๐Ÿ›ก๏ธPenetration Testing ์„œ๋น„์Šค ๊ณ„์•ฝ (์ดˆ๋ณด์ž ์นœํ™” ๊ฐ€์ด๋“œ + ์˜คํ”ˆ ํ…œํ”Œ๋ฆฟ)

๋ฐœํ–‰: (2025๋…„ 12์›” 3์ผ ์˜ค์ „ 09:31 GMT+9)
6 min read
์›๋ฌธ: Dev.to

Source: Dev.to

Penetration testing์€ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ถ„์•ผ ์ค‘ ๊ฐ€์žฅ ํฅ๋ฏธ๋กœ์šด ์˜์—ญ ์ค‘ ํ•˜๋‚˜์ด์ง€๋งŒ, ํ…Œ์ŠคํŠธ๋ฅผ ์‹œ์ž‘ํ•˜๊ธฐ ์ „์— ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰์— ๋Œ€ํ•œ ๋ช…ํ™•ํ•œ ๊ถŒํ•œ, ๋ฌธ์„œํ™”๋œ ๋ฒ”์œ„, ๊ทธ๋ฆฌ๊ณ  ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰์ž์™€ ํด๋ผ์ด์–ธํŠธ๋ฅผ ๋ชจ๋‘ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋Š” ๋ช…ํ™•ํ•œ ๊ทœ์น™์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.

Penetration Testing Services Agreement๋ž€?

Penetration Testing Services Agreement(PTSA)๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋‚ด์šฉ์„ ๋‹ด์€ ๋ฒ•์  ๋ฌธ์„œ์ž…๋‹ˆ๋‹ค:

  • ํ…Œ์ŠคํŠธ์— ๋Œ€ํ•œ ๊ถŒํ•œ ์ •์˜
  • ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰์ž๋ฅผ ๋ฒ•์ ์œผ๋กœ ๋ณดํ˜ธ
  • ํด๋ผ์ด์–ธํŠธ๋ฅผ ์˜ˆ๊ธฐ์น˜ ์•Š์€ ์ค‘๋‹จ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ
  • ๋ฒ”์œ„์— ํฌํ•จ๋˜๋Š” ์‹œ์Šคํ…œ์„ ๋ฌธ์„œํ™”
  • ์ œ3์ž ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์˜๋„์น˜ ์•Š์€ ํ…Œ์ŠคํŠธ ๋ฐฉ์ง€
  • ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ(PHI, PII) ์ฒ˜๋ฆฌ ๋ฐฉ๋ฒ• ๊ทœ์ •
  • ํ…Œ์ŠคํŠธ ๊ฒฝ๊ณ„, ์œ„ํ—˜ ๋ฐ ๊ธฐ๋Œ€์น˜ ๋ช…ํ™•ํ™”

ํด๋ผ์šฐ๋“œ ๋ฐ ๊ทœ์ œ ํ™˜๊ฒฝ(์˜ˆ: ์˜๋ฃŒ, ์ •๋ถ€)์—์„œ๋Š” ์ด ๋ฌธ์„œ๊ฐ€ ํ•„์ˆ˜์ž…๋‹ˆ๋‹ค.

ํ•ต์‹ฌ ๊ฐœ๋…

Penetration Testing (Pentesting)

์œค๋ฆฌ์  ํ•ด์ปค๊ฐ€ ๊ณต๊ฒฉ์ž ํ–‰๋™์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ์ˆ˜ํ–‰ํ•˜๋Š” ํ†ต์ œ๋œ ๋ณด์•ˆ ํ‰๊ฐ€๋กœ, ๋‹ค์Œ์„ ๋ชฉํ‘œ๋กœ ํ•ฉ๋‹ˆ๋‹ค:

  • ์ทจ์•ฝ์  ์‹๋ณ„
  • ์‹ค์ œ ์œ„ํ—˜ ๊ฒ€์ฆ
  • ํด๋ผ์šฐ๋“œ ๋ฐ ์˜จํ”„๋ ˆ๋ฏธ์Šค ์‹œ์Šคํ…œ ํ…Œ์ŠคํŠธ
  • IAM ๋˜๋Š” ์ธ์ฆ ํ๋ฆ„ ํ‰๊ฐ€
  • ๊ตฌ์„ฑ์ƒ์˜ ์•ฝ์  ๊ฒ€์ฆ
  • ์ „๋ฐ˜์ ์ธ ๋ณด์•ˆ ํƒœ์„ธ ๊ฐ•ํ™”

๊ตฌ์กฐํ™”๋˜๊ณ , ๊ถŒํ•œ์ด ๋ถ€์—ฌ๋˜๋ฉฐ, ์ „๋ฌธ์ ์ธ ๋ฐฉ์‹์ด๋ฉฐ ๋ฌด์ž‘์œ„ ํ•ดํ‚น์ด ์•„๋‹™๋‹ˆ๋‹ค.

Rules of Engagement (ROE)

ROE๋Š” ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰ ๋ฐฉ์‹์„ ์ •์˜ํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ์‹œ:

  • ํ…Œ์ŠคํŠธ ํ—ˆ์šฉ ์‹œ๊ฐ„
  • ๊ธˆ์ง€๋œ ๋„๊ตฌ ๋˜๋Š” ๊ธฐ๋ฒ•
  • ํ”„๋กœ๋•์…˜ ํ…Œ์ŠคํŠธ ํ—ˆ์šฉ ์—ฌ๋ถ€
  • ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ์ ˆ์ฐจ
  • ์‹œ์Šคํ…œ์ด ๋ถˆ์•ˆ์ •ํ•ด์งˆ ๊ฒฝ์šฐ ์กฐ์น˜
  • ํ…Œ์ŠคํŠธ ์ค‘๋‹จ์„ ์œ„ํ•œ โ€œํ‚ฌ ์Šค์œ„์น˜โ€ ์‚ฌ์šฉ

ROE๋Š” ์–‘์ธก์ด ์˜คํ•ด๋‚˜ ์šฐ๋ฐœ์ ์ธ ์†์ƒ์„ ๋ฐฉ์ง€ํ•˜๋„๋ก ๋•์Šต๋‹ˆ๋‹ค.

Statement of Work (SOW)

SOW๋Š” ๊ฐ ํŽœํ…Œ์ŠคํŠธ ์ฐธ์—ฌ์˜ ์ •ํ™•ํ•œ ๋ฒ”์œ„๋ฅผ ์ƒ์„ธํžˆ ๊ธฐ์ˆ ํ•ฉ๋‹ˆ๋‹ค:

  • ๋Œ€์ƒ IP, ๋„๋ฉ”์ธ, API ์—”๋“œํฌ์ธํŠธ
  • AWS ๊ณ„์ • ID ๋ฐ ํด๋ผ์šฐ๋“œ ์ž์‚ฐ
  • IAM ํ๋ฆ„(OAuth2, OIDC, SAML)
  • ํ…Œ์ŠคํŠธ ์‹œ๊ฐ„ ๋ฐ ์œ ์ง€๋ณด์ˆ˜ ์ฐฝ
  • ํ•„์š” ํ…Œ์ŠคํŠธ ๊ณ„์ •
  • ๋ฐฑ์—… ํ™•์ธ
  • ์‚ฐ์ถœ๋ฌผ ๋ฐ ์ผ์ •

SOW๋Š” ๊ฐ ํ…Œ์ŠคํŠธ์˜ โ€œ์ฒญ์‚ฌ์ง„โ€์ด๋ฉฐ, ๋งˆ์Šคํ„ฐ ๊ณ„์•ฝ์€ ๊ทœ์น™์„ ์ •ํ•˜๊ณ  SOW๊ฐ€ ๊ตฌ์ฒด์ ์ธ ๋‚ด์šฉ์„ ์ถ”๊ฐ€ํ•ฉ๋‹ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ ๋ฐ IAM ๊ณ ๋ ค์‚ฌํ•ญ

ํ˜„๋Œ€ PTSA๋Š” ๋‹ค์Œ์„ ๋‹ค๋ฃจ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค:

  • AWS Shared Responsibility Model
  • IAM ๊ตฌ์„ฑ ์˜ค๋ฅ˜
  • OAuth2/OIDC ํ† ํฐ ํ๋ฆ„
  • SAML ์—ฐ๋™
  • API ์ธ์ฆ ๋ฐ ์„ธ์…˜ ๊ด€๋ฆฌ
  • ํด๋ผ์šฐ๋“œ ๋กœ๊ทธ(CloudTrail, GuardDuty)
  • ๋ฉ€ํ‹ฐํ…Œ๋„ŒํŠธ ๋ฐ SaaS ํ™˜๊ฒฝ
  • ์ œ3์ž ํ…Œ์ŠคํŠธ ์ œํ•œ

๋ช…์‹œ์ ์ธ ๋ฌธ์„œ๊ฐ€ ์—†์œผ๋ฉด ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰์ž๊ฐ€ ๋ฌด์‹ฌ์ฝ” ์œ„๋ฐ˜ํ•  ์ˆ˜ ์žˆ๋Š” ํ•ญ๋ชฉ:

  • AWS Acceptable Use ์ •์ฑ…
  • SaaS ์ œ๊ณต์ž ๊ณ„์•ฝ
  • HIPAA ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ์š”๊ตฌ์‚ฌํ•ญ
  • GDPR ๋ฐ์ดํ„ฐ ์ตœ์†Œํ™” ์š”๊ตฌ์‚ฌํ•ญ

ํ…œํ”Œ๋ฆฟ์—๋Š” ์ด๋Ÿฌํ•œ ์œ„ํ—˜์„ ์™„ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ์ „์šฉ ํด๋ผ์šฐ๋“œ ๋ฐ IAM ์„น์…˜์ด ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

์ด ํ…œํ”Œ๋ฆฟ์€ ๋ˆ„๊ตฌ๋ฅผ ์œ„ํ•œ ๊ฒƒ์ธ๊ฐ€?

  • ์œค๋ฆฌ์  ํ•ดํ‚น์„ ๋ฐฐ์šฐ๋Š” ํ•™์ƒ
  • ์‹ ๊ทœ ํŽœํ…Œ์Šคํ„ฐ
  • ์ฒซ ๊ณ„์•ฝ์„ ์ฒด๊ฒฐํ•˜๋ ค๋Š” ๋ณด์•ˆ ์ปจ์„คํ„ดํŠธ
  • ํด๋ผ์šฐ๋“œ/IAM ๋ณด์•ˆ ํ•™์Šต์ž
  • ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ถ€ํŠธ์บ ํ”„ ๋˜๋Š” ๊ต์œก ํ”„๋กœ๊ทธ๋žจ ์ˆ˜๊ฐ•์ž

์ด ํ…œํ”Œ๋ฆฟ์€ ๊ต์œก ๋ฐ ์‹ค์Šต ๋ชฉ์ ์— ํ•œํ•ด ๋ฌด๋ฃŒ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ฉด์ฑ… ์กฐํ•ญ

โš ๏ธ ์ค‘์š”: ์ด๋Š” ๋ฒ•๋ฅ  ์ž๋ฌธ์ด ์•„๋‹™๋‹ˆ๋‹ค. ์‹ค์ œ ์ปจ์„คํŒ… ๊ณ„์•ฝ์— ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ, ์ž๊ฒฉ์„ ๊ฐ–์ถ˜ ๋ณ€ํ˜ธ์‚ฌ์˜ ๊ฒ€ํ† ๋ฅผ ๋ฐ›์œผ์„ธ์š”.

Repository

์ „์ฒด ๋ฒ•๋ฅ  ์–‘์‹ ๊ณ„์•ฝ์„œ, SOW ํ…œํ”Œ๋ฆฟ ๋ฐ PDF ํŒŒ์ผ์€ GitHub ์ €์žฅ์†Œ์— ํ˜ธ์ŠคํŒ…๋ฉ๋‹ˆ๋‹ค:

๐Ÿ”— GitHub Repository: https://github.com/yourusername/ldwit-pen-testing-agreement

์ €์žฅ์†Œ์—๋Š” ๋‹ค์Œ์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค:

  • agreement/ โ€“ Pen Testing Agreement
  • sow/ โ€“ Statement of Work template
  • exports/ โ€“ PDF versions
  • README โ€“ Explanation of the documents

Agreement Highlights

  • Purpose & Scope
  • Definitions
  • Rules of Engagement
  • Customer Responsibilities
  • Provider Responsibilities
  • Compliance Considerations
  • Data Protection & Confidentiality
  • Deliverables
  • Limitations of Service
  • Liability & Indemnification
  • Signatures
  • Annex A โ€“ SOW Template

์ตœ์ข… ์ƒ๊ฐ

Penetration testing์€ ๋‹จ์ˆœํžˆ ๋„๊ตฌ๋งŒ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, ๋ชจ๋“  ๊ด€๊ณ„์ž์—๊ฒŒ ์ฑ…์ž„๊ฐ, ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜, ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•˜๋Š” ์ผ์ž…๋‹ˆ๋‹ค. ์ด ๊ณ„์•ฝ์„œ๋ฅผ ๋งŒ๋“ค๋ฉด์„œ ์ €๋Š” ParoCyber Ethical Hacking Program์„ ํ†ตํ•ด ํฌ๊ฒŒ ์„ฑ์žฅํ–ˆ์œผ๋ฉฐ, ์ด ํ…œํ”Œ๋ฆฟ์ด ๋‹ค๋ฅธ ์ดˆ๋ณด์ž๋“ค์ด ๊ตฌ์กฐ์ ์ด๊ณ  ์œค๋ฆฌ์ ์ธ ํŽœํ…Œ์ŠคํŠธ ์—ฌ์ •์„ ์‹œ์ž‘ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋˜๊ธธ ๋ฐ”๋ž๋‹ˆ๋‹ค.

์ €์žฅ์†Œ๋ฅผ ํฌํฌํ•˜๊ณ , ํ…œํ”Œ๋ฆฟ์„ ์ˆ˜์ •ํ•˜๋ฉฐ, ํฌํŠธํด๋ฆฌ์˜ค์— ํ™œ์šฉํ•ด ๋ณด์„ธ์š”. ์ด ํ…œํ”Œ๋ฆฟ์€ ๊ต์œก์šฉ์œผ๋กœ๋งŒ ์ œ๊ณต๋˜๋ฉฐ, ์‹ค์ œ ์šด์˜์— ์‚ฌ์šฉํ•˜๋ ค๋ฉด ๋ฐ˜๋“œ์‹œ ๋ฒ•๋ฅ  ์ž๋ฌธ์„ ๊ฑฐ์ณ์•ผ ํ•ฉ๋‹ˆ๋‹ค.

Back to Blog

๊ด€๋ จ ๊ธ€

๋” ๋ณด๊ธฐ ยป

SMS ํ”ผ์…”๋“ค์ด ํฌ์ธํŠธ, ์„ธ๊ธˆ, ๊ฐ€์งœ ์†Œ๋งค์—…์ฒด๋กœ ์ „ํ™˜

๋ฒˆ์—ญํ•  ํ…์ŠคํŠธ๋ฅผ ์ œ๊ณตํ•ด ์ฃผ์‹œ๊ฒ ์–ด์š”? ํ•ด๋‹น ๊ธฐ์‚ฌ๋‚˜ ๋Œ“๊ธ€์˜ ์š”์•ฝ์„ ์•Œ๋ ค์ฃผ์‹œ๋ฉด ํ•œ๊ตญ์–ด๋กœ ๋ฒˆ์—ญํ•ด ๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

SMS ํ”ผ์…”, ํฌ์ธํŠธยท์„ธ๊ธˆยท๊ฐ€์งœ ์†Œ๋งค์—…์ฒด๋กœ ์ „ํ™˜

์ค‘๊ตญ์— ๊ธฐ๋ฐ˜์„ ๋‘” phishing groups๊ฐ€ ์ž˜๋ชป ๋ฐฐ๋‹ฌ๋œ ์†Œํฌ๋‚˜ ๋ฏธ๋‚ฉ ํ†ตํ–‰๋ฃŒ๋ฅผ ๊ฐ€์žฅํ•œ ๋Š์ž„์—†๋Š” ์‚ฌ๊ธฐ SMS ๋ฉ”์‹œ์ง€๋กœ ๋น„๋‚œ๋ฐ›๊ณ  ์žˆ์œผ๋ฉฐ, ์‹œ์˜์ ์ ˆํ•˜๊ฒŒ ์ƒˆ๋กœ์šด offering์„ ํ™๋ณดํ•˜๊ณ  ์žˆ๋‹ค.