ ํ—Œํ„ฐ ๋ฐ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€์—๊ฒŒ ํ•ต์‹ฌ ๊ธฐ๋ณธ ์š”์†Œ์ž…๋‹ˆ๋‹ค.
์ด ์‹ค์Šต์€ ๊ธฐ๋ณธ AWS ์„œ๋น„์Šค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๊ฒฝ๋Ÿ‰ Cloud Access Security Broker (CASB) ์›Œํฌํ”Œ๋กœ๋ฅผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•ฉ๋‹ˆ๋‹ค.

๋ชฉ์ฐจ

Source:

์†Œ๊ฐœ

ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๋ชจ๋‹ˆํ„ฐ๋ง์€ ๋ณต์žกํ•  ํ•„์š”๊ฐ€ ์—†์œผ๋ฉฐ, ํด๋ผ์šฐ๋“œ์—์„œ ์œ„ํ˜‘ ํƒ์ง€๊ฐ€ ์–ด๋–ป๊ฒŒ ์ž‘๋™ํ•˜๋Š”์ง€ ๋ฐฐ์šฐ๊ธฐ ์œ„ํ•ด ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ๊ธ‰ CASB ๋„๊ตฌ๊ฐ€ ํ•„์š”ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

์ด ์ดˆ๋ณด์ž ์นœํ™”์ ์ธ ์‹ค์Šต์—์„œ๋Š” AWS CloudTrailโ€ฏ+โ€ฏGuardDuty๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ CASB์™€ ์œ ์‚ฌํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ณด์—ฌ ์ฃผ๋ฉฐ, ๋ชจ๋“  ๊ณผ์ •์„ ๋ฌด๋ฃŒ ๋˜๋Š” ๋งค์šฐ ์ €๋น„์šฉ์œผ๋กœ ์œ ์ง€ํ•ฉ๋‹ˆ๋‹ค. ์•ˆ์ „ํ•œ ํ…Œ์ŠคํŠธ ํ™œ๋™์„ ์ƒ์„ฑํ•˜๊ณ , ํƒ์ง€๋ฅผ ํ™•์ธํ•˜๋ฉฐ, ์ด๋Ÿฌํ•œ ์„œ๋น„์Šค๊ฐ€ ๋ณด์•ˆ ํŒ€์ด AWS ํ™˜๊ฒฝ ๋‚ด ์œ„ํ—˜ํ•œ ํ–‰๋™์„ ์‹๋ณ„ํ•˜๋Š” ๋ฐ ์–ด๋–ป๊ฒŒ ๋„์›€์ด ๋˜๋Š”์ง€ ๋ฐฐ์šธ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ด ๊ฐ€์ด๋“œ์—๋Š” ์ดˆ๋ณด์ž๊ฐ€ ์˜ˆ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋ฌธ์ œ(์ˆ˜๋™ KMS ์•”ํ˜ธํ™”, ์œ„์ž„ ๊ด€๋ฆฌ์ž ์ œํ•œ ๋“ฑ)์— ๋Œ€ํ•œ ํŠธ๋Ÿฌ๋ธ”์ŠˆํŒ… ๋…ธํŠธ๋„ ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

๊ตฌ์ถ•ํ•  ๋‚ด์šฉ

  • CloudTrail์„ ์‚ฌ์šฉํ•˜์—ฌ AWS API ํ™œ๋™์„ ๊ธฐ๋กํ•ฉ๋‹ˆ๋‹ค
  • GuardDuty๊ฐ€ ํ•ด๋‹น ๋กœ๊ทธ๋ฅผ ๋ถ„์„ํ•˜์—ฌ ์œ„ํ˜‘์„ ํƒ์ง€ํ•ฉ๋‹ˆ๋‹ค
  • ์ƒ˜ํ”Œ ํƒ์ง€ ๊ฒฐ๊ณผ ๋ฐ ์•ˆ์ „ํ•œ ํ…Œ์ŠคํŠธ ์ด๋ฒคํŠธ์—์„œ ์–ป์€ ์‹ค์ œ ํƒ์ง€ ๊ฒฐ๊ณผ
  • ๊ฒฝ๋Ÿ‰ํ™”๋œ CASB์™€ ์œ ์‚ฌํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง ์›Œํฌํ”Œ๋กœ
  • ์ง€์†์ ์ธ ๋น„์šฉ์ด ์ „ํ˜€ ์—†๋Š” ๊น”๋”ํ•œ ํ™˜๊ฒฝ

์‚ฌ์ „ ์š”๊ตฌ ์‚ฌํ•ญ

  • AWS ๊ณ„์ • ํ•˜๋‚˜
  • ๊ด€๋ฆฌ์ž ์ˆ˜์ค€ ๊ถŒํ•œ์„ ๊ฐ€์ง„ IAM ์‚ฌ์šฉ์ž ๋˜๋Š” ์—ญํ• 
  • ์‹ค์Šต์„ ์œ„ํ•ด ์„ ํƒํ•œ ๋‹จ์ผ ๋ฆฌ์ „ (์ถ”์ฒœ: us-east-1)
  • (Optional) AWS CLI ์„ค์น˜

Source:

Stepโ€ฏ1โ€ฏโ€”โ€ฏSecure Settings ๋กœ CloudTrail ํ™œ์„ฑํ™”

CloudTrail์€ AWS ๊ณ„์ • ์ „๋ฐ˜์˜ API ํ™œ๋™์„ ๊ธฐ๋กํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ํƒ์ง€ ๋ฐ ์œ„ํ˜‘ ๋ชจ๋‹ˆํ„ฐ๋ง์˜ ํ•ต์‹ฌ์ด ๋ฉ๋‹ˆ๋‹ค.

โœ… CloudTrail Trail ์ƒ์„ฑ

  1. CloudTrail โ†’ Trails โ†’ Create trail ๋กœ ์ด๋™ํ•ฉ๋‹ˆ๋‹ค.

  2. Trail ์ด๋ฆ„์„ ์ •ํ™•ํžˆ ๋‹ค์Œ๊ณผ ๊ฐ™์ด ์ง€์ •ํ•ฉ๋‹ˆ๋‹ค:

    casb-guardduty-lab-trail
  3. ๋กœ๊ทธ ์ €์žฅ์„ ์œ„ํ•œ ์ƒˆ S3 ๋ฒ„ํ‚ท์„ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.

  4. ๋‹ค์Œ ์˜ต์…˜์„ ์ˆ˜๋™์œผ๋กœ ํ™œ์„ฑํ™”ํ•ฉ๋‹ˆ๋‹ค:

    • SSEโ€‘KMS ์•”ํ˜ธํ™” (AWS ๊ด€๋ฆฌํ˜• ํ‚ค ์‚ฌ์šฉ)
    • ๋กœ๊ทธ ํŒŒ์ผ ๊ฒ€์ฆ

ํŒ: ๋งŽ์€ ์ดˆ๋ณด์ž๋“ค์ด ์ด ์„ค์ •์„ ๋†“์นฉ๋‹ˆ๋‹คโ€”UI ๋ฒ„์ „์— ๋”ฐ๋ผ CloudTrail์ด ๊ธฐ๋ณธ์ ์œผ๋กœ SSEโ€‘KMS ๋˜๋Š” ๊ฒ€์ฆ์„ ํ™œ์„ฑํ™”ํ•˜์ง€ ์•Š์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ํ™œ์„ฑํ™”ํ•˜๋ฉด ๋กœ๊ทธ์— ๋ฌด๊ฒฐ์„ฑ ๋ฐ ๊ธฐ๋ฐ€์„ฑ ๋ณดํ˜ธ๊ฐ€ ์ถ”๊ฐ€๋ฉ๋‹ˆ๋‹ค.

CloudTrail settings screenshot

Stepโ€ฏ2โ€ฏโ€”โ€ฏGuardDuty ํ™œ์„ฑํ™” (์œ„ํ˜‘ ํƒ์ง€)

GuardDuty๋Š” CloudTrail ๋กœ๊ทธ, VPC Flow ๋กœ๊ทธ, DNS ๋กœ๊ทธ๋ฅผ ์ง€์†์ ์œผ๋กœ ๋ถ„์„ํ•˜์—ฌ ์˜์‹ฌ์Šค๋Ÿฌ์šด ๋˜๋Š” ์•…์˜์ ์ธ ํ™œ๋™์„ ํƒ์ง€ํ•ฉ๋‹ˆ๋‹ค.

โœ… GuardDuty ํ™œ์„ฑํ™”

  1. ์ฝ˜์†”์—์„œ GuardDuty๋ฅผ ์—ฝ๋‹ˆ๋‹ค.
  2. Enable GuardDuty๋ฅผ ํด๋ฆญํ•ฉ๋‹ˆ๋‹ค.
  3. GuardDuty๊ฐ€ Delegated Administrator๋ฅผ ์ƒ์„ฑํ•˜๋Š” ๊ฒฝ์šฐ, ๋‚˜์ค‘์— ์ •๋ฆฌํ•  ๋•Œ ์‚ฌ์šฉํ•  ๊ณ„์ • ID๋ฅผ ๊ธฐ๋กํ•ด ๋‘ก๋‹ˆ๋‹ค.

3๋‹จ๊ณ„ โ€” ์•ˆ์ „ํ•œ ํ…Œ์ŠคํŠธ ํ™œ๋™ ์ƒ์„ฑ

๐Ÿ”น ์˜ต์…˜โ€ฏA โ€“ AWS ์ƒ˜ํ”Œ ํŒŒ์ธ๋”ฉ ์ƒ์„ฑ

  1. GuardDuty์—์„œ Actions ๋ฉ”๋‰ด๋ฅผ ์—ฝ๋‹ˆ๋‹ค.
  2. Generate sample findings๋ฅผ ์„ ํƒํ•ฉ๋‹ˆ๋‹ค.

์ด๋Ÿฌํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ณต๊ฒฉ์„ ํ†ตํ•ด ์‚ฌ๊ณ  ๋Œ€์‘ ์ ˆ์ฐจ๋ฅผ ์—ฐ์Šตํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ƒ˜ํ”Œ ํŒŒ์ธ๋”ฉ ์ƒ์„ฑ ์Šคํฌ๋ฆฐ์ƒท

๐Ÿ”น ์˜ต์…˜โ€ฏB โ€“ ์‹ค์ œ ํ…Œ์ŠคํŠธ ์ด๋ฒคํŠธ ์ƒ์„ฑ

1. ์ฝ˜์†” ๋กœ๊ทธ์ธ ์ด๋ฒคํŠธ

  • AWS ์ฝ˜์†”์—์„œ ๋กœ๊ทธ์•„์›ƒํ•œ ๋’ค ๋‹ค์‹œ ๋กœ๊ทธ์ธํ•ฉ๋‹ˆ๋‹ค.
  • ํ…Œ์ŠคํŠธ์šฉ IAM ์‚ฌ์šฉ์ž๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ์˜๋„์ ์œผ๋กœ ๋กœ๊ทธ์ธ ์‹œ๋„๋ฅผ ์‹คํŒจ์‹œํ‚ต๋‹ˆ๋‹ค.

์ด๋Ÿฌํ•œ ์ด๋ฒคํŠธ๋Š” CloudTrail์— ConsoleLogin ์ด๋ฒคํŠธ๋กœ ๊ธฐ๋ก๋ฉ๋‹ˆ๋‹ค.

2. ๋น„์ •์ƒ์ ์ธ ์ง€์—ญ์—์„œ์˜ ํ™œ๋™

  • ๊ธฐ๋ณธ ์ง€์—ญ์—์„œ euโ€‘westโ€‘1 ๋˜๋Š” apโ€‘southeastโ€‘1์œผ๋กœ ์ „ํ™˜ํ•ฉ๋‹ˆ๋‹ค.
  • ์„œ๋น„์Šค์— ์ ‘๊ทผํ•˜๊ฑฐ๋‚˜ ๋ฆฌ์†Œ์Šค ์ƒ์„ฑ์„ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค(ํ”„๋กœ๋น„์ €๋‹ ์ „์— ์ทจ์†Œ).

CloudTrail์€ ํ•ด๋‹น ์ง€์—ญ ์ •๋ณด๋ฅผ ํฌํ•จํ•˜์—ฌ ์ด๋Ÿฌํ•œ ์ž‘์—…์„ ๊ธฐ๋กํ•ฉ๋‹ˆ๋‹ค.

3. ๊ฐ„๋‹จํ•œ CLI ํ˜ธ์ถœ (์„ ํƒ ์‚ฌํ•ญ)

aws ec2 describe-instances --region us-east-1

๋˜๋Š” ์ž„์‹œ IAM ์‚ฌ์šฉ์ž๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ๊ถŒํ•œ์ด ํ•„์š”ํ•œ API ํ˜ธ์ถœ์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค. GuardDuty๋Š” ํ•ด๋‹น ํ™œ๋™์„ ํ‘œ์‹œํ•ฉ๋‹ˆ๋‹ค(์˜ˆ: โ€œUnauthorizedAccess:RootLoginโ€).

๊ฒฝ๊ณ : ํ…Œ์ŠคํŠธ ์ž‘์—…์€ ๋น„ํ”„๋กœ๋•์…˜ ๊ณ„์ •์—์„œ๋งŒ ์‹คํ–‰ํ•˜์‹ญ์‹œ์˜ค. ์ดํ›„์— ์ƒ์„ฑํ•œ ๋ชจ๋“  ๋ฆฌ์†Œ์Šค๋ฅผ ์‚ญ์ œํ•˜์„ธ์š”.

Stepโ€ฏ4โ€ฏโ€”โ€ฏGuardDuty ๊ฒฐ๊ณผ ๊ฒ€ํ† 

  1. GuardDuty โ†’ Findings ๋กœ ์ด๋™ํ•ฉ๋‹ˆ๋‹ค.
  2. ์ƒ˜ํ”Œ ๊ฒฐ๊ณผ์™€ ํ…Œ์ŠคํŠธ ํ™œ๋™์œผ๋กœ ์ƒ์„ฑ๋œ ์‹ค์ œ ๊ฒฐ๊ณผ๊ฐ€ ๋ชจ๋‘ ํ‘œ์‹œ๋ฉ๋‹ˆ๋‹ค.

์˜ˆ์‹œ ๊ฒฐ๊ณผ

  • UnauthorizedAccess:IAMUser/ConsoleLogin โ€“ ์˜์‹ฌ์Šค๋Ÿฌ์šด ์ฝ˜์†” ๋กœ๊ทธ์ธ ์‹œ๋„.
  • Recon:EC2/PortProbe โ€“ EC2 ์ธ์Šคํ„ด์Šค์— ๋Œ€ํ•œ ํฌํŠธ ์Šค์บ” ํ™œ๋™.
  • AnomalousBehavior โ€“ ๋น„์ •์ƒ์ ์ธ ๋กœ๊ทธ์ธ ์œ„์น˜ ๋˜๋Š” ์ง€์—ญ.

๊ฐ ๊ฒฐ๊ณผ์—๋Š” ์‹ฌ๊ฐ๋„, ์˜ํ–ฅ์„ ๋ฐ›์€ ๋ฆฌ์†Œ์Šค, ๊ถŒ์žฅ ํ•ด๊ฒฐ ๋‹จ๊ณ„๊ฐ€ ํฌํ•จ๋ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์„ธ๋ถ€ ์ •๋ณด๋ฅผ ์‚ฌ์šฉํ•ด ๊ธฐ๋ณธ CloudTrail ์ด๋ฒคํŠธ์™€ ๋งคํ•‘ํ•˜์‹ญ์‹œ์˜คโ€”์ด๊ฒƒ์ด ์œ„ํ˜‘ ์กฐ์‚ฌ ์›Œํฌํ”Œ๋กœ์šฐ์˜ ํ•ต์‹ฌ์ž…๋‹ˆ๋‹ค.

GuardDuty Findings screenshot

5๋‹จ๊ณ„ โ€” ๋น„์šฉ ๋ฐฉ์ง€๋ฅผ ์œ„ํ•œ ์ •๋ฆฌ

1. ์œ„์ž„๋œ ๊ด€๋ฆฌ์ž ์ œ๊ฑฐ (์žˆ๋Š” ๊ฒฝ์šฐ)

  • GuardDuty โ†’ Settings โ†’ Accounts ๋ฅผ ์—ฝ๋‹ˆ๋‹ค.
  • Disable delegated administrator ๋ฅผ ํด๋ฆญํ•˜๊ณ  ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.

2. GuardDuty ๋น„ํ™œ์„ฑํ™”

  • GuardDuty โ†’ Settings โ†’ Disable GuardDuty (๋˜๋Š” ๊ฐ ๋ฆฌ์ „์—์„œ ๋น„ํ™œ์„ฑํ™”) ๋ฅผ ์„ ํƒํ•ฉ๋‹ˆ๋‹ค.

3. CloudTrail ํŠธ๋ ˆ์ผ ์‚ญ์ œ

  • CloudTrail โ†’ Trails โ†’ ํŠธ๋ ˆ์ผ์„ ์„ ํƒํ•˜๊ณ  โ†’ Delete ๋ฅผ ํด๋ฆญํ•ฉ๋‹ˆ๋‹ค.

4. S3 ๋ฒ„ํ‚ท ์‚ญ์ œ

  • ๋ฒ„ํ‚ท์„ ๋น„์šด ํ›„ ์‚ญ์ œํ•ฉ๋‹ˆ๋‹ค.

5. ํ…Œ์ŠคํŠธ ๋ฆฌ์†Œ์Šค ์ œ๊ฑฐ

  • ์˜ต์…˜โ€ฏB์—์„œ ๋งŒ๋“  IAM ์‚ฌ์šฉ์ž, ์—ญํ•  ๋ฐ ๊ธฐํƒ€ ๋ฆฌ์†Œ์Šค๋ฅผ ๋ชจ๋‘ ์‚ญ์ œํ•ฉ๋‹ˆ๋‹ค.

์ด๋Ÿฌํ•œ ๋‹จ๊ณ„๋ฅผ ์™„๋ฃŒํ•˜๋ฉด ๋‚จ์•„ ์žˆ๋Š” ๋น„์šฉ์ด ๋ฐœ์ƒํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

Final Thoughts

  • ์ด ์‹ค์Šต์€ CASBโ€‘์™€ ์œ ์‚ฌํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ธฐ๋Šฅ์„ ์ˆœ์ˆ˜ํ•˜๊ฒŒ AWS ๊ธฐ๋ณธ ์„œ๋น„์Šค๋งŒ์œผ๋กœ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ์Œ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค.
  • CloudTrail(๋ถˆ๋ณ€ ๋กœ๊ทธ ์†Œ์Šค)๊ณผ GuardDuty(๊ด€๋ฆฌํ˜• ์œ„ํ˜‘ ํƒ์ง€)์˜ ์กฐํ•ฉ์€ ๋ชจ๋“  ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํ”„๋กœ๊ทธ๋žจ์— ๊ฒฌ๊ณ ํ•œ ๊ธฐ๋ฐ˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
  • ์•ˆ์ „ํ•œ ํ…Œ์ŠคํŠธ ํ™œ๋™์„ ์ƒ์„ฑํ•จ์œผ๋กœ์จ, ํ”„๋กœ๋•์…˜ ์›Œํฌ๋กœ๋“œ์— ์œ„ํ—˜์„ ์ฃผ์ง€ ์•Š์œผ๋ฉด์„œ ํƒ์ง€โ€‘๋Œ€์‘ ์ „์ฒด ์ˆ˜๋ช… ์ฃผ๊ธฐ๋ฅผ ์ง์ ‘ ์ฒดํ—˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์‹ค์Šต์„ ์ž์œ ๋กญ๊ฒŒ ํ™•์žฅํ•ด ๋ณด์„ธ์š”โ€”VPC Flow Logs๋ฅผ ์ถ”๊ฐ€ํ•˜๊ฑฐ๋‚˜, ์ถ”๊ฐ€ GuardDuty ํƒ์ง€๊ธฐ๋ฅผ ํ™œ์„ฑํ™”ํ•˜๊ฑฐ๋‚˜, Security Hub์™€ ์—ฐ๋™ํ•ด ์ค‘์•™ ์ง‘์ค‘์‹ ์•Œ๋ฆผ์„ ๊ตฌํ˜„ํ•˜๋Š” ๋“ฑ. ์ฆ๊ฑฐ์šด ์‚ฌ๋ƒฅ ๋˜์„ธ์š”!

์—ฐ๊ฒฐ

์ด ๊ธ€์„ ์ฆ๊ธฐ์…จ๊ฑฐ๋‚˜ DevOps, Linux, ๋ณด์•ˆ, ํ˜น์€ ํด๋ผ์šฐ๋“œ ์ž๋™ํ™”๋ฅผ ๋ฐฐ์šฐ๊ณ  ๊ณ„์‹œ๋‹ค๋ฉด, ํ•จ๊ป˜ ์—ฐ๊ฒฐํ•˜๊ณ  ์•„์ด๋””์–ด๋ฅผ ๊ณต์œ ํ•˜๋ฉฐ ํ•จ๊ป˜ ๋ฐฐ์šฐ๊ณ  ์‹ถ์Šต๋‹ˆ๋‹ค.

๐Ÿ‘‰ LinkedIn

Back to Blog

๊ด€๋ จ ๊ธ€

๋” ๋ณด๊ธฐ ยป

์ดˆ๋ณด์ž๋ฅผ ์œ„ํ•œ AIOps ๊ฐ€์ด๋“œ: IT ํŒ€์ด ์•Œ์•„์•ผ ํ•  ๋‚ด์šฉ

ํ˜„๋Œ€ IT ํ™˜๊ฒฝ์€ ์‹œ๋„๋Ÿฝ๊ณ  ๋ณต์žกํ•˜๋ฉฐ ์–ธ์ œ๋‚˜ ๊ฐ€๋™ ์ค‘์ž…๋‹ˆ๋‹ค. Cloud platforms, microservices, containers, ๊ทธ๋ฆฌ๊ณ  hybrid systems๋Š” ์ธ๊ฐ„์ด ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ๋ณด๋‹ค ๋” ๋งŽ์€ ๋ฐ์ดํ„ฐ๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.

Regression testing workflow: ์œ„ํ—˜์ด ๋จผ์ € ๋ฆด๋ฆฌ์Šค๋ฅผ ์•ˆ์ •์ ์œผ๋กœ ์œ ์ง€ํ•˜๋Š”์ง€ ํ™•์ธ

TL;DR ์›Œํฌํ”Œ๋กœ์šฐ: ์œ„ํ—˜โ€‘์šฐ์„  ํšŒ๊ท€ ๋ฒ”์œ„ ์„ค์ • โ†’ ๊ณจ๋“ โ€‘ํŒจ์Šค ๊ธฐ์ค€์„  โ†’ ํƒ€๊นƒ ํ”„๋กœ๋ธŒ โ†’ ์ฆ๊ฑฐโ€‘๊ธฐ๋ฐ˜ ๊ฒฐ๊ณผ. ์˜ˆ์‹œ ์ƒํ™ฉ: Sworn์ด PC Game Pass์—โ€ฆ

2025๋…„ ์ตœ๊ณ ์˜ ๊ฐœ๋ฐœ์ž AI ๋„๊ตฌ โ€” ์‹ค์ œ ํ”„๋กœ์ ํŠธ์—์„œ ์‹ค์ œ๋กœ ํšจ๊ณผ๊ฐ€ ์žˆ์—ˆ๋˜ ๊ฒƒ

2025๋…„์€ AI ๋„๊ตฌ๊ฐ€ โ€œnice to haveโ€ ์ˆ˜์ค€์„ ๋„˜์–ด ๊ธฐ๋ณธ ๊ฐœ๋ฐœ์ž ์›Œํฌํ”Œ๋กœ์šฐ์˜ ์ผ๋ถ€๊ฐ€ ๋œ ํ•ด์˜€์Šต๋‹ˆ๋‹ค. ์™„๋ฒฝํ•ด์„œ๊ฐ€ ์•„๋‹ˆ๋ผ, ๋Œ€์ฒดํ•œ๋‹ค๋Š” ์ด์œ ๋งŒ์œผ๋กœ๊ฐ€ ์•„๋‹ˆ๋ผโ€ฆ