Application Security Leader

33
Application Delivery Leader Application Security Leader

Transcript of Application Security Leader

Page 1: Application Security Leader

Application Delivery Leader

Application Security Leader

Page 2: Application Security Leader

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

2. WEB ๋ณด์•ˆ์˜ ํ•„์š”์„ฑ

3. APPLICATION INSIGHT WAF ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Contents

Page 3: Application Security Leader

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

Page 4: Application Security Leader

APPLICATION INSIGHT WAF |

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

(์ฃผ)๋ชจ๋‹ˆํ„ฐ๋žฉ (MONITORAPP)

91๋ช… / 107์–ต (2020๋…„)

์„œ์šธ์‹œ ๊ตฌ๋กœ๊ตฌ ๋””์ง€ํ„ธ๋กœ 27๊ฐ€๊ธธ 27

2005๋…„ 2์›” 22์ผ

์†Œํ”„ํŠธ์›จ์–ด์ž๋ฌธ, ๊ฐœ๋ฐœ๋ฐ๊ณต๊ธ‰, ์ •๋ณด๋ณด์•ˆ์†”๋ฃจ์…˜

www.monitorapp.com

ํšŒ ์‚ฌ ๋ช…

์ธ์›/๋งค์ถœ์•ก

๋ณธ์  ์†Œ์žฌ์ง€

์„ค ๋ฆฝ ์ผ

์‚ฌ์—… ์ข…๋ชฉ

์„œ๋น„์ŠคURL

4

2005 02 ใˆœ๋ชจ๋‹ˆํ„ฐ๋žฉ ์„ค๋ฆฝ

2006

02

04

06

์›น๋ฐฉํ™”๋ฒฝ WISG (AIWAF์˜ ๊ตฌ๋ฒ„์ „) ์ถœ์‹œ

์ˆ˜์ถœ์œ ๋ง ์ค‘์†Œ๊ธฐ์—… ์„ ์ • (์ค‘์†Œ๊ธฐ์—…์ฒญ)

WISG ์ œํ’ˆ CC ๋ฐ GS ์ธ์ฆ ์ทจ๋“

2007

03

05

11

โ€˜ํ”„๋กœํŒŒ์ผ๋ง ๊ธฐ๋ฐ˜ ์›น ์„œ๋น„์Šค ๋ณด์•ˆ ์‹œ์Šคํ…œโ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

โ€˜์›๊ฒฉ ์›น ์„œ๋น„์Šค ๋ณด์•ˆ ์‹œ์Šคํ…œโ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

AIDFW, DB ๋ฐฉํ™”๋ฒฝ ์ถœ์‹œ

200805

06

โ€˜ํ”„๋กœํŒŒ์ผ๋ง ๊ธฐ๋ฐ˜ DB ๋ณด์•ˆ ์‹œ์Šคํ…œโ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

AIDFW, DB ๋ฐฉํ™”๋ฒฝ GS ์ธ์ฆ ์ทจ๋“

2009

02

04

05

AIVFW, VoIP ๋ฐฉํ™”๋ฒฝ ์ถœ์‹œ

AIWAF ๋ฐ AIDFW ์ œํ’ˆ CC ์ธ์ฆ ์ทจ๋“

โ€˜ํˆฌ๋ช… ํ”„๋ก์‹œ ์‹œ์Šคํ…œ ๋ฐ ํŒจํ‚ท ์ฒ˜๋ฆฌ ๋ฐฉ๋ฒ•โ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

201001

05

โ€˜์›น-DB ๊ฐ„ ๋กœ๊ทธ ๋ฐ์ดํƒ€ ์ƒ๊ด€๊ด€๊ณ„ ์ถ”์ ์— ์˜ํ•œ ํ†ตํ•ฉ ๋ณด์•ˆโ€™ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

AIVFW, VoIP ๋ฐฉํ™”๋ฒฝ CC ์ธ์ฆ ์ทจ๋“

2011 08 ํƒœ๊ตญ SI ์—…์ฒด BlueZebra ์™€ ์ดํŒ ๊ณ„์•ฝ

201201

04

ํด๋ผ์šฐ๋“œ ์šฉ ์›น๋ฐฉํ™”๋ฒฝ AIWAF-VE ์ถœ์‹œ

ํƒœ๊ตญ ๊ตญํšŒ์— AIDFW ๊ณต๊ธ‰

201302

09

๋ง๋ ˆ์ด์‹œ์•„์˜ ๋ณด์•ˆ ์ „๋ฌธ ์—…์ฒด TechLab Security ์™€ ์ดํŒ ๊ณ„์•ฝ

์œ ํ•ด ์‚ฌ์ดํŠธ ์ฐจ๋‹จ ์†”๋ฃจ์…˜ AISWG ์ถœ์‹œ

2014 02 ๊ตญ์ œ์›น๋ณด์•ˆํ‘œ์ค€๊ธฐ๊ตฌ OWASP ๊ธฐ์—…ํšŒ์› ๊ฐ€์ž…

2015

03

11

12

AIWAF-VE ์ œํ’ˆ์„ AWS(์•„๋งˆ์กด์›น์„œ๋น„์Šค) ๋งˆ์ผ“ํ”Œ๋ ˆ์ด์Šค์— ๊ฒŒ์‹œ

SSL ๊ฐ€์‹œ์„ฑ ์žฅ๋น„, AISVA ์ถœ์‹œ

AISWG ์ œํ’ˆ GS ์ธ์ฆ ์ทจ๋“

2016

08

09

10

11

์ผ๋ณธ ๋ฒ•์ธ ์„ค๋ฆฝ

๋ฒ ํŠธ๋‚จ์˜ ISP ์—…์ฒด Netnam ๊ณผ ์ดํŒ ๊ณ„์•ฝ

SECaaS ํ”Œ๋žซํผ AIONCLOUD ์ถœ์‹œ

์ธ๋„๋„ค์‹œ์•„์˜ NI ์—…์ฒด RML ๊ณผ ์ดํŒ ๊ณ„์•ฝ

2017

02

03

07

12

์ผ๋ณธ NI ์—…์ฒด Artiza Networks ์™€ AISVA ODM ๊ณ„์•ฝ ์ฒด๊ฒฐ

๋‚˜๋ผ์žฅํ„ฐ ์กฐ๋‹ฌ ์‹œ์Šคํ…œ SSL ๊ฐ€์‹œ์„ฑ ๋ถ„์•ผ์— AISVA ๋“ฑ๋ก

โ€˜๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹์„ ํ†ตํ•œ ์›น-DB ์‚ฌ์šฉ์ž ์ถ”์  ๋ฐฉ๋ฒ•โ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

AhnLab ๋ฐ ์•„ํ† ๋ฆฌ์„œ์น˜์™€ AIONCLOUD์— ๋Œ€ํ•œ White Label ํŒŒํŠธ๋„ˆ์‹ญ ์ฒด๊ฒฐ

2018

03

04

05

08

11

12

12

โ€˜๋ณดํ˜ธ ๋Œ€์ƒ ์„œ๋น„์Šค ์ž๋™ ์ธ์‹ ๋ฐฉ๋ฒ•โ€˜ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

AIONCLOUD์—์„œ WMS ์„œ๋น„์Šค ์ถœ์‹œ

AIONCLOUD๊ฐ€ NIPA์˜ ํด๋ผ์šฐ๋“œ ํ’ˆ์งˆ ๋ฐ ์„ฑ๋Šฅ ์ธ์ฆ ํš๋“

์›น๋ฐฉํ™”๋ฒฝ ์ œํ’ˆ AIWAF ์— ๋Œ€ํ•œ CC ์ธ์ฆ ํš๋“

๋ฉ”๊ฐ€์กด ํด๋ผ์šฐ๋“œ์™€ AIONCLOUD์— ๋Œ€ํ•œ ํŒŒํŠธ๋„ˆ์‹ญ ์ฒด๊ฒฐ

UAE ๋ฒค๋” ABS Mena์™€ AIWAF ์— ๋Œ€ํ•œ ํŒŒํŠธ๋„ˆ์‹ญ ์ฒด๊ฒฐ

์ผ๋ณธ ๋ฒค๋” Secure Innovation๊ณผ AIONCLOUD์— ๋Œ€ํ•œ White Label ํŒŒํŠธ๋„ˆ์‹ญ์ฒด๊ฒฐ

2019

04

06

07

๋ฏธ๊ตญ ๋ฒ•์ธ ์„ค๋ฆฝ

์ผ๋ณธ ๋ณด์•ˆ์—…์ฒด ์•ณ์‹œ๊ทธ๋„(@SIGNAL)๊ณผ SECaaS ๊ณต๋™์‚ฌ์—… ํ˜‘์•ฝ ์ฒด๊ฒฐ

โ€˜๋ณด์•ˆ์žฅ์น˜ ๊ฒฝ์œ  SSL ์ ‘์† ๋ถˆ๊ฐ€ ์‚ฌ์ดํŠธ ์ ‘์† ์ง€์› ๋ฐฉ๋ฒ• ๋ฐ ์‹œ์Šคํ…œโ€™ ํŠนํ—ˆ ๋“ฑ๋ก

2020

02

03

06

06

โ€˜๏ผต๏ผฒ๏ผฌ ์ฒ˜๋ฆฌ ์žฅ์น˜ ๋ฐ ๋ฐฉ๋ฒ•โ€™ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

โ€˜์„ธ์…˜ ๊ด€๋ฆฌ ๋ฐฉ๋ฒ• ๋ฐ ์ด๋ฅผ ์ด์šฉํ•œ ๋ณด์•ˆ์ค‘๊ณ„์žฅ์น˜โ€™ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

โ€˜๋‹ค์ค‘ ๋ฌธ์ž์—ด ํŒจํ„ด ํƒ์ƒ‰ ๋ฐฉ๋ฒ• ๋ฐ ์žฅ์น˜โ€™ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

โ€˜๋จธ์‹ ๋Ÿฌ๋‹์„ ์ด์šฉํ•œ ์›น ๊ธฐ๋ฐ˜ ๋ถ€์ • ๋กœ๊ทธ์ธ ์ฐจ๋‹จ ์žฅ์น˜ ๋ฐ ๋ฐฉ๋ฒ•โ€™ ๊ธฐ์ˆ  ํŠนํ—ˆ ๋“ฑ๋ก

Page 5: Application Security Leader

APPLICATION INSIGHT WAF |

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

Product Map

- ๋ชจ๋‹ˆํ„ฐ๋žฉ์€ ์‹ ์†ํ•˜๊ณ  ์•ˆ์ „ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ „์†ก์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด ๊ณ ์„ฑ๋Šฅ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํ”„๋ฝ์‹œ ๊ธฐ์ˆ ์„ ๊ธฐ๋ฐ˜์œผ๋กœ

๋‹ค์–‘ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐ€์†๊ธฐ์ˆ ๊ณผ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ๊ธฐ์ˆ ์„ ์—ฐ๊ตฌ ๊ฐœ๋ฐœํ•˜๋Š” ํ†ตํ•ฉ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ๊ธฐ์—…์ž…๋‹ˆ๋‹ค.

5

Page 6: Application Security Leader

APPLICATION INSIGHT WAF |

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

Reference

- ์ œ์•ˆ์‚ฌ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ฃผ์š” ๊ณ ๊ฐ์‚ฌ(450์—ฌ๊ณณ)์— ์œ ์ง€๋ณด์ˆ˜ ๊ธฐ์ˆ ์ง€์›์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. (์ด ๋‚ฉํ’ˆ 3,500๊ณ ๊ฐ์‚ฌ ์ด์ƒ)

Page 7: Application Security Leader

APPLICATION INSIGHT WAF |

1. ๋ชจ๋‹ˆํ„ฐ๋žฉ ์†Œ๊ฐœ

์ œ์กฐ์‚ฌ๋ช… ๋ชจ๋‹ˆํ„ฐ๋žฉ ํŽœํƒ€์‹œํ๋ฆฌํ‹ฐ ํŒŒ์ด์˜ค๋งํฌ ํŠธ๋ฆฌ๋‹ˆํ‹ฐ์†Œํ”„ํŠธํ•ฉ๊ณ„

์ œํ’ˆ๋ช… WIWAF Wapples WEBFRONT WEBS-RAY

2020๋…„ 1์›” 258.0 94.6 71.8 0.0 424.4

2020๋…„ 2์›” 160.0 213.6 105.9 0.0 479.6

2020๋…„ 3์›” 397.7 346.4 154.2 0.0 898.3

2020๋…„ 4์›” 49.0 259.4 49.5 0.0 357.9

2020๋…„ 5์›” 119.0 378.4 201.5 0.0 698.9

2020๋…„ 6์›” 238.2 178.5 231.9 0.0 648.6

2020๋…„ 7์›” 132.0 248.7 0.0 0.0 380.7

2020๋…„ 8์›” 147.4 43.9 267.7 0.0 459.0

2020๋…„ 9์›” 424.5 292.7 132.1 0.0 849.3

2020๋…„ 10์›” 407.7 328.6 143.6 33.0 912.7

2020๋…„ 11์›” 544.7 332.0 63.4 0.0 940.1

2020๋…„ 12์›” 245.0 346.3 165.2 0.0 756.5

2020๋…„๋ˆ„์  3,123.1 3,063.1 1,586.7 33.0 7,805.9

์ ์œ ์œจ(%) 40% 39% 20% 0.4% 100%

[๋‹จ์œ„ : ๋ฐฑ๋งŒ์›]

40%

39%

20%

๋ชจ๋‹ˆํ„ฐ๋žฉ

ํŽœํƒ€์‹œํ๋ฆฌํ‹ฐ

ํŒŒ์ด์˜ค๋งํฌ

0% 10% 20% 30% 40% 50%

2020๋…„์›น๋ฐฉํ™”๋ฒฝ์กฐ๋‹ฌ์‹œ์žฅ(๋ˆ„์ )

ํŠธ๋ฆฌ๋‹ˆํ‹ฐ์†Œํ”„ํŠธ 0.4%

20๋…„์กฐ๋‹ฌ์‹œ์žฅ๋งค์ถœํ˜„ํ™ฉ

Page 8: Application Security Leader

2. WEB ๋ณด์•ˆ์˜ ํ•„์š”์„ฑ

Page 9: Application Security Leader

APPLICATION INSIGHT WAF | 9

2. WEB ๋ณด์•ˆ์˜ ํ•„์š”์„ฑ

โ€ข ๋Œ€๋‹ค์ˆ˜์˜ ์›น ์„œ๋น„์Šค ์‚ฌ์šฉ์„ ์œ„ํ•ด ๊ธฐ๋ณธ์ ์ธ ๊ฐœ์ธ์ •๋ณด

์š”์ฒญ์ด ๋นˆ๋ฒˆํžˆ ๋ฐœ์ƒ

โ€ข ๋ฐ์ดํ„ฐ ๋ฐ ๊ฐœ์ธ์ •๋ณด ํƒˆ์ทจ๋ฅผ ๋ชฉ์ ์œผ๋กœ ํ•œ ๊ณต๊ฒฉ ์ฆ๊ฐ€

โ€ข ์‚ฌ๊ณ ๋ฐœ์ƒ ์‹œ ์‹ฌ๊ฐํ•œ ๊ธฐ์—… ์ด๋ฏธ์ง€ ์ €ํ•˜ ๋ฐ ๊ฒฝ์ œ์ 

์†์‹ค ์ดˆ๋ž˜

โ€ข ์Šค๋งˆํŠธ ๊ธฐ๊ธฐ์˜ ๋ฐœ๋‹ฌ๋กœ ์–ธ์ œ ์–ด๋””์„œ๋“  ์ธํ„ฐ๋„ท ์ ‘์†์ด

๊ฐ€๋Šฅ ํ•˜์—ฌ ๊ฐœ์ธ ๋˜๋Š” ํšŒ์‚ฌ ์—…๋ฌด์˜ ์—ฐ์†์„ฑ ์ฆ๊ฐ€

โ€ข ์ ‘๊ทผ์„ฑ๊ณผ ์‚ฌ์šฉ ํŽธ์˜์„ฑ์œผ๋กœ ์ฃผ์š” ๋ฐ์ดํ„ฐ ๋ฐ ์ •๋ณด๊ฐ€

์›น์œผ๋กœ ์ง‘์ค‘

โ€ข ์„œ๋น„์Šค,๊ธˆ์œต, ์‡ผํ•‘, ์˜๋ฃŒ ๋“ฑ ๋‹ค์–‘ํ•œ ์›น ์„œ๋น„์Šค์˜ ์ฆ๊ฐ€

โ€ข IT Compliance ์š”๊ตฌ ์ฆ๋Œ€

โ€ข ISMS ์ธ์ฆ ๋Œ€์ƒ ํ™•๋Œ€

โ€ข ๊ฐœ์ธ์ •๋ณด ๋ณดํ˜ธ๋ฒ• ๋ฐœํšจ๋กœ ์ฒ˜๋ฒŒ ๊ธฐ์ค€ ๋ฐ ์ฑ…์ž„์†Œ์žฌ ๊ฐ•ํ™”

IT Compliance & ๋ฒ•๋ฅ  ๊ฐ•ํ™”

โ€ข ์›น ์„œ๋น„์Šค๋ฅผ ์œ„ํ•œ ํฌํŠธ๋Š” ๋ฐ˜๋“œ์‹œ ์˜คํ”ˆ ๋˜์–ด ์žˆ์Œ

โ€ข IPS๋Š” SSL ํ†ต์‹ ์— ๋Œ€ํ•œ ๋ฐฉ์–ด๋Šฅ๋ ฅ์ด ๋ฏธํก(์‹œ์Šคํ…œ ๋ถ€ํ•˜

๊ธ‰์ฆ)ํ•˜๋ฉฐ ์„ธ๋ถ€์ ์ธ ์ •์ฑ… ์„ค์ •์„ ์ œ๊ณตํ•˜์ง€ ์•Š์Œ

โ€ข ์›น์— ๋Œ€ํ•œ ๊ฐ•๋ ฅํ•˜๊ณ  ์ „๋ฌธ์ ์ธ ์†”๋ฃจ์…˜์ด ํ•„์š”

๊ธฐ์กด ๋ณด์•ˆ ์†”๋ฃจ์…˜์˜ ํ•œ๊ณ„์ 

IT ๋ฐ์ฃผ์š”ํ™˜๊ฒฝ์˜๋ณ€ํ™”

IT ํ™˜๊ฒฝ์˜ ๋ณ€ํ™” ์ค‘์š” ์ž์‚ฐ์œผ๋กœ์„œ ์ •๋ณด์˜ ๊ฐ€์น˜ ์ƒ์Šน

Page 10: Application Security Leader

APPLICATION INSIGHT WAF | 10

๊ธฐ์กด๋ณด์•ˆ์‹œ์Šคํ…œ์˜ํ•œ๊ณ„

๊ตฌ๋ถ„ ๋ฐฉํ™”๋ฒฝ IPS ์›น ๋ฐฉํ™”๋ฒฝ

๋‚ด์šฉ

โ€ข ๋„คํŠธ์›Œํฌ ์ธํ”„๋ผ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๋ฐ

์ž„๋ฌด์˜ ์ดˆ์ 

โ€ข 80, 443 ํฌํŠธ๋Š” ์ •์ƒ์ ์ธ ํ†ต์‹ ์œผ๋กœ

๊ฐ„์ฃผ

โ€ข ์›น ํ”„๋กœํ† ์ฝœ(HTTP, HTTPS)์— ๋Œ€ํ•œ

์ œ์–ด ๋ถˆ๊ฐ€๋Šฅ

โ€ข L3 โ€“ L7 Layer ์ „๋ฐ˜์— ๊ฑธ์นœ ๋ณด์•ˆ

๊ธฐ๋Šฅ ์ œ๊ณต

โ€ข SSL ํ†ต์‹ ์— ๋Œ€ํ•œ ๋ฐฉ์–ด ๋Šฅ๋ ฅ ๋ฏธํก

โ€ข ์‹œ๊ทธ๋‹ˆ์ฒ˜ ๋ฐฉ์‹์— ์˜์กด ํ•˜๋ฏ€๋กœ,

์šฐํšŒ ์ทจ์•ฝ๊ตฌ๊ฐ„ ๋‹ค์ˆ˜ ๋ฐœ์ƒ

โ€ข ์„ธ๋ถ€ ์ •์ฑ… ๊ตฌํ˜„ ๋ฏธ ์ œ๊ณต

โ€ข HTTP, HTTPS์— ๋Œ€ํ•œ ๊ฐ•๋ ฅํ•˜๊ณ 

์ „๋ฌธ์ ์ธ ๋ณด์•ˆ ๊ฐ€๋Šฅ

โ€ข Positive Security Model

๊ตฌํ˜„์œผ๋กœ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ๊ณต๊ฒฉ์—

๋Œ€ํ•ด ์›์ฒœ์ ์œผ๋กœ ์ฐจ๋‹จ ๊ฐ€๋Šฅ

โ–  ๋ฐฉํ™”๋ฒฝ ๋ฐ IPS์™€ ์›น ๋ฐฉํ™”๋ฒฝ์˜ ๊ธฐ๋Šฅ ๋น„๊ต

2. WEB ๋ณด์•ˆ์˜ ํ•„์š”์„ฑ

Page 11: Application Security Leader

APPLICATION INSIGHT WAF | 11

2. WEB ๋ณด์•ˆ์˜ ํ•„์š”์„ฑ

ํ•ต์‹ฌํฌ์ธํŠธ

์›น ์„œ๋ฒ„๋Š” ํŠน์„ฑ์ƒ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•ด ํ•ญ์ƒ ์™ธ๋ถ€์— ๋…ธ์ถœ๋˜์–ด ์šด์˜

์œ„์™€ ๊ฐ™์€ ์ด์œ ๋กœ, ์ „์ฒด ํ•ดํ‚น ์‚ฌ๊ณ ์˜ ์•ฝ 80%๋Š” ์›น ์„œ๋ฒ„๋ฅผ ํƒ€์ผ“์œผ๋กœ ํ•˜์—ฌ ๋ฐœ์ƒํ•˜๋ฉฐ ์ ์ง„์  ํ™•๋Œ€

์›น์‚ฌ์ดํŠธ ์ฝ”๋“œ ๋‚ด์— ํฌํ•จ๋˜์–ด ์žˆ๋Š” ์ทจ์•ฝ์ ๋“ค์ด ๋ฌธ์ œ์ด๋ฉฐ, ์ด๋Ÿฐ ์ทจ์•ฝ์ ๋“ค ์ค‘ ์ ˆ๋ฐ˜์„ ํ•ด๊ฒฐ ํ•˜๋Š”๋ฐ ํ‰๊ท  100์ผ ์†Œ์š”

ํ•ด์ปค๋“ค์€ ๋งค๋…„ ํ–ฅ์ƒ๋œ ์‹ค๋ ฅ์œผ๋กœ ์›น ์‚ฌ์ดํŠธ์˜ ์ทจ์•ฝ์ ์„ ์ฐพ์•„๋‚ด์–ด ๊ณต๊ฒฉํ•˜๊ณ  ์žˆ์–ด ํ•ด๊ฒฐ๋˜์ง€ ์•Š์€ ์›น ์ทจ์•ฝ์ ์€ ์†Œ๋‹ˆ,

AT&T ๋“ฑ์˜ ๋Œ€๋Ÿ‰ ์ •๋ณด์œ ์ถœ ์‚ฌ๊ณ ์™€ ๊ฐ™์€ ๊ฒฐ๊ณผ๋ฅผ ์ดˆ๋ž˜

Page 12: Application Security Leader

3. APPLICATION INSIGHT WAF์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

Page 13: Application Security Leader

APPLICATION INSIGHT WAF | 13

โ€ข Slot์— NIC ๋ชจ๋“ˆ์„ ์„ ํƒ/์กฐํ•ฉํ•˜์—ฌ ์žฅ์ฐฉํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, SSL ๊ฐ€์†์นด๋“œ๋ฅผ ์˜ต์…˜์œผ๋กœ ์žฅ์ฐฉ ๊ฐ€๋Šฅ ํ•ฉ๋‹ˆ๋‹ค.

โ€ข ๋ณธ ์ œํ’ˆ์˜ ์‚ฌ์–‘์€ ์„ฑ๋Šฅํ–ฅ์ƒ์„ ์œ„ํ•˜์—ฌ ์˜ˆ๊ณ  ์—†์ด ๋ณ€๊ฒฝ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

โ€ข ์„ฑ๋Šฅ ์ˆ˜์น˜๋Š” ๊ณ„์ธก๊ธฐ ํ”„๋กœํŒŒ์ผ ๋ฐ ํ™˜๊ฒฝ์— ๋”ฐ๋ผ ์ฐจ๋“ฑ์  ์ผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ„์ธก ํ™˜๊ฒฝ์€ APPLIANCE SHEET ์ •๋ณด๋ฅผ ์ฐธ๊ณ ํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.

Specification AIWAF-100_Y20 AIWAF-200_Y20 AIWAF-500_Y20 AIWAF-1000_Y20 AIWAF-2000_Y20 AIWAF-4000_Y20 AIWAF-8000_Y20

Appearance

RAM 4GB 8GB (์ตœ๋Œ€ 128GB) 16GB (์ตœ๋Œ€ 128GB) 32GB (์ตœ๋Œ€ 2TB) 32GB (์ตœ๋Œ€ 2TB) 64GB (์ตœ๋Œ€ 2TB) 64GB (์ตœ๋Œ€ 2TB)

HDD 500G 500G 500G 2TB 2TB 2TB 2TB

MGMT / HA- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

- Mgmt 1 UTP Port- HA 1 UTP Port

Network(Default)

1G UTP * 2 1G UTP * 4 1G UTP * 4 - - - -

Network(Option)

-

Slot 1

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

Slot 1

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

8 Slot

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

8 Slot

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

8 Slot

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

8 Slot

- 1G UTP 4Port- 1G Fiber 4Port- 10G Fiber 2Port

CPSHTTP / HTTPS

5,000/1,500 30,000/10,000 55,000/15,000 130,000/35,000 200,000/50,000 250,000/70,000 350,000/100,000

TPSHTTP / HTTPS

9,000/5,000 55,000/35,000 80,000/55,000 250,000/100,000 300,000/150,000 400,000/200,000 550,000/300,000

ThroughputHTTP / HTTPS

400M/200M 2G/1G 4G/2G 10G/5G 14G/8G 15G/9G 16G/10G

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

APPLICATION INSIGHT WAF Line-UP

Page 14: Application Security Leader

APPLICATION INSIGHT WAF | 14

Transparent Proxy

Proxy base Full Transparent Mode - ํŠนํ—ˆ๊ธฐ์ˆ  (์ œ 10-0695489ํ˜ธ)

- APPLICATION INSIGHT WAF๋Š” ๋ณ„๋„์˜ IP ๋ถ€์—ฌ ์—†์ด Stealth-mode๋กœ ์šด์˜ ๋จ

- ๊ธฐ์กด ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ ๋ณ€ํ™” ์—†์Œ

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

โ–  ๋„คํŠธ์›Œํฌ ๊ตฌ์„ฑ ๋ณ€๊ฒฝ ์—†๋Š” ๊ฐ„๋‹จํ•œ ๊ตฌ์ถ•

Full Transparent Proxy

Page 15: Application Security Leader

APPLICATION INSIGHT WAF | 15

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

AICC(Application Insight Cloud Center)

โ–  ๋ณด์•ˆ ๊ทœ์น™ ๋งŒ์œผ๋กœ ํ•ด๊ฒฐ ํ•  ์ˆ˜ ์—†๋Š” ๋‹ค์–‘ํ•œ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์„ ์ œ์  ๋Œ€์‘

Cyber Threat Intelligence Platform ์—ฐ๋™

- Cyber Threat Intelligence Platform ์—ฐ๋™์„ ํ†ตํ•œ ๋‹ค์–‘ํ•œ ์›น ๊ณต๊ฒฉ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„ ๋Œ€์‘

- Proxy IP, Black Client IP, C&C IP, ์•…์„ฑ์ฝ”๋“œ ๋งํฌ ์‚ฝ์ž… ๋“ฑ์— ๋Œ€ํ•œ ํฌ๊ด„์ /์‹ ์ฒด์  ๋Œ€์‘ ์ฒด๊ณ„ ๊ตฌ์ถ•

- Attack IP์— ๋Œ€ํ•œ ํ‰ํŒ์ •๋ณด ์ œ๊ณต

Page 16: Application Security Leader

APPLICATION INSIGHT WAF |

Machine Learning

16

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

Machine Learning ๊ธฐ๋ฐ˜ Unknown Attack ํƒ์ง€

โ–  ๋Œ€์‘ ํŒจํ„ด์ด ์—†๋Š” ์‹ ๊ทœ ์›น ์ทจ์•ฝ์ ์— ๋Œ€ํ•œ ํšจ์œจ์  ๋Œ€์‘

- ์ด์ƒ ํ–‰์œ„ ๋ฐ ์œ„ํ˜‘ ํƒ์ง€๋ฅผ ์œ„ํ•œ ๋จธ์‹  ๋Ÿฌ๋‹(ํด๋ผ์šฐ๋“œ ์„ผํ„ฐ) ์—ฐ๋™

- ์•Œ๋ ค์ง„ ์œ„ํ˜‘์„ ๋น„๋กฏํ•˜์—ฌ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์›น ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณดํ˜ธ

Page 17: Application Security Leader

APPLICATION INSIGHT WAF | 17

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

HTTP/2 ํ”„๋กœํ† ์ฝœ์ œ์–ด

โ–  ๊ธฐ์กด ์›น ์„œ๋น„์Šค์˜ HTTP/2 ๋กœ ์†์‰ฌ์šด ์ „ํ™˜

- HTTP/2๋Š” HTTP/1.1๊ณผ ์ „ํ˜€ ๋‹ค๋ฅธ ๊ตฌ์กฐ์˜ ํ”„๋กœํ† ์ฝœ์ด๋ฉฐ ์•”ํ˜ธํ™”(HTTPS) ํ†ต์‹ ๋งŒ ์ง€์›

- HTTP/2 ํŠธ๋ž˜ํ”ฝ์— ๋Œ€ํ•œ ์™„์ „ํ•œ Parsing ๋ฐ ๋ชจ๋“  ๋ณด์•ˆ ๊ธฐ๋Šฅ ๋™์ผ ์ ์šฉ

Page 18: Application Security Leader

APPLICATION INSIGHT WAF | 18

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

Adaptive Profiling Technology

โ–  ์‹ค์‹œ๊ฐ„ ๊ณต๊ฒฉ ์ฐจ๋‹จ ๋ชฉ์  ๋ณด๋‹ค๋Š” ์‚ฌํ›„๋ถ„์„ ์šฉ๋„๋กœ ํšจ๊ณผ์ 

- Self-Learning ์—”์ง„์— ์˜ํ•ด ํด๋ผ์ด์–ธํŠธ์˜ ์ •์ƒ์ ์ธ request์™€ ์›น ์„œ๋ฒ„์˜ response๋ฅผ ํ† ๋Œ€๋กœ ํ”„๋กœํŒŒ์ผ

๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ตฌ์ถ•

- ํด๋ผ์ด์–ธํŠธ๋“ค์˜ request๋ฅผ ํ”„๋กœํŒŒ์ผ ๋ฐ์ดํ„ฐ ๋ฒ ์ด์Šค์™€ ๋น„๊ตํ•˜์—ฌ ๋น„์ •์ƒ์ ์ธ ํ˜•ํƒœ์˜ request ์›์ฒœ ์ฐจ๋‹จ

- ์•Œ๋ ค์ง€์ง€ ์•Š์€ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ์ตœ์ƒ์˜ ๋ฐฉ์–ด ๋ชจ๋ธ

Page 19: Application Security Leader

APPLICATION INSIGHT WAF | 19

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

๋ฉ€ํ‹ฐ๋„๋ฉ”์ธ์ •์ฑ…๋ฐํŠธ๋ž˜ํ”ฝ๊ด€๋ฆฌ

โ–  ํšจ์œจ์ ์ธ ๋„๋ฉ”์ธ(์„œ๋น„์Šค)๋ณ„ ํ’ˆ์งˆ ๊ด€๋ฆฌ

- ์›น ์„œ๋ฒ„์— ์ œ๊ณตํ•˜๋Š” ์—ฌ๋Ÿฌ ๋„๋ฉ”์ธ(์„œ๋น„์Šค)์— ๋Œ€ํ•ด ๊ฐ ๊ฐ์˜ ๋„๋ฉ”์ธ ๋ณ„ ์ฐจ๋“ฑ์  ์ •์ฑ… ์ ์šฉ

- ๊ฐ ๋„๋ฉ”์ธ ๋ณ„ ๊ด€๋ฆฌ์ž ์ง€์ •(๋ณต์ˆ˜ ์ง€์›)์„ ํ†ตํ•œ ๋…๋ฆฝ์  ๋ชจ๋‹ˆํ„ฐ๋ง/๋กœ๊ทธ๋ถ„์„/์ •์ฑ… ์šด์˜์˜ ํŽธ์˜์„ฑ ์ œ๊ณต

- ์›น ์‚ฌ์ดํŠธ(๋„๋ฉ”์ธ)๋ณ„ QoS ๋Œ€์—ญํญ ์ œํ•œ ์„ค์ •

์ •์ฑ… www.a.com www.b.com www.c.com

SQL INJECTON

XSS

CSRF

Web Shell

Brute Force

์ตœ๊ณ  ๊ด€๋ฆฌ์ž

A, B ๋„๋ฉ”์ธ ๊ด€๋ฆฌ์ž

A ๋„๋ฉ”์ธ๊ด€๋ฆฌ์ž

Admin

ON

ON

OFF

OFF OFF

OFFON

ON

ON

ON

ON

ON

ON

ON

ON

ON

ON

Page 20: Application Security Leader

APPLICATION INSIGHT WAF |

โ€ข TLS 1.3 ์ง€์›

โ€ข ๋ฉ€ํ‹ฐ๋„๋ฉ”์ธ ์ธ์ฆ์„œ ์ง€์›

โ€ข ๋‹ค์–‘ํ•œ ํ™•์žฅ์ž ์ง€์›(์ธ์ฆ์„œ ๋ณ€ํ™˜ ๊ณผ์ • ๋ถˆ ํ•„์š”)์— ๋”ฐ๋ฅธ ๊ฐ„ํŽธํ•œ ์ธ์ฆ์„œ ๋“ฑ๋ก

โ€ข ์‹ค์ œ ์›น ์„œ๋ฒ„ ํ™œ์„ฑํ™” Cipher-Suite ๋ชฉ๋ก๊ณผ ๋™๊ธฐํ™”(์ž๋™ ์„ค์ •)

โ€ข ์ธ์ฆ์„œ ๋งŒํšจ ์‚ฌ์ „ ์•Œ๋ฆผ ๋ฐ ์ธ์ฆ์„œ ๋งŒ๋ฃŒ์‹œ ์ž๋™ ๋ฐ”์ดํŒจ์Šค ๊ธฐ๋Šฅ

20

์œ ์—ฐํ•˜๊ณ ์†์‰ฌ์šด HTTPS ํŠธ๋ž˜ํ”ฝ๊ด€๋ฆฌ

- SSL / TLS ์‚ฌ์šฉ์˜ ์ผ๋ฐ˜ํ™”์™€ ๋Œ€์ค‘ํ™”์— ๋”ฐ๋ฅธ HTPS ์•”ํ˜ธํ™” ํŠธ๋ž˜ํ”ฝ ๊ธ‰์ฆ

- ์œ ์—ฐํ•œ ์•”ํ˜ธํ™” ํŠธ๋ž˜ํ”ฝ ์ œ์–ด์™€ ๊ณ ์„ฑ๋Šฅ ์ฒ˜๋ฆฌ ๋Šฅ๋ ฅ์ด ์›น ๋ฐฉํ™”๋ฒฝ ์†”๋ฃจ์…˜์˜ ์ค‘์š” ํฌ์ธํŠธ๋กœ ๋Œ€๋‘

Default protocol https is used by 59.6% (2020. 04)

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

โ–  HTTPS ์„œ๋น„์Šค ๊ด€๋ฆฌ๋กœ ์ธํ•œ ์žฅ์• ํฌ์ธํŠธ ์ตœ์†Œํ™”

Page 21: Application Security Leader

APPLICATION INSIGHT WAF |

- ์˜คํƒ ๋ฐœ์ƒ์‹œ Rule ๋ณ„ ์˜ˆ์™ธ ์ฒ˜๋ฆฌ๋ฅผ ํ†ตํ•ด ์„œ๋น„์Šค ๊ฐ€์šฉ์„ฑ ๋ณด์žฅ ๋ฐ ๋ณด์•ˆ Hole ์ตœ์†Œํ™”

- ์ ์šฉ IP/URL ๋ฐ ์˜ˆ์™ธ IP/URL ์„ค์ •

- ์ฐจ๋‹จ ํŽ˜์ด์ง€ ์ฐจ๋“ฑ ์„ค์ •

- Disable ํŒจํ„ด ์ฐจ๋“ฑ ์„ค์ •

- ์Šค์ผ€์ฅด ์„ค์ • ๋“ฑ

โ–  ์ˆ˜ ๋งŽ์€ ์›น ์„œ๋ฒ„ ๊ด€๋ฆฌ์— ๋”ฐ๋ฅธ ๋ถˆํŽธ ์š”์†Œ ์ œ๊ฑฐ

21

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

๋ณด์•ˆ๊ทœ์น™์ตœ์ ํ™”

๋ณด์•ˆ ๊ทœ์น™ ๋ณ„ ์ƒ์„ธ ์„ค์ •

Non HTTP ํŠธ๋ž˜ํ”ฝ์ œ์–ด

- ๋ณดํ˜ธ๋Œ€์ƒ์œผ๋กœ ๋“ฑ๋ก๋œ ์›น ์„œ๋ฒ„ ์ค‘ HTTP(S) ์ด์™ธ์˜ ์„œ๋น„์Šค๊ฐ€ ์กด์žฌํ•˜๋Š” ๊ฒฝ์šฐ

ํ”„๋กœํ† ์ฝœ ์œ ํ˜• ๋ถ„์„์„ ํ†ตํ•ด WEB ์ด์™ธ์˜ ํŠธ๋ž˜ํ”ฝ์€ ์ž๋™ ๋ฐ”์ดํŒจ์Šค ์‹œํ‚ค๋Š” ๊ธฐ๋Šฅ

- ๊ด€๋ฆฌ์ž์˜ ์ž˜๋ชป๋œ ์„ค์ •์œผ๋กœ ์ธํ•ด ๋ฐœ์ƒ ๊ฐ€๋Šฅํ•œ ์„œ๋น„์Šค ์žฅ์•  ์š”์†Œ์— ๋Œ€ํ•œ ํšจ์œจ์  ์šด์˜ ์˜ต์…˜

โ–  ๋ณด์•ˆ Holeโ†“

Page 22: Application Security Leader

APPLICATION INSIGHT WAF |

- ์‹ ๊ทœ ์ตœ์•ฝ์  ๋ฐœ์ƒ ์‹œ ์ƒ˜ํ”Œ์ฝ”๋“œ๋ฅผ ์ž…๋ ฅํ•˜๊ฑฐ๋‚˜, ๋ชจ์˜ ํ•ดํ‚น(์›น ์ทจ์•ฝ์  ์ง„๋‹จ) ๋“ฑ ์ •์ฑ… ์„ค์ • ์ ๊ฒ€ ๋ชฉ์ ์œผ๋กœ

์›น ๋ฐฉํ™”๋ฒฝ ๋ณด์•ˆ ์ •์ฑ…์—์„œ ์–ด๋Š ๊ทœ์น™์ด๋‚˜ ํŒจํ„ด์œผ๋กœ ํƒ์ง€ ๋˜๋Š”์ง€ Self ํ…Œ์ŠคํŠธ ์ˆ˜ํ–‰

- ์‚ฌ์šฉ์ž๊ฐ€ ์ง์ ‘ ์ˆ˜๋ฆฝํ•œ ๋ณด์•ˆ ๊ทœ์น™์˜ ์˜ค๋ฅ˜๋‚˜ ์ค‘๋ณต, ํƒ์ง€ ์—ฌ๋ถ€ ์‚ฌ์ „ ์ ๊ฒ€์œผ๋กœ ์šด์˜ ํŽธ์˜์„ฑ ์ œ๊ณ 

22

3. ์†Œ๊ฐœ ๋ฐ ํŠน์žฅ์ 

์›น์„œ๋น„์Šคํ’ˆ์งˆ๋ชจ๋‹ˆํ„ฐ๋ง

โ–  ์›น ์„œ๋น„์Šค ์ด์ƒ ๋ฐœ์ƒ์‹œ ์›น ๋ฐฉํ™”๋ฒฝ ๋ฌธ์ œ ์ธ์ง€ ๋ถ€ํ„ฐ ๊ฐ„๋‹จํ•˜๊ฒŒ ํ™•์ธ

Self ์ •์ฑ…์ ๊ฒ€

โ–  ์‹ ๊ทœ ์ทจ์•ฝ์  ํƒ์ง€ ์—ฌ๋ถ€์— ๋Œ€ํ•œ ๋น ๋ฅธ ํŒ๋‹จ

- ๋ณดํ˜ธ๋Œ€์ƒ ์›น ์„œ๋ฒ„๋“ค์— ๋Œ€ํ•œ ์‹ค์‹œ๊ฐ„ ์›น ์„œ๋น„์Šค ์ƒํƒœ ๋ชจ๋‹ˆํ„ฐ๋ง

TCP PORT ์ฒดํฌ ๋ฐฉ์‹์ด ์•„๋‹Œ ์‹ค์ œ HTTP(S) ํ—ฌ์Šค์ฒดํฌ ํŠธ๋ž˜ํ”ฝ ๋ฐœ์ƒ

- ํ˜„์žฌ ์ƒํƒœ, ์‘๋‹ต ์†๋„(์ตœ์†Œ, ์ตœ๋Œ€, ํ‰๊ท ), ๊ฐ€์šฉ๋ฅ ์— ๋Œ€ํ•œ ์›น ์„œ๋ฒ„ ํ’ˆ์งˆ ์ •๋ณด ์ œ๊ณต

์›น ๋ฐฉํ™”๋ฒฝ์— ์˜ํ•œ ์„œ๋น„์Šค ์†๋„ ์ €ํ•˜ ์—ฌ๋ถ€ ํŒ๋ณ„์ด๋‚˜ ์žฅ์•  ๋ถ„์„ ์‹œ ์šฉ์ดํ•œ ๋ฐ์ดํ„ฐ๋กœ ํ™œ์šฉ

Page 23: Application Security Leader

APPLICATION INSIGHT WAF |

โ€ข ์ œํ’ˆ ํŒจ์น˜

โ€ข ์ œํ’ˆ ์ดˆ๊ธฐํ™”

โ€ข ๊ธด๊ธ‰ ๋ณต๊ตฌ ๋ชจ๋“œ

โ€ข ํŒจ์Šค์›Œ๋“œ ์ดˆ๊ธฐํ™”

โ€ข Debug Log ์ˆ˜์ง‘

โ€ข TCPDUMP ์ˆ˜์ง‘

โ€ข ์ด์Šˆ ๋ถ„์„์— ํ•„์š”ํ•œ ์ฃผ์š”์ •๋ณด ์ž๋™ ์ˆ˜์ง‘

โ€ข ์ค‘์š” ์„ค์ • ๊ฐ’ ๋ณ€๊ฒฝ ๋ฐ ์กฐํšŒ

23

Trouble Shooting

Trouble Shooting

3. ์ฃผ์š” ์ •์ฑ…

- ๊ธฐ์ˆ ์ง€์› ์—”์ง€๋‹ˆ์–ด๋‚˜ ๊ณ ๊ธ‰ ๊ด€๋ฆฌ์ž๋ฅผ ์œ„ํ•œ์ œํ’ˆ ๊ด€๋ฆฌ ๋ฐ ํŠธ๋Ÿฌ๋ธ” ์ŠˆํŒ… ๋ชฉ์ ์˜ ๋ณ„๋„ UI ์ œ๊ณต

Page 24: Application Security Leader

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Page 25: Application Security Leader

APPLICATION INSIGHT WAF | 25

๋‹ค์–‘ํ•œ๊ตฌ์„ฑ๋ฐฉ์‹

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Transparent Proxy(IN-Line) Port Redirection(Out-of-path)

โ€ข ์šด์˜ ๋ชจ๋“œ: Transparent Proxy

โ€ข ๋ฌผ๋ฆฌ์  ๊ตฌ์„ฑ: IN-Line

โ€ข ๋„คํŠธ์›Œํฌ ๊ฒฝ๋กœ์ƒ์— Bridge ํ˜•ํƒœ๋กœ In-line ๊ตฌ์„ฑ

โ€ข IP๊ฐ€ ์—†๋Š” Transparent Proxy Mode๋กœ ์ž‘๋™

โ€ข ๋ชจ๋“  ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต

โ€ข ๊ตฌ์ถ• ๋ ˆํผ๋Ÿฐ์Šค ์ค‘ 80% ๊ตฌ์„ฑ ๋ฐฉ์‹

โ€ข ์šด์˜ ๋ชจ๋“œ: Port Redirection

โ€ข ๋ฌผ๋ฆฌ์  ๊ตฌ์„ฑ: One-Armed

โ€ข L3, L4 Switch ์—์„œ Port Redirection ํ•„์š”

โ€ข ๊ตฌ์ถ• ๋˜๋Š” ์žฅ์•  ์‹œ ์„œ๋น„์Šค ๋‹จ์ ˆ ์—†์Œ

โ€ข ๋ชจ๋“  ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œ๊ณต

โ€ข ๊ตฌ์ถ• ๋ ˆํผ๋Ÿฐ์Šค ์ค‘ 5% ๊ตฌ์„ฑ ๋ฐฉ์‹

Page 26: Application Security Leader

APPLICATION INSIGHT WAF | 26

๋‹ค์–‘ํ•œ๊ตฌ์„ฑ๋ฐฉ์‹

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Sniffing(In-Line) Mirroring(Out-of-path)

โ€ข ์šด์˜ ๋ชจ๋“œ: Mirroring

โ€ข ๋ฌผ๋ฆฌ์  ๊ตฌ์„ฑ: One-Armed

โ€ข Switch ๋˜๋Š” TAP์œผ๋กœ๋ถ€ํ„ฐ ๋ณต์‚ฌ ํŠธ๋ž˜ํ”ฝ ์ˆ˜์‹ 

โ€ข ๋ณ„๋„ ์ฐจ๋‹จ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ํ†ตํ•ด ๊ณต๊ฒฉ ํŠธ๋ž˜ํ”ฝ ์ฐจ๋‹จ

โ€ข ์ „์ฒด ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ค‘ 85% ์ œ๊ณต

โ€ข ๊ตฌ์ถ• ๋ ˆํผ๋Ÿฐ์Šค ์ค‘ 5% ๊ตฌ์„ฑ ๋ฐฉ์‹

โ€ข ์šด์˜ ๋ชจ๋“œ: Sniffing

โ€ข ๋ฌผ๋ฆฌ์  ๊ตฌ์„ฑ: IN-Line

โ€ข ํŒจํ‚ท ๋ณต์‚ฌ ๋ฐฉ์‹์˜ ์Šค๋‹ˆํ•‘ ํƒ€์ž…์œผ๋กœ ๊ณ ์„ฑ๋Šฅ ์ œ๊ณต

โ€ข RSA ํƒ€์ž…์˜ HTTPS ํŠธ๋ž˜ํ”ฝ๋งŒ ์ง€์›

โ€ข ์ „์ฒด ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ค‘ 85% ์ œ๊ณต

โ€ข ๊ตฌ์ถ• ๋ ˆํผ๋Ÿฐ์Šค ์ค‘ 5% ๊ตฌ์„ฑ ๋ฐฉ์‹

Page 27: Application Security Leader

APPLICATION INSIGHT WAF | 27

๋‹ค์–‘ํ•œ๊ตฌ์„ฑ๋ฐฉ์‹

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Reverse Proxy(Out-of-Path)

โ€ข ์šด์˜ ๋ชจ๋“œ: Reverse Proxy

โ€ข ๋ฌผ๋ฆฌ์  ๊ตฌ์„ฑ: Out-Of-Path

โ€ข DNS ์ •๋ณด ์ค‘ ์›น ์„œ๋ฒ„ IP๋ฅผ ์›น ๋ฐฉํ™”๋ฒฝ IP๋กœ ๋ณ€๊ฒฝ ์ ์šฉ

โ€ข ๋‹จ์ผ๊ฐœ์˜ ์›น ๋ฐฉํ™”๋ฒฝ ์‹œ์Šคํ…œ์—์„œ ๋ถ„์‚ฐ ๋ฐฐ์น˜ ๋˜์–ด ์žˆ๋Š” ์›น ์„œ๋ฒ„ ๊ตฐ์— ๋Œ€ํ•œ ๊ด‘๋ฒ”์œ„ ๋ณดํ˜ธ ์ œ๊ณต

โ€ข Multi-Segment ์ง€์›

โ€ข ๊ตฌ์ถ• ๋ ˆํผ๋Ÿฐ์Šค ์ค‘ 5% ๊ตฌ์„ฑ ๋ฐฉ์‹

Page 28: Application Security Leader

APPLICATION INSIGHT WAF | 28

๋‹ค์–‘ํ•œ๋„คํŠธ์›Œํฌํ™˜๊ฒฝ์ง€์›

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Port Trunk Multi-Segment

โ€ข N๊ฐœ์˜ Segment ์ง€์› (์ธํ„ฐํŽ˜์ด์Šค ์ˆ˜๋Ÿ‰์— ๋”ฐ๋ฆ„)

โ€ข ๋„คํŠธ์›Œํฌ ๋ฐ ์›น ์„œ๋ฒ„์˜ IP ๊ตฌ์„ฑ ํ™˜๊ฒฝ ๋ณ€ํ™” ์—†์Œ

โ€ข Segment๋ณ„ Fail-Open ๊ธฐ๋Šฅ ์ œ๊ณต

โ€ข Port Trunk, Tag VLAN, LACP ๊ตฌ์„ฑ ์ง€์›

โ€ข ๋„คํŠธ์›Œํฌ ๋ฐ ์›น ์„œ๋ฒ„์˜ IP ๊ตฌ์„ฑ ํ™˜๊ฒฝ ๋ณ€ํ™” ์—†์Œ

Page 29: Application Security Leader

APPLICATION INSIGHT WAF | 29

๋‹ค์–‘ํ•œ๋„คํŠธ์›Œํฌํ™˜๊ฒฝ์ง€์›

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Active-Standby Asynchronous

โ€ข ์›น ๋ฐฉํ™”๋ฒฝ ์‹œ์Šคํ…œ ๊ฐ„ ๋น„๋™๊ธฐ ํŠธ๋ž˜ํ”ฝ ํฌ์›Œ๋”ฉ ์ˆ˜ํ–‰

โ€ข Multi-Segment ํ™˜๊ฒฝ ์ง€์›

โ€ข ์›น ๋ฐฉํ™”๋ฒฝ ์‹œ์Šคํ…œ ๊ฐ„ ์ƒํƒœ ์ฒดํฌ ์ˆ˜ํ–‰

โ€ข ์‹œ์Šคํ…œ ์žฅ์•  ๋ฐœ์ƒ ์‹œ HA(Fail-Over) ์ œ๊ณต

โ€ข Master, Slave ์„ค์ •์„ ํ†ตํ•œ ์ž๋™ Fail-back ์„ ํƒ

Page 30: Application Security Leader

APPLICATION INSIGHT WAF | 30

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Overview

โ€ข ๊ฐ ์›น ์„œ๋น„์Šค ๋ณ„ ์ฐจ๋“ฑ ์ •์ฑ… ์ ์šฉ (๋ฉ€ํ‹ฐ ๋„๋ฉ”์ธ)

โ€ข Tagged VLAN ํ™˜๊ฒฝ ์ˆ˜์šฉ

โ€ข ์›น ๋ฐฉํ™”๋ฒฝ์—๋‚ด์žฅ๋œ๋ฌผ๋ฆฌ์  Bypass ๊ธฐ๋Šฅ์„ํ†ตํ•ด ์‹œ์Šคํ…œ

์žฅ์• ์ƒํ™ฉ์—์„œ๋„์„œ๋น„์Šค๊ฐ€์šฉ์„ฑ ๋ณด์žฅ

Deployment

โ€ข 1๊ฐœ ์›น ๋ฐฉํ™”๋ฒฝ์—์„œ๋ถ„์‚ฐ ๋ฐฐ์น˜๋œ ๋‹ค์–‘ํ•œ์›น ์„œ๋ฒ„๊ตฐ ์ˆ˜์šฉ

โ€ข 3 Multi Segment ๊ตฌ์„ฑ

Effectiveness

โ€ข ๊ธฐ์กด ๋„คํŠธ์›Œํฌ๋ชจ๋“  ํ™˜๊ฒฝ ๊ตฌ์„ฑ ์œ ์ง€(ํ™˜๊ฒฝ์„ค์ • ๋ณ€๊ฒฝ ๋ถˆํ•„์š”)

โ€ข ๋Œ€์™ธ ์„œ๋น„์Šค / ๋Œ€๋‚ด ์„œ๋น„์Šค์—๋Œ€ํ•œ ํšจ์œจ์ ์ธ๋ฐฉ์–ด ์ฒด๊ณ„ ๊ตฌ์ถ•

โ€ข ๊ฐ ์›น ์„œ๋ฒ„ ๋‹ด๋‹น์ž ๋ณ„ ๋ณด์•ˆ ์ •์ฑ… ์„ค์ • ํ™˜๊ฒฝ ์ œ๊ณต

Main Policy

โ€ข SQL INJECTION, XSS, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์ทจ์•ฝ์„ฑ ํƒ์ง€

๊ตฌ์ถ•์‚ฌ๋ก€ (๊ณต๊ณต/ํ•ด์™ธ โ€“ I๊ธฐ๊ด€)

Page 31: Application Security Leader

APPLICATION INSIGHT WAF | 31

๊ตฌ์ถ•์‚ฌ๋ก€ (๊ณต๊ณต/๊ตญ๋‚ด โ€“ H๊ธฐ๊ด€)

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Overview

โ€ข IPS์—์„œ์ œ์–ด ๋ถˆ๊ฐ€ํ•œ์ƒ์„ธ ํŒŒ๋ผ๋ฉ”ํ„ฐ์ œ์–ด

โ€ข ์‚ฌ์šฉ์ž ๊ตฌ๋ถ„์—๋”ฐ๋ฅธ ์ ‘์† ํ—ˆ์šฉ URL ๋ถ„๋ฆฌ

โ€ข ์ทจ์•ฝํ•œ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ(openssl, bash ๋“ฑ) ๋ฒ„์ „ ์‚ฌ์šฉ ์›น ์„œ๋ฒ„๋“ค์—

๋Œ€ํ•œ ์‚ฌ์ „ ๋ฐฉ์–ด

Deployment

โ€ข L4 ์Šค์œ„์น˜ Port Redirection ์„ค์ •

- HTTP / HTTPS ํŠธ๋ž˜ํ”ฝ(Service Port) ์–‘๋ฐฉํ–ฅํ•„ํ„ฐ

โ€ข ๋„คํŠธ์›Œํฌ์ „์ฒด ์šฉ๋Ÿ‰ ๋Œ€๋น„ ์ €์šฉ๋Ÿ‰ ์›น ํŠธ๋ž˜ํ”ฝ ์ฒ˜๋ฆฌ์—์ ํ•ฉ

Effectiveness

โ€ข IPS ํƒ์ง€์œจ๋Œ€๋น„ 19.4% ํƒ์ง€์œจ ํ–ฅ์ƒ (IPS ๋ฏธ ํƒ์ง€ ๊ฑด์ˆ˜ ๋น„๊ต)

โ€ข ๋‹ค์ˆ˜ ์›น ์„œ๋ฒ„ ํŒจ์น˜ ์ ์šฉ๊นŒ์ง€๋ฐœ์ƒ ๋˜๋Š” Zeroday Attack ๋ฐฉ์–ด

โ€ข ์‚ฌ์šฉ์ž IP๋ณ„๋กœ์ ‘์† ๊ฐ€๋Šฅํ•œ์›น ์„œ๋น„์Šค๊ตฌ๋ถ„ ์ ์šฉ

Main Policy

โ€ข URL ์ ‘๊ทผ ๋ฃฐ, ํ—ค๋” ์ทจ์•ฝ์„ฑํƒ์ง€, ์›น ์„œ๋ฒ„ ์ทจ์•ฝ์„ฑ ํƒ์ง€

Page 32: Application Security Leader

APPLICATION INSIGHT WAF | 32

๊ตฌ์ถ•์‚ฌ๋ก€ (๊ธฐ์—…/๊ตญ๋‚ด โ€“ P์‚ฌ)

4. ๊ตฌ์ถ• ๋ฐฉ์•ˆ ๋ฐ ์‚ฌ๋ก€

Overview

โ€ข ๋น„๋™๊ธฐ ํŠธ๋ž˜ํ”ฝ๋„คํŠธ์›Œํฌํ™˜๊ฒฝ ์ง€์›

โ€ข ์œ ๋ช… ํ•ด์ปค ๊ทธ๋ฃน ๊ฒฝ๊ณ ์— ๋Œ€์‘ํ•˜๊ธฐ์œ„ํ•œ ํฌ๊ด„์ ์›น ์‚ฌ์ดํŠธ๋ฐฉ์–ด

โ€ข ์ด๋ฏธ ์—…๋กœ๋“œ ๋˜์–ด ์žˆ๋Š” Webshell ํŒŒ์ผ ์ ‘๊ทผ ํ™•์ธ ๋ฐ ์‹ ๊ทœ

Webshell ํŒŒ์ผ ์—…๋กœ๋“œ์ฐจ๋‹จ

Deployment

โ€ข Bypass TAP ๊ธฐ๋ฐ˜ ์ธ๋ผ์ธ๊ตฌ์„ฑ

โ€ข ๋น„๋™๊ธฐ ํŠธ๋ž˜ํ”ฝ์ฒ˜๋ฆฌ๋ฅผ ์œ„ํ•œ WAF ์‹œ์Šคํ…œ๊ฐ„ Async Port ์—ฐ๊ฒฐ

Effectiveness

โ€ข ์„ธ์…˜ ํฌ์›Œ๋”ฉ ๊ธฐ๋Šฅ์„ํ™œ์šฉํ•œ ๋น„๋™๊ธฐํŠธ๋ž˜ํ”ฝ ์ฒ˜๋ฆฌ

โ€ข ๊ณ ๊ฐ์‚ฌ ์ž์ฒด ๋ชจ์˜ํ•ดํ‚น์ง„๋‹จ ์‹œ ๋ฐฉ์–ด์œจ 98% (2%์˜๊ฒฝ์šฐ ์ง„๋‹จ

ํˆด ์˜คํƒ)

โ€ข ์•…์„ฑ ํŒŒ์ผ ์—…๋กœ๋“œ ์‹œ๋„ ์œจ 22.8% ๊ฐ์†Œ

Main Policy

โ€ข SQL INJECTION, ์•…์„ฑ ํŒŒ์ผ ์—…๋กœ๋“œํƒ์ง€, ์•…์„ฑ ํŒŒ์ผ ์ ‘๊ทผ ํƒ์ง€

Page 33: Application Security Leader

ใˆœ๋ชจ๋‹ˆํ„ฐ๋žฉ | ์ฃผ์†Œ : ์„œ์šธ์‹œ ๊ตฌ๋กœ๊ตฌ ๋””์ง€ํ„ธ๋กœ 27๊ฐ€๊ธธ 27 ์•„๋‚จ๋นŒ๋”ฉ 8์ธต 08375 | Tel : 02-749-0799 | Fax : 02-749-0798 | Web : www.monitorapp.comE-mail : [email protected] | ์‚ฌ์—…์ž๋“ฑ๋ก๋ฒˆํ˜ธ : 214-87-66413 | Copyright 2018 MONITORAPP Co.,Ltd. All rights reserved.

THANK YOU