39

Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기

Embed Size (px)

Citation preview

Security Group

security

group

NACL NACL

VPC Flow Log VPC Flow Log

Security ISVSecurity ISV

* Source : Arbor Networks

• UDP (NTP) Amplification Flood• SYN Flood Attack [TCP]

Architecture for UDP Flood / SYN Flood

security group security group

1)

security

group security group

Private IP Address

attacker

transit

attacker

attacker

transitAWS

region

AWS

edge

AWS

edge

AWS

edgetransit

transit

Route 53

CloudFront

transit

Attacker

AWS

Region

AWS

edge

AWS

edge

AWS

edge

client

client

AWS

edge

AWS Support options

Enterprise Business Developer Basic

Customerservice24x7x365

Supportforums

Documentation,whitepapers,bestpracticeguides

AWSTrustedAdvisor FullChecks FullChecks BasicChecks BasicChecks

Accesstotechnicalsupport

Phone,chat,email,livescreensharing,TAM(24/7)

Phone,chat,email,livescreensharing(24/7)

Email(localbusinesshours) SupportforHealthChecks

Primarycasehandling Sr.CloudSupportEngineer CloudSupportEngineer CloudSupportAssociateTechnicalCustomerService

Associate

UserswhocancreateTechnicalSupportcasesUnlimited

(IAMsupported)Unlimited

(IAMsupported)1(accountcredentialsonly)

Responsetime <15minutes* <1hour* <12hours*

Architecturesupport Applicationarchitecture Usecaseguidance Buildingblocks

Bestpracticeguidance Client-sidediagnostictools

AWSSupportAPI

Third-partysoftwaresupport

Infrastructureeventmanagement

AvailableatAdditionalcost

AWSConcierge

DirectaccesstoTechnicalAccountManager(TAM)

Prioritizedcaserouting

Managementbusinessreviews

* Times are based on initial contact. Every reasonable effort will be made to respond within these targets.

© 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved