๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ

Cloudflare ์ด๋ž€?

์‹œํ๋ฆฌํ‹ฐ์ง€ํ˜ธ 2025. 5. 29.

1. Cloudflare ์ •์˜

 Cloudflare๋Š” 2009๋…„ ๋ฏธ๊ตญ ์ƒŒํ”„๋ž€์‹œ์Šค์ฝ”์—์„œ ์„ค๋ฆฝ๋œ ์›น ์ธํ”„๋ผ•๋ณด์•ˆ ํ”Œ๋žซํผ์ž…๋‹ˆ๋‹ค. ์ „ ์„ธ๊ณ„ 330๊ฐœ ์ด์ƒ์˜ ๋„์‹œ์— ๋ถ„์‚ฐ๋œ *์—ฃ์ง€ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์›น์‚ฌ์ดํŠธ•์• ํ”Œ๋ฆฌ์ผ€์ด์…˜•API์˜ ์„ฑ๋Šฅ์„ ๊ฐ€์†ํ™”ํ•˜๊ณ , DDoS ๋“ฑ ๊ฐ์ข… ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋ฉฐ, DNS•SSL/TLS๊ด€๋ฆฌ, ์„œ๋ฒ„๋ฆฌ์Šค ์ปดํ“จํŒ… ๋“ฑ 60์—ฌ ๊ฐ€์ง€ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค๋ฅผ ๋‹จ์ผ ์ธํ„ฐํŽ˜์ด์Šค๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

 

 

 

2. ์ฃผ์š” ์„œ๋น„์Šค•๊ธฐ๋Šฅ

  1.  CDN (Content Delivery Network)
    • ์ •์  ์ž์‚ฐ(์ด๋ฏธ์ง€•CSS•JS ๋“ฑ)์„ ์ „ ์„ธ๊ณ„ ์—ฃ์ง€ ์„œ๋ฒ„์— ์บ์‹ฑํ•˜์—ฌ ์‚ฌ์šฉ์ž์—๊ฒŒ ๊ฐ€์žฅ ๊ฐ€๊นŒ์šด ์„œ๋ฒ„์—์„œ ์ œ๊ณต, ํŽ˜์ด์ง€ ๋กœ๋”ฉ ์†๋„ ๋Œ€ํญ ํ–ฅ์ƒ
  2. DNS ๊ด€๋ฆฌ
    • ๊ธ€๋กœ๋ฒŒ Anycast ๋„ค์ž„์„œ๋ฒ„๋ฅผ ํ†ตํ•ด ์ดˆ์ €์ง€์—ฐ DNS ์‘๋‹ต ์ œ๊ณต. ๊ถŒ์œ„ DNS(Authoritative DNS) ๊ธฐ๋Šฅ์œผ๋กœ ๊ฐ€์šฉ์„ฑ•์•ˆ์ „์„ฑ ๋ณด์žฅ
  3. DDoS ๋ฐฉ์–ด & WAF (Web Application Firewall)
    • ๋„คํŠธ์›Œํฌ•์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ณ„์ธต์˜ ๋Œ€๊ทœ๋ชจ DDoS ๊ณต๊ฒฉ์„ ์ž๋™ ์™„ํ™”ํ•˜๋ฉฐ, OWASP Top 10 ๊ธฐ๋ฐ˜ ๋ฃฐ์…‹์œผ๋กœ ์•…์„ฑ ์š”์ฒญ ์ฐจ๋‹จ
  4. SSL/TLS ๋ฐ ๋ณด์•ˆ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰
    • ๋ฌด๋ฃŒ Universal SSL ๊ธฐ๋Šฅ์œผ๋กœ HTTPS ์ „ํ™˜์„ ๊ฐ„ํŽธํ•˜๊ฒŒ ์ง€์›ํ•˜๋ฉฐ, ๋งž์ถคํ˜• ์ธ์ฆ์„œ ๊ด€๋ฆฌ๋„ ๊ฐ€๋Šฅ
  5. Bot Management & Rate Limiting
    • ์•…์„ฑ ๋ด‡ ํŠธ๋ž˜ํ”ฝ ์‹๋ณ„•์ฐจ๋‹จ, ํŠน์ • ๊ฒฝ๋กœ์— ๋Œ€ํ•œ ์š”์ฒญ ๋นˆ๋„ ์ œํ•œ ์„ค์ •์„ ํ†ตํ•ด API ๋‚จ์šฉ ๋ฐฉ์ง€
  6. Cloudflare Workers (์„œ๋ฒ„๋ฆฌ์Šค ์‹คํ–‰ ํ™˜๊ฒฝ)
    • JavaScript/TypeScript ๋Ÿฐํƒ€์ž„์„ ์—ฃ์ง€์—์„œ ์‹คํ–‰ํ•ด, ์‚ฌ์šฉ์ž์˜ ์ง€๋ฆฌ์  ์œ„์น˜์— ๊ฐ€์žฅ ๊ฐ€๊นŒ์šด ๊ณณ์—์„œ ๋งž์ถคํ˜• ๋กœ์ง ์ˆ˜ํ–‰
  7. Argo Smart Routing & Load Balancing
    • ์ตœ์  ๊ฒฝ๋กœ ๊ธฐ๋ฐ˜ ํŠธ๋ž˜ํ”ฝ ๋ผ์šฐํŒ…์œผ๋กœ ์ง€์—ฐ ์‹œ๊ฐ„ ์ตœ์†Œํ™”, ๊ธ€๋กœ๋ฒŒ ๋กœ๋“œ ๋ฐธ๋Ÿฐ์‹ฑ•ํ—ฌ์Šค์ฒดํฌ๋กœ ๊ณ ๊ฐ€์šฉ์„ฑ ๋ณด์žฅ
  8. Zero Trust Security & SASE
    • Zero Trust ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ ์ œ์–ด(ZTNA), Secure Web Gateway, CASB ๋“ฑ์œผ๋กœ ๋‚ด๋ถ€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์‚ฌ์šฉ์ž ์ ‘์†์„ ์•ˆ์ „ํ•˜๊ฒŒ ๊ด€๋ฆฌ

 

 

๊ฐ ๊ธฐ๋Šฅ์„ ์ ์ ˆํžˆ ์กฐํ•ฉํ•˜์—ฌ ์›น์‚ฌ์ดํŠธ์˜ ๋ณด์•ˆ์„ ๊ฐ•ํ™”ํ•˜๊ณ  ์„ฑ๋Šฅ์„ ์ตœ์ ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ํŠน์ • ์š”๊ตฌ์‚ฌํ•ญ๊ณผ ์ธํ”„๋ผ์— ๋งž๊ฒŒ Cloudflare ์„ค์ •์„ ์กฐ์ •ํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค.

 

Cloudflare ์ฐธ๊ณ  ์‚ฌ์ดํŠธ : https://developers.cloudflare.com/reference-architecture/architectures/security/

 

Cloudflare Security Architecture

This document provides insight into how this network and platform are architected from a security perspective, how they are operated, and what services are available for businesses to address their own security challenges.

developers.cloudflare.com

 

 

3. ์˜๋ฌธ ์‚ฌํ•ญ

Q. Cloudflare์˜ ์—ฃ์ง€ ๋„คํŠธ์›Œํฌ๋Š” ๊ธฐ์กด์— ํฉ์–ด์ ธ ์žˆ๋Š” ๋‹ค๋ฅธ ์‚ฌ์—…์ž์˜ ์ธํ”„๋ผ๋ฅผ ๋‹จ์ˆœํžˆ ํ†ตํ•ฉํ•œ ๊ฒƒ์ธ๊ฐ€์š”?

A. Cloudflare๊ฐ€ ์ง์ ‘ ์ „ ์„ธ๊ณ„ ๊ฐ ๋„์‹œ์— PoP(Point of Presence, ์ ‘์† ์ง€์ )๋ฅผ ๊ตฌ์ถ•ํ•˜๊ณ  ์šด์˜ํ•˜๋Š” ๋…์ž์  ๊ธ€๋กœ๋ฒŒ ๋ถ„์‚ฐ ๋„คํŠธ์›Œํฌ์ž…๋‹ˆ๋‹ค.

 

 

 

์šฉ์–ด ์ •๋ฆฌ

*์—ฃ์ง€ ๋„คํŠธ์›Œํฌ : ๋ณดํ†ต ํด๋ผ์šฐ๋“œ ์ œ๊ณต์ž์˜ ์ „์„ธ๊ณ„์— ๋ถ„์‚ฐ๋œ PoP(Point of Presence, ์ ‘์† ์ง€์ ) ๋˜๋Š” ์—ฃ์ง€ ์„œ๋ฒ„(edge server) ์ง‘ํ•ฉ์„ ๊ฐ€๋ฆฌํ‚ต๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ์š”์ฒญ์„ ๋ณธ์‚ฌ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๊นŒ์ง€ ๋ณด๋‚ด์ง€ ์•Š๊ณ , ์‚ฌ์šฉ์ž์™€ ๋ฌผ๋ฆฌ์ ์œผ๋กœ ๊ฐ€๊นŒ์šด ์—ฃ์ง€ ์„œ๋ฒ„์—์„œ ์ฒ˜๋ฆฌํ•จ์œผ๋กœ์จ ์ง€์—ฐ์„ ์ค„์ด๊ณ , ํŠธ๋ž˜ํ”ฝ์„ ์ตœ์ ํ™”ํ•˜๋ฉฐ, ๋ณด์•ˆ ๊ธฐ๋Šฅ์„ ์‹คํ–‰ํ•œ๋‹ค.

๋Œ“๊ธ€