AWS 엣지 서비스 기반 구축

웹 사이트와 API의 속도를 높이고, 수백만 명의 사용자 규모로 확장하고, DDoS 공격, 자동화된 악성 봇 및 CVE 익스플로잇 공격을 차단하세요.

성능 및 가용성

인터넷 사용자들은 점점 더 지연 시간이 짧고 가용성이 높은 반응형 웹 애플리케이션과 API를 기대하고 있습니다. 빠르고 안정적인 사용자 경험은 검색 엔진 순위를 높이고 사용자 참여를 높이는 데 기여합니다.

사이버 위협의 위험 해결

공개적으로 액세스할 수 있는 웹 애플리케이션 및 API는 SQL 명령어 삽입, 악성 봇에 의한 자동화된 요청, 가용성에 영향을 미치거나 보안을 손상시키거나 과도한 리소스를 소비할 수 있는 DDoS 공격 등 OWASP Top 10에 설명된 일반적으로 발생하는 취약성과 같은 위협에 노출되어 있습니다.

엣지에서 서버리스

개발자들은 최신 웹 애플리케이션을 쉽게 구축하고 클라우드 또는 온프레미스에서 오리진과 원활하게 통합할 수 있는 도구를 찾고 있습니다.

웹 애플리케이션의 성능, 복원력 및 보안을 유지하고자 하는 개발자는 호스팅 인프라에 AWS 엣지 서비스를 도입합니다. AWS 엣지 서비스에는 글로벌 콘텐츠 전송 네트워크인 Amazon CloudFront, 애플리케이션 계층 위협을 관리하는 보안 제어 기능인 AWS WAF, 웹 애플리케이션의 기능을 강화하기 위한 Lambda@EdgeCloudFront Functions와 같은 엣지 함수, 네트워크 수준 엑셀러레이터인 AWS Global Accelerator가 포함됩니다. 

AWS 엣지 서비스를 웹 애플리케이션 기술 스택에 통합하면 다음과 같은 여러 이점이 추가됩니다.

  • 더 빠른 웹: 캐싱, 이미지/텍스트 압축, HTTP/3 및 TLS 1.3과 같은 최신 인터넷 프로토콜을 지원합니다. 분산된 엣지 로케이션에서 최종 사용자와 가까운 TLS 연결을 종료하고 AWS의 프라이빗 백본 네트워크를 통해 오리진에 대한 지속적인 TCP 연결을 유지함으로써 정적 및 동적 애플리케이션이 가속화됩니다.
  • 신뢰성 향상: 오리진 장애 조치, 연결 재시도 및 다중 리전 아키텍처를 지원합니다.
  • 추가 보안 제어 기능: TLS 정책 시행, 액세스 제어, 인프라 계층에서의 DDoS 보호, AWS WAF를 사용한 HTTP 플러드 차단, Bot Control을 사용한 자동화된 봇 트래픽 관리, AWS 위협 연구 팀의 AWS WAF에 대한 관리형 규칙을 사용한 CVE 익스플로잇 공격 방지 등의 제어 기능이 있습니다.
  • 엣지에서의 기능: 엣지 마이크로서비스 전반에 걸쳐 리디렉션, 권한 부여 또는 A/B 테스트와 같은 작업을 중앙 집중화하고, 동적 오리진 라우팅 및 요청 조정 등을 활성화합니다.

AWS 엣지 서비스에 어떤 새로운 소식이 있나요?

Showing results: 1-4
Total results: 303
  • 날짜
1 76

주요 강연

Showing results: 1-3
Total results: 29
  • 날짜
  • The ideal micro-frontends platform (Formula One Testimony)

    How can I implement micro-frontends in my company? What recommendations do you have? In this session, get answers to these common questions. Discover the key characteristics necessary for constructing effective frontend distributed systems. Also learn the best practices and tools for developing micro frontends based on real-world examples.
    Case Study
    2024-12-09
  • Practical applications of edge compute in Amazon CloudFront, with AppsFlyer testimony

    With an increasingly more powerful serverless environment coupled with content delivery network (CDN) capabilities, Amazon CloudFront empowers developers to build web applications that execute functions closer to end users, tailoring content delivery to the unique needs of users. This session delves into how to leverage the latest edge compute features while optimizing for both performance and scalability. Learn best practices and patterns for deploying custom logic at the edge, enabling you to harness the full potential of CloudFront's evolving features.
    AWS re:Invent 2024
    2024-12-09
  • I didn’t know AWS WAF did this

    Securing web applications in today’s ever-evolving threat landscape is crucial. As threats evolve, so must security controls and countermeasures. In this chalk talk, dive into how AWS WAF seamlessly integrates with other AWS services, making it possible for you to construct a resilient, multi-layered defense strategy. Learn about uncommon use cases and how to address even the most unconventional threats.
    AWS re:Invent 2024
    2024-12-08
1 10

참조 백서

Showing results: 1-5
Total results: 5
  • Whitepaper

    Implementing a bot control strategy on AWS

    The internet as we know it would not be possible without bots. Bots run automated tasks over the internet and simulate human activity or interaction. They allow businesses to build efficiency into processes and tasks. Useful bots, like web crawlers, index information on the internet and help us quickly find the most relevant information for our search queries. Bots are a good mechanism to improve business and provide value to companies. However, with time, bad actors started using bots as a means to abuse existing systems and applications in new and creative ways. Botnets are the best-known mechanism to scale bots and their impact. Botnets are networks of bots that are infected by malware and are under the control of a single party, known as the bot herder or bot operator. From one central point, the operator can command every computer on its botnet to simultaneously carry out a coordinated action, which is why botnets are also referred to as command-and-control (C2) systems. The scale of a botnet can be many millions of bots. A botnet helps the operator to perform large-scale actions. Because botnets remain under the control of a remote operator, infected machines can receive updates and change their behavior on the fly. As a result, for significant financial gain, C2 systems can rent access to segments of their botnet on the black market. The prevalence of botnets has continued to grow. It is considered by experts to be the favorite tool of bad actors. Mirai is one of the biggest botnets. It emerged in 2016, is still operational, and is estimated to have infected up to 350,000 Internet of Things (IoT) devices. This botnet has been adapted and used for many types of activities, including distributed denial of service (DDoS) attacks. More recently, bad actors tried to further obfuscate their activity and source their traffic by obtaining IP addresses through the use of residential proxy services. This creates a legitimate interconnected, peer-to-peer system that adds sophistication to the activity and makes it more challenging to detect and mitigate. This document focuses on the bot landscape, its effect on your applications, and the available strategies and mitigation options. This prescriptive guidance and its best practices help you understand and mitigate different types of bot attacks. In addition, this guide describes the AWS services and features that support a bot mitigation strategy and how each one can help you protect your applications. It also includes an overview of bot monitoring and best practices for optimizing solution costs.
    2024-02-24
  • Whitepaper

    Amazon CloudFront for Media Streaming

    This whitepaper is for media organizations interested in delivering streaming media content to their viewers using Amazon CloudFront. Media delivery has a unique set of characteristics requiring low latency, high reliability, and high scalability.
    2023-09-13
  • Whitepaper

    AWS Best Practices for DDoS Resiliency

    In this whitepaper, AWS provides you with prescriptive DDoS guidance to improve the resiliency of applications running on AWS.
    2023-08-09
  • Whitepaper

    Guidelines for Implementing AWS WAF

    This whitepaper outlines recommendations for implementing AWS WAF to protect existing and new web applications. This whitepaper applies to anyone who is tasked with protecting web applications.
    2022-01-19
  • Whitepaper

    Secure Content Delivery with Amazon CloudFront

    This whitepaper describes how Amazon CloudFront, a highly secure, managed service, can help architects and developers secure the delivery of their applications and content by providing useful, security-supporting features.
    2022-01-11
1

이 페이지의 내용이 도움이 되었나요?