DOI QR코드

DOI QR Code

클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안

Configuration Method of AWS Security Architecture for Cloud Service

  • 투고 : 2021.05.23
  • 심사 : 2021.07.20
  • 발행 : 2021.07.28

초록

최근 클라우드 컴퓨팅의 다양한 특징과 장점들로 인하여 전 세계의 다양한 산업군에서 클라우드 서비스 도입 및 전환이 빠르게 확산하는 추세이다. 이러한 멀티클라우드 기반의 서비스가 확산함에 따라 보안 취약성 또한 증대되고 있어 클라우드 컴퓨팅 서비스에서의 데이터 유출 사고도 증가할 것으로 전망되고 있다. 이에 본 연구에서는 데이터 보안이 강화되면서도 클라우드 구축 비용을 절감할 수 있는 AWS Well-Architected 기반의 보안 아키텍처 구성방안을 제안한다. 제안하는 AWS 클라우드 보안 아키텍처는 개인정보 처리 시 요구되는 보안 항목을 충족하는 Standard 보안 참조모델 및 비용 효율화를 고려한 Shared Security 참조모델로 설계하였다. 본 연구에서 제안하는 AWS 보안 아키텍처는 안전하고 신뢰성 높은 AWS 클라우드 시스템을 구성하는 기업과 기관에 도움을 줄 수 있을 것으로 기대한다.

Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

키워드

참고문헌

  1. T. Wang et al. (2016). Fog-based storage technology to fight to fight with cyber threat. Future Generation Computer Systems, 83, 208-218. DOI : 10.1016/j.future.2017.12.036
  2. Multi-Cloud Blog. (2020). SaaS vs PaaS vs IaaS: What's the difference and how to choose. Accessed Time (Online). https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-what's-difference-and-how-to-choose
  3. ENSI-MARIA. (2017). IaaS, PaaS, SaaS - What do they mean?, Cloud on move (Online). http://cloudonmove.com/iaas-paas-saas-what-do-they-mean
  4. Cloud Security Alliance. (2016). Cloud Computing Top Threats in 2016. The Threacherous 12.
  5. J. H. Jeong. (2017). Current status and challenges of cloud computing, INARS issue report, 313, 17-21.
  6. S. H. Cho. (2018). A Study on Security Management Method for Hybrid Cloud Computing Environment. Master's Thesis, Graduate School of Dongguk University, Seoul.
  7. Cloud Security Alliance. (2019). Top Threats to Cloud Computing in 2019. The Egregious 9.
  8. C. J. Lee. (2017). A Study on Security Requirements for Privacy in a Home Cloud Environment. Master's Thesis. Graduate School of Soon Chun Hyang University, Asan.
  9. Y. G. Lee. (2019). A Study on Improvement of Cloud Security Assurance Program. Master's Thesis, Graduate Schoolof Dongguk University, Seoul.
  10. P. Mell & T. Grance. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce Version 15.