Banner

My Tech Blog (๋ณด์•ˆ)

์˜ค๋Š˜์˜ ๋ช…์–ธ
" ๋‚˜๋Š” ํ•ญ์ƒ ๋‚˜์˜ ์ตœ๊ณ ์˜ ๊ฑธ์ž‘์„ ํ–ฅํ•ด ๋‚˜์•„๊ฐ€๊ณ  ์žˆ๋‹ค. "
- ๋งˆ์ดํด ์•ค์ ค๋กœ (์ดํƒˆ๋ฆฌ์•„ ๋ฅด๋„ค์ƒ์Šค ์‹œ๋Œ€ ํ™”๊ฐ€, ์กฐ๊ฐ๊ฐ€)
์ž‘์„ฑ์ž๊ฐ€ ์ง์ ‘ ์ •๋ฆฌ / ํƒ€์ดํ•‘ํ–ˆ์–ด์š”๋ถˆํŽŒ ๊ธˆ์ง€ํ•ฉ๋‹ˆ๋‹ค  [์ •๋ณด๋ณด์•ˆ 3๋Œ€ ์š”์†Œ]๊ธฐ๋ฐ€์„ฑ: ์‹œ์Šคํ…œ ๋‚ด ์ •๋ณด ์ž์›์€ ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž์—๊ฒŒ๋งŒ ์ ‘๊ทผ ํ—ˆ์šฉ๋ฌด๊ฒฐ์„ฑ: ์˜ค์ง ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž๋งŒ์ด ์‹œ์Šคํ…œ ๋‚ด ์ •๋ณด ์ˆ˜์ • ๊ฐ€๋Šฅ๊ฐ€์šฉ์„ฑ: ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž๋Š” ๊ถŒํ•œ ๋ฒ”์œ„ ๋‚ด์—์„œ ์–ธ์ œ๋“  ์ž์› ์ ‘๊ทผ ๊ฐ€๋Šฅ**์ธ์ฆ : ์‚ฌ์šฉ์ž์˜ ์‹ ๋ถ„ ํ™•์ธ**๋ถ€์ธ๋ฐฉ์ง€ : ๋ถ€์ธํ•  ์ˆ˜ ์—†๋„๋ก ์†ก์ˆ˜์‹  ์ฆ๊ฑฐ ์ œ๊ณต  [AAA]์ธ์ฆ(Authentication): ์‚ฌ์šฉ์ž๊ฐ€ ๋„คํŠธ์›Œํฌ ์ ‘์† ์ „์— ์‹œ์Šคํ…œ์—์„œ ์‚ฌ์šฉ์ž์˜ ์‹ ์› ํ™•์ธ๊ถŒํ•œ๋ถ€์—ฌ(Authoorization): ๊ฒ€์ฆ๋œ ์‚ฌ์šฉ์ž์—๊ฒŒ ์‚ฌ์šฉ๊ฐ€๋Šฅํ•œ ์ ‘๊ทผ๊ถŒํ•œ ํ™•์ธ๊ณ„์ •๊ด€๋ฆฌ(Accounting): ์‚ฌ์šฉ์ž์˜ ์ž์› ์‚ฌ์šฉ์— ๋Œ€ํ•œ ์ •๋ณด ์ˆ˜์ง‘(๊ณผ๊ธˆ, ๊ฐ์‚ฌ, ๋ณด๊ณ ์„œ) [์–‘๋ฐฉํ–ฅ ์•”ํ˜ธํ™” ๋ฐฉ์‹] ๋Œ€์นญํ‚ค / ๋น„๋ฐ€ํ‚ค / ๊ฐœ์ธํ‚ค๋น„๋Œ€์นญํ‚ค / ๊ณต๊ฐœํ‚คํŠน์ง•๋™์ผํ•œ ํ‚ค๋กœ ๋ฐ์ดํ„ฐ๋ฅผ์•”ํ˜ธํ™”..
ยท AWS
1. What's Security Groupsโ–ถ Security Groups are the fundamental of network security.โ–ถ They control how traffic is allowed into or out of our EC2 Instances.โญ Security groups only contain allow rules - ํ—ˆ์šฉ๊ทœ์น™๋งŒ ํฌํ•จ๋˜๋ฏ€๋กœ ๋ฌด์—‡์ด ๋“ค์–ด๊ฐ€๊ณ  ๋‚˜๊ฐ€๋Š” ์ง€ ์•Œ ์ˆ˜ ์žˆ๋‹ค. โญ Security groups rules can reference by IP or by security group or other security groups - ๋ณด์•ˆ ๊ทธ๋ฃน์€ IP์ฃผ์†Œ๋ฅผ ๊ธฐ์ค€์œผ๋กœ ๊ทœ์น™์„ ์ƒ์„ฑํ•œ๋‹ค. - ๋˜๋Š” ๋‹ค๋ฅธ ๋ณด์•ˆ ๊ทธ๋ฃน์„ ์ฐธ์กฐํ•˜์—ฌ ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค. (๋ณด์•ˆ๊ทธ๋ฃน์€ ์„œ๋กœ ์ฐธ์กฐ..
์ƒ๋‹จ์œผ๋กœ