{"id":5995,"date":"2016-02-25T04:08:09","date_gmt":"2016-02-24T19:08:09","guid":{"rendered":"https:\/\/jirak.net\/wp\/aws-%eb%b3%b4%ec%95%88-%ea%b8%b0%ec%88%a0-%eb%b0%b1%ec%84%9c-%ed%95%9c%ea%b5%ad%ec%96%b4-%eb%b2%84%ec%a0%84-%eb%8c%80%ea%b1%b0-%ea%b3%b5%ea%b0%9c\/"},"modified":"2016-02-25T04:35:21","modified_gmt":"2016-02-24T19:35:21","slug":"aws-%eb%b3%b4%ec%95%88-%ea%b8%b0%ec%88%a0-%eb%b0%b1%ec%84%9c-%ed%95%9c%ea%b5%ad%ec%96%b4-%eb%b2%84%ec%a0%84-%eb%8c%80%ea%b1%b0-%ea%b3%b5%ea%b0%9c","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/aws-%eb%b3%b4%ec%95%88-%ea%b8%b0%ec%88%a0-%eb%b0%b1%ec%84%9c-%ed%95%9c%ea%b5%ad%ec%96%b4-%eb%b2%84%ec%a0%84-%eb%8c%80%ea%b1%b0-%ea%b3%b5%ea%b0%9c\/","title":{"rendered":"AWS  \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \ud55c\uad6d\uc5b4 \ubc84\uc804 \ub300\uac70 \uacf5\uac1c"},"content":{"rendered":"<p>AWS  \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \ud55c\uad6d\uc5b4 \ubc84\uc804 \ub300\uac70 \uacf5\uac1c<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/jirak.net\/wp\/wp-content\/uploads\/2016\/02\/aws_security_whitepapers.png\" width=\"598\" height=\"304\"><\/p>\n<p>\uc544\ub9c8\uc874 \uc6f9 \uc11c\ube44\uc2a4\uc5d0\uc11c\ub294 2016\ub144 1\uc6d4 <a href=\"http:\/\/www.awsseoul.kr\">\uc11c\uc6b8 \ub9ac\uc804 \uac1c\uc124<\/a> \uc774\ud6c4 \ud55c\uad6d \uace0\uac1d\ub4e4\uc758 \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uacfc \uad00\ub828\ud55c \ub2e4\uc591\ud55c \uc815\ubcf4\uc5d0 \ub300\ud55c \uc694\uad6c\uc640 \ud53c\ub4dc\ubc31\uc744 \ubc1b\uc544\uc654\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc774\ubbf8 \uae00\ub85c\ubc8c \ubb38\uc11c\ub85c \uc601\uc5b4\ub85c \uc81c\uacf5 \uc911\uc778 \ub2e4\uc591\ud55c <a href=\"https:\/\/aws.amazon.com\/ko\/whitepapers\">\uae30\uc220 \ubc31\uc11c<\/a> \uc911\uc5d0 \ud2b9\ubcc4\ud788 \ubcf4\uc548 \ubd84\uc57c \ubc31\uc11c\ub97c \uc5c4\uc120 \ud6c4 \ud55c\uad6d\uc5b4 \uc791\uc5c5\uc744 \uc9c4\ud589\ud558\uc5ec, \uc544\ub798\uc640 \uac19\uc774 \ub2e4\uc218\uc758 \uc2e0\uaddc \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c\ub97c \uacf5\uc720\ud560 \uc218 \uc788\uac8c \ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/awsblogskr.s3-ap-northeast-2.amazonaws.com\/aws_security_whitepapers.png\" alt=\"\" \/><\/p>\n<p>\uc544\ub798 \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c\ub97c \ud1b5\ud574 \uace0\uac1d\ub4e4\uc774 AWS \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uc5d0 \ub300\ud55c \uc774\ud574\ub3c4\ub97c \ub192\uc774\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uae30\ub97c \ubc14\ub78d\ub2c8\ub2e4. \uc8fc\ubcc0\uc758 \ub9ce\uc740 \ubd84\ub4e4\uc5d0\uac8c \uc54c\ub824\uc8fc\uc2dc\uba74 \uac10\uc0ac\ud558\uaca0\uc2b5\ub2c8\ub2e4. (\uc544\ub798 \ub9c1\ud06c\ub97c \ub204\ub974\uc2dc\uba74, PDF \ubc84\uc804\uc73c\ub85c \ub2e4\uc6b4\ub85c\ub4dc \uac00\ub2a5\ud569\ub2c8\ub2e4.)<\/p>\n<h3>\uc2e0\uaddc \ud55c\uad6d\uc5b4 \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c<\/h3>\n<ul>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/Compliance\/AWS_Security_at_Scale_Governance_in_AWS_Whitepaper.pdf\">\uaddc\ubaa8\ubcc4 \ubcf4\uc548: AWS \uae30\ubc18 \uac70\ubc84\ub10c\uc2a4<\/a> <\/strong><strong>\u2028<\/strong>\u2028\u2028\u2028<strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 AWS\ub85c \uc6cc\ud06c\ub85c\ub4dc\ub97c \ub9c8\uc774\uadf8\ub808\uc774\uc158\ud560 \ub54c \uc790\uc8fc \uac04\uacfc\ub418\ub294 \uc7a5\uc810\uc740 \uc81c\uacf5\ub418\ub294 \ub9ce\uc740 \uac70\ubc84\ub10c\uc2a4 \ud65c\uc131 \uae30\ub2a5\uc744 \ud65c\uc6a9\ud558\uc5ec \uaddc\ubaa8\uc5d0 \ub9de\ub294 \ub354\uc6b1 \ub192\uc740 \ubcf4\uc548 \uc218\uc900\uc744 \ub2ec\uc131\ud560 \uc218 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774 \ubb38\uc11c\uc5d0\uc11c\ub294 AWS\ub97c \uc0ac\uc6a9\ud558\uc5ec IT \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud574 \ub192\uc740 \uc218\uc900\uc758 \uac70\ubc84\ub10c\uc2a4\ub97c \ub2ec\uc131\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \uc124\uba85\ud569\ub2c8\ub2e4.<\/li>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/Compliance\/AWS_Security_at_Scale_Logging_in_AWS_Whitepaper.pdf\">\uaddc\ubaa8\ubcc4 \ubcf4\uc548: AWS\uc5d0\uc11c \ub85c\uae45\ud558\uae30<\/a> <\/strong><strong>\u2028<\/strong>\u2028\u2028\u2028<strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 \ub85c\uae45\uacfc \uad00\ub828\ub41c \uc77c\ubc18\uc801\uc778 \uaddc\uc815 \uc900\uc218 \uc694\uad6c \uc0ac\ud56d\uc758 \uac1c\uc694 \ubc0f AWS CloudTrail\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc774\ub7ec\ud55c \uc694\uad6c \uc0ac\ud56d\uc744 \ucda9\uc871\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \uc124\uba85\ud569\ub2c8\ub2e4. AWS CloudTrail\uc740 \ubcf4\uc548 \ubc0f \uc6b4\uc601 \uad00\uc810\uc5d0\uc11c \ub9e4\uc6b0 \uc720\uc6a9\ud55c \uc77c\ubc18 \ub85c\uae45 \ub3c4\uba54\uc778\uc73c\ub85c \uad6c\uc131\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/Compliance\/AWS_Securing_Data_at_Rest_with_Encryption.pdf\">Securing Data at Rest with Encryption(\uc800\uc7a5 \ub370\uc774\ud130 \uc554\ud638\ud654)<\/a><\/strong><strong>\u2028&nbsp;<\/strong><strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 &nbsp;AWS \uc11c\ube44\uc2a4\uc5d0\uc11c \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \uc554\ud638\ud654\ud560 \uc218 \uc788\ub294 \uc635\uc158\uc5d0 \ub300\ud574 \uac1c\uad04\uc801\uc73c\ub85c \uc124\uba85\ud558\uace0 \uc554\ud638\ud654 \ud0a4\uac00 \uc800\uc7a5\ub418\ub294 \uc704\uce58\uc640 \uc554\ud638\ud654 \ud0a4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uc81c\uc5b4 \ubc29\ubc95\uc758 \uad00\uc810\uc5d0\uc11c \uc774\ub7ec\ud55c \uc635\uc158\uc744 \uc124\uba85\ud569\ub2c8\ub2e4. \uc11c\ubc84 \uce21 \uc554\ud638\ud654 \ubc29\ubc95\uacfc \ud074\ub77c\uc774\uc5b8\ud2b8 \uce21 \uc554\ud638\ud654 \ubc29\ubc95\uc740 \ub2e4\uc591\ud55c AWS \uc11c\ube44\uc2a4\uc5d0\uc11c \uc774\ub7ec\ud55c \uc554\ud638\ud654\ub97c \uc218\ud589\ud558\ub294 \uac1c\ubcc4\uc801\uc778 \uc608\ub97c \ud1b5\ud574 \uc124\uba85\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<ul>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/Compliance\/AWS_Auditing_Security_Checklist.pdf\">AWS \uc0ac\uc6a9\uc744 \uc704\ud55c \uac10\uc0ac \ubcf4\uc548 \uccb4\ud06c\ub9ac\uc2a4\ud2b8<\/a><\/strong><strong>\u2028 <\/strong><strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 AWS \uace0\uac1d\uc758 \ub0b4\ubd80 \uaddc\uc815 \uc900\uc218 \ud300\uacfc \uc774\ub7ec\ud55c \ud300\uc758 \uc678\ubd80 \uac10\uc0ac\uc790 \uadf8\ub9ac\uace0 \ub0b4\ubd80 \uac80\ud1a0 \ub610\ub294 \uc678\ubd80 \uac10\uc0ac\ub97c \uc704\ud574 AWS \uc0ac\uc6a9\uc744 \ud3c9\uac00 \ub610\ub294 \uac10\uc0ac\ud558\ub294 \ub2f4\ub2f9\uc790\ub97c \ub300\uc0c1\uc73c\ub85c \uc791\uc131\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc0b0\uc5c5 \ub610\ub294 \uaddc\uc81c \ud45c\uc900\uc5d0\uc11c \uc694\uad6c\ud560 \uc218 \uc788\ub294, \uc870\uc9c1\uc758 AWS \uc0ac\uc6a9\uc5d0 \ub300\ud55c \ubcf4\uc548 \ud3c9\uac00\ub97c \uc124\uacc4\ud558\uace0 \uc2e4\ud589\ud558\ub294 \ub370 \uc720\uc6a9\ud55c \uccb4\ud06c\ub9ac\uc2a4\ud2b8\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc774 \ubc31\uc11c\ub294 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \uc6b4\uc601 \uc900\ube44 \uc0c1\ud0dc \ud3c9\uac00\uc5d0 \uc720\uc6a9\ud55c \uc6b4\uc601 \ubc0f \uc544\ud0a4\ud14d\ucc98 \uc9c0\uce68\uc744 \uc81c\uacf5\ud558\ub294 <a href=\"http:\/\/d0.awsstatic.com\/whitepapers\/aws-operational-checklists.pdf\">\uc6b4\uc601 \uccb4\ud06c\ub9ac\uc2a4\ud2b8 \ubc31\uc11c<\/a>\ub97c \ubc14\ud0d5\uc73c\ub85c \uc791\uc131\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<strong>\u2028<\/strong><\/li>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/Compliance\/Intro_to_Security_by_Design.pdf\">AWS Security by Design \uc18c\uac1c<\/a>&nbsp;&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 \uace0\uac1d\uc774 AWS \uacc4\uc815 \uc124\uacc4\ub97c \uc815\ud615\ud654\ud558\uace0, \ubcf4\uc548 \uc81c\uc5b4\ub97c \uc790\ub3d9\ud654\ud558\uace0, \uac10\uc0ac\ub97c \uac04\uc18c\ud654\ud558\ub3c4\ub85d \ud574\uc8fc\ub294 \ubcf4\uc548 \ubcf4\uc7a5 \uc811\uadfc\ubc95\uc785\ub2c8\ub2e4.&nbsp;\ubcf8 \ubc31\uc11c\uc5d0\uc11c\ub294 Security by Design\uc758 \uac1c\ub150\uc744 \uc124\uba85\ud558\uace0, \uc5ec\ub7ec \uc0b0\uc5c5\uacc4\uc5d0 \ub300\uaddc\ubaa8\uc758 \ubcf4\uc548 \ubc0f \uaddc\uc815 \uc900\uc218\ub97c \uc720\uc9c0\ud558\uae30 \uc704\ud55c 4\ub2e8\uacc4 \uc811\uadfc\ubc95\uc744 \uc18c\uac1c\ud558\uba70, AWS \uace0\uac1d\uc774 AWS \ud658\uacbd\uc5d0 \ubcf4\uc548\uc744 \uc801\uc6a9\ud558\ub294 \ub370 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uace0, \uc81c\uc5b4\uac00 \uc791\ub3d9 \uc911\uc778\uc9c0 \ud655\uc778\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \uc18c\uac1c\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p><strong>\uc774\uc678<\/strong><strong>, <\/strong><strong>\uae30\uc874\uc5d0<\/strong> <strong>\uc788\ub358<\/strong> <strong>\ubcf4\uc548<\/strong> <strong>\ubc0f<\/strong> <strong>\ucef4\ud50c\ub77c\uc774\uc5b8\uc2a4<\/strong> <strong>\uad00\ub828<\/strong> <strong>\ubc31\uc11c\uc758<\/strong> <strong>\ubaa9\ub85d\ub3c4<\/strong> <strong>\ucd94\uac00\ud569\ub2c8\ub2e4<\/strong><strong>.<\/strong><\/p>\n<h3>\uae30\uc874 \ud55c\uad6d\uc5b4 \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c<\/h3>\n<ul>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/AWS_Security_Best_Practices_11052013.pdf\">AWS Security Best Practices(AWS \ubcf4\uc548 \ubaa8\ubc94 \uc0ac\ub840)<\/a><\/strong><strong>\u2028<\/strong><strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 Information Security Management System(ISMS)\ub97c \uc815\uc758\ud558\uace0 \uc870\uc9c1\uc758 \ubcf4\uc548 \uc815\ucc45 \ubc0f \ud504\ub85c\uc138\uc2a4 \uc138\ud2b8\ub97c \uad6c\ucd95\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\ub294 \ubcf4\uc548 \ubaa8\ubc94 \uc0ac\ub840\ub97c \uc81c\uacf5\ud558\ubbc0\ub85c AWS \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc788\ub294 \ub370\uc774\ud130 \ubc0f \uc790\uc0b0\uc744 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c AWS\uc758 \uc790\uc0b0\uc744 \ud655\uc778, \ubd84\ub958 \ubc0f \ubcf4\ud638\ud558\uace0 \uacc4\uc815, \uc0ac\uc6a9\uc790 \ubc0f \uadf8\ub8f9\uc744 \uc0ac\uc6a9\ud55c AWS \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uad00\ub9ac \ubc0f \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ub370\uc774\ud130, \uc6b4\uc601 \uccb4\uc81c, \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \ubc0f \uc804\ubc18\uc801\uc778 \uc778\ud504\ub77c\ub97c \ubcf4\uc548 \uc870\uce58\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc744 \uc81c\uc2dc\ud558\ub294 \ub4f1 \ub2e4\uc591\ud55c \ubcf4\uc548 \uc8fc\uc81c\uc758 \uac1c\uc694\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/li>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/AWS_Risk_Compliance_Whitepaper_Aug_2015.pdf\">AWS Risk and Compliance(Amazon Web Services: \uc704\ud5d8 \ubc0f \uaddc\uc815 \uc900\uc218)<\/a><\/strong><strong>\u2028<\/strong>\u2028\u2028\u2028\u2028<strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 &nbsp;AWS \uace0\uac1d\uc774 IT \ud658\uacbd\uc744 \uc9c0\uc6d0\ud558\ub294 \uae30\uc874\uc758 \uc81c\uc5b4 \ud504\ub808\uc784\uc6cc\ud06c\uc5d0 AWS\ub97c \ud1b5\ud569\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420\ub9cc\ud55c \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\uae30 \uc704\ud574 \uc791\uc131\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \ubb38\uc11c\ub294 AWS \ucee8\ud2b8\ub864\uc744 \ud3c9\uac00\ud558\ub294 \uae30\ubcf8 \uc811\uadfc\ubc95\uc744 \ud3ec\ud568\ud558\uba70 \uace0\uac1d\uc774 \uc81c\uc5b4 \ud658\uacbd\uc744 \ud1b5\ud569\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc6d0\ud558\ub294 \uc815\ubcf4\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \ub610\ud55c \uc77c\ubc18\uc801\uc778 \ud074\ub77c\uc6b0\ub4dc \ucef4\ud4e8\ud305 \uaddc\uc815 \uc900\uc218 \ubb38\uc81c\uc5d0 \ub300\ud55c AWS \uad00\ub828 \uc815\ubcf4\ub97c \ub2e4\ub8f9\ub2c8\ub2e4.<\/li>\n<li><strong><a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/AWS_Security_Whitepaper_Overview.pdf\">Overview of Security Processes(Amazon Web Services: \ubcf4\uc548 \ud504\ub85c\uc138\uc2a4\uc758 \uac1c\uc694)<\/a><\/strong><strong>\u2028<\/strong><strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 &nbsp;\u201cAWS\uac00 \ub0b4 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\ub294 \ub370 \uc5b4\ub5a0\ud55c \ub3c4\uc6c0\uc744 \uc904 \uc218 \uc788\uc2b5\ub2c8\uae4c?\u201d\ub77c\ub294 \uc9c8\ubb38\uc5d0 \ub2f5\ud558\uae30 \uc704\ud574 \uc791\uc131\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ud2b9\ud788, AWS\uc758 \ubb3c\ub9ac\uc801 \ubcf4\uc548 \uc6b4\uc6a9 \ud504\ub85c\uc138\uc2a4\ub97c AWS \uad00\ub9ac \ud558\uc5d0 \uc788\ub294 \ub124\ud2b8\uc6cc\ud06c \ubc0f \uc778\ud504\ub77c\uc758 \uad00\uc810\uc5d0\uc11c \uc124\uba85\ud558\uace0 \uc11c\ube44\uc2a4\ubcc4 \ubcf4\uc548 \uad6c\ud604\uc5d0 \ub300\ud574\uc11c\ub3c4 \uc124\uba85\ud569\ub2c8\ub2e4.<\/li>\n<li><strong>&nbsp;<a href=\"http:\/\/d0.awsstatic.com\/International\/ko_KR\/whitepapers\/DDoS_Whitepaper.pdf\">DDoS \ub300\uc751\uc744 \uc704\ud55c AWS \ubaa8\ubc94\uc0ac\ub840<\/a><\/strong><strong>\u2028<\/strong><strong>&nbsp;<\/strong>\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 DDoS(Distributed Denial of Service) \uacf5\uaca9\uc5d0 \ub300\ube44\ud558\uc5ec Amazon Web Services(AWS)\uc5d0\uc11c \uc2e4\ud589\ud558\ub294 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ubcf5\uc6d0\ub825\uc744 \ub192\uc774\uace0\uc790 \ud558\ub294 \uace0\uac1d\uc744 \ub300\uc0c1\uc73c\ub85c \ud569\ub2c8\ub2e4. \ubcf8 \ubc31\uc11c\uc5d0\uc11c\ub294 DDoS(Distributed Denial of Service) \uacf5\uaca9\uc758 \uac1c\uc694, \uac00\uc6a9\uc131 \uc720\uc9c0\uc5d0 \ub3c4\uc6c0\uc774 \ub418\ub294 \uae30\uc220, \ucc38\uc870 \uc544\ud0a4\ud14d\ucc98\uc5d0 \ub300\ud55c \uc124\uba85\uc744 \ud1b5\ud574 \ubcf5\uc6d0\ub825 \ud5a5\uc0c1\uc744 \uc704\ud55c \uc544\ud0a4\ud14d\ucc98 \uc9c0\uce68\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/aws.amazon.com\/ko\/blogs\/korea\/aws-security-whitepapers\/\" target=\"_blank\">AWS  \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \ud55c\uad6d\uc5b4 \ubc84\uc804 \ub300\uac70 \uacf5\uac1c<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>AWS \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \ud55c\uad6d\uc5b4 \ubc84\uc804 \ub300\uac70 \uacf5\uac1c \uc544\ub9c8\uc874 \uc6f9 \uc11c\ube44\uc2a4\uc5d0\uc11c\ub294 2016\ub144 1\uc6d4 \uc11c\uc6b8 \ub9ac\uc804 \uac1c\uc124 \uc774\ud6c4 \ud55c\uad6d \uace0\uac1d\ub4e4\uc758 \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uacfc \uad00\ub828\ud55c \ub2e4\uc591\ud55c \uc815\ubcf4\uc5d0 \ub300\ud55c \uc694\uad6c\uc640 \ud53c\ub4dc\ubc31\uc744 \ubc1b\uc544\uc654\uc2b5\ub2c8\ub2e4. \uc774\ubbf8 \uae00\ub85c\ubc8c \ubb38\uc11c\ub85c \uc601\uc5b4\ub85c \uc81c\uacf5 \uc911\uc778 \ub2e4\uc591\ud55c \uae30\uc220 \ubc31\uc11c \uc911\uc5d0 \ud2b9\ubcc4\ud788 \ubcf4\uc548 \ubd84\uc57c \ubc31\uc11c\ub97c \uc5c4\uc120 \ud6c4 \ud55c\uad6d\uc5b4 \uc791\uc5c5\uc744 \uc9c4\ud589\ud558\uc5ec, \uc544\ub798\uc640 \uac19\uc774 \ub2e4\uc218\uc758 \uc2e0\uaddc \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c\ub97c \uacf5\uc720\ud560 \uc218 \uc788\uac8c \ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc544\ub798 \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c\ub97c \ud1b5\ud574 \uace0\uac1d\ub4e4\uc774 AWS \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uc5d0 \ub300\ud55c \uc774\ud574\ub3c4\ub97c \ub192\uc774\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uae30\ub97c \ubc14\ub78d\ub2c8\ub2e4. \uc8fc\ubcc0\uc758 \ub9ce\uc740 \ubd84\ub4e4\uc5d0\uac8c \uc54c\ub824\uc8fc\uc2dc\uba74 \uac10\uc0ac\ud558\uaca0\uc2b5\ub2c8\ub2e4. (\uc544\ub798 \ub9c1\ud06c\ub97c \ub204\ub974\uc2dc\uba74, PDF \ubc84\uc804\uc73c\ub85c \ub2e4\uc6b4\ub85c\ub4dc \uac00\ub2a5\ud569\ub2c8\ub2e4.) \uc2e0\uaddc \ud55c\uad6d\uc5b4 \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \uaddc\ubaa8\ubcc4 \ubcf4\uc548: AWS \uae30\ubc18 \uac70\ubc84\ub10c\uc2a4 \u2028\u2028\u2028\u2028&nbsp;\u2013 \ubcf8 \uae30\uc220 \ubc31\uc11c\ub294 AWS\ub85c \uc6cc\ud06c\ub85c\ub4dc\ub97c \ub9c8\uc774\uadf8\ub808\uc774\uc158\ud560 \ub54c \uc790\uc8fc \uac04\uacfc\ub418\ub294 \uc7a5\uc810\uc740 \uc81c\uacf5\ub418\ub294 \ub9ce\uc740 \uac70\ubc84\ub10c\uc2a4 \ud65c\uc131 \uae30\ub2a5\uc744 \ud65c\uc6a9\ud558\uc5ec \uaddc\ubaa8\uc5d0 \ub9de\ub294 \ub354\uc6b1 \ub192\uc740 \ubcf4\uc548 \uc218\uc900\uc744 \ub2ec\uc131\ud560 \uc218 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774 \ubb38\uc11c\uc5d0\uc11c\ub294 AWS\ub97c \uc0ac\uc6a9\ud558\uc5ec IT \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud574 \ub192\uc740 \uc218\uc900\uc758 \uac70\ubc84\ub10c\uc2a4\ub97c \ub2ec\uc131\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \uc124\uba85\ud569\ub2c8\ub2e4. \uaddc\ubaa8\ubcc4 <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/aws-%eb%b3%b4%ec%95%88-%ea%b8%b0%ec%88%a0-%eb%b0%b1%ec%84%9c-%ed%95%9c%ea%b5%ad%ec%96%b4-%eb%b2%84%ec%a0%84-%eb%8c%80%ea%b1%b0-%ea%b3%b5%ea%b0%9c\/\" title=\"AWS  \ubcf4\uc548 \uae30\uc220 \ubc31\uc11c \ud55c\uad6d\uc5b4 \ubc84\uc804 \ub300\uac70 \uacf5\uac1c\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":5996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[656],"class_list":["post-5995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-aws"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/5995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=5995"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/5995\/revisions"}],"predecessor-version":[{"id":5997,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/5995\/revisions\/5997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media\/5996"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=5995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=5995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=5995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}