AWS Services Flashcards

1
Q

AWS CloudTrail

A

Where- Source IP Address
When- EventTime
Who- User, UserAgent
What- Region, Resource, Action
Detect devloper misconfigurations, malicious actors, automate responses.

Logs all API calls (SDK, CLI) between AWS Services. E.g: who created the bucket? Who deployed that EC2 instance?

With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides Event History (for last 90 days) of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services.
For more than 90 days -> create a Trail
enables governance, compliance, operational auditing, and risk auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS Config

A

AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, change management, and operational troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amazon Inspector

A

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.

Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Examples of built-in rules include checking for access to your EC2 instances from the internet, remote root login being enabled, or vulnerable software versions installed. These rules are regularly updated by AWS security researchers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS Trusted Advisor

A

AWS Trusted Advisor is an online tool that provides you with real-time guidance to help you provision your resources following AWS best practices.

Cost optimization, Performance, Security, Fault Tolerance, Service Quotas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amazon CloudWatch

A

It is a monitoring and observability service built for DevOps engineers, developers, site reliability engineers (SREs), IT managers, and product owners. CloudWatch provides you with data and actionable insights to monitor your applications, respond to system-wide performance changes, and optimize resource utilization. CloudWatch collects monitoring and operational data in the form of logs, metrics, and events. You get a unified view of operational health and gain complete visibility of your AWS resources, applications, and services running on AWS and on-premises. You can use CloudWatch to detect anomalous behaviour in your environments, set alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to keep your applications running smoothly.
- collect and store application logs and server operation system logs.
- use CloudTrail to capture API activities and send them to CloudWatch Logs.
- log Route 53 DNS queries into CloudWatch Logs.
- use CloudWatch Logs to retain and archive log data in S3.
- use CloudWatch Logs Insights to interactively search and analyze your log data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Amazon GuardDuty

A

Amazon GuardDuty is an automated threat detection service that continuously monitors for malicious or unauthorized behaviour to help you protect your AWS accounts and resources.
Uses ML to analyze CloudTrail, VPC Flow & DNS Logs. Uses anomaly detection and integrated threat intelligence to identify and prioritize potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GuardDuty: LOW severity level 3.9 - 1.0

A

A low severity level indicates suspicious
or malicious activity that was blocked
before it compromised your resource.

No immediate recommended action, but it is worth making note of this information as it may indicate someone is looking for weak points in your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GuarDuty: MEDIUM severity level 6.9 - 4.0

A

A medium severity level indicates suspicious activity that deviates from normally observed behavior and, depending on your use case, may be indicative of a resource compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GuardDuty: HIGH severity level 8.9 - 7.0

A

A high severity level indicates that the resource
in question is compromised and is being actively used for unauthorized purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS CloudFront

A

Content Delivery Network (CDN).
It is a web service that speeds up the distribution of your static and dynamic web content, such as .html, .css, .js, and image files, to your users. CloudFront delivers your content through a worldwide network of data centers called edge locations.
When a user requests content that you’re serving with CloudFront, the request is routed to the edge location that provides the lowest latency (time delay), so that content is delivered with the best possible performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS S3 Transfer Acceleration

A

allows you to generate a URL that can be used by end users to upload files to a nearby edge location.
Now the file can move much faster through the AWS Global Network to the S3 bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Global Accelerator

A

AWS Global Accelerator is a networking service that improves the performance of your users’ traffic by up to 60% using Amazon Web Services’ global network infrastructure. When the internet is congested, AWS Global Accelerator optimizes the path to your application to keep packet loss, jitter, and latency consistently low. It can find the optimal path from the end user to your web servers.
It is deployed within Edge Locations so you send user traffic directly to an Edge Location instead of directly to your web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS ECS Fargate [Computing: Containers]

A

serverless orchestration container service.
AWS Fargate is a technology that you can use with Amazon ECS to run containers without having to manage servers or clusters of Amazon EC2 instances. With Fargate, you no longer have to provision, configure, or scale clusters of virtual machines to run containers. This removes the need to choose server types, decide when to scale your clusters, or optimize cluster packing.
compatible with both Amazon ECS and Amazon EKS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Amazon ECR [Computing]

A

ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere.
Amazon ECR supports private repositories with resource-based permissions using AWS IAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECS [Computing: ]

A

container orchestration service that supports Docker containers. Launches a cluster of servers of EC2 instances w/ Docker installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EKS - Elastic Kubernetes Service [Computing: Containers]

A

a fully managed Kubernetes (K8) service. K8 is an open-source orchestration software that was created by Google and is generally the standard for managing microservices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Amazon Lightsail [Computing: Virtual Machines]

A

is the managed virtual server service. (friendly version of EC2)
lt offers easy-to-use virtual private server (VPS) instances, containers, storage, databases, and more at a cost-effective monthly price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AWS Lambda [Computing]

A

serverless function service. Can run code without provisioning or managing servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AWS Outposts

A

physical rack of servers that can be put in your data center. Allows using AWS API & services such as EC2 right in your data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AWS Wavelength

A

allows to build & launch your application in a telecom datacenter. Ultra-low latency.

20
Q

VMWare Cloud on AWS

A

manage on-premise virtual machines as EC2 instances using VMWare.

21
Q

AWS Local Zones

A

edge datacenters located outside of an AWS region - use AWS closer to the end user destination.

22
Q

Amazon Macie

A

data security service that continuously monitors S3 data access activity
for anomalies, and generates detailed alerts on detecting any risk of unauthorized access or inadvertent data leaks. Uses ML.

23
Q

AWS Shield

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced.

24
Q

Amazon Macie Alerts

A

Anonymized Access, Config Compliance, Credential Loss, Data Compliance, File Hosting, Identity Enumeration, Information Loss, Location Anomaly, Open Permissions, Privilege Escalation, Ransomware, Service Disruption, Suspicious Access

25
Q

AWS VPN

A

establish a secure and private tunnel from your network or device to the AWS global network.
1) AWS Site-to-Site VPN 2) AWS Client VPN

26
Q

AWS WAF

A

protects your web applications from common web exploits. AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules.
E.g.: create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.

27
Q

AWS KMS

A

create & control encryption keys.
Multi-tenant HSM. FIPS 140-2 Level 2.
uses Envelope Encryption.

28
Q

AWS CloudHSM

A

service that automates provisioning, software patching, high availability & backups.
FIPS 140-2 Level 3 validated hardware.
Integrate w/ PKCS#11, JCE - Java Cryptography Extensions, Microsoft CryptoNG (CNG) libraries

29
Q

AWS License Manager

A
30
Q

AWS X-Ray

A

a distributed tracing system. to pinpoint issues with your microservices.
See how data moves from one app to another, how long it took to move, and if it failed to move forward.

31
Q

CloudWatch Alarms

A

monitors a CloudWatch Metric based on a defined threshold.

32
Q

CloudWatch Logs - Log Streams

A

A log stream is a sequence of events from an application or instance being monitored.
Lambda, RDS, EC2, Glue

33
Q

CloudWatch Logs - Log Events

A

Represents a single event in a log file.
Log Events can be seen within a Log Stream.

34
Q

CloudWatch Logs - Log Insights

A
35
Q

CloudWatch Metrics

A

time ordered set of data points.
It’s a variable monitored over time.

36
Q

Amazon RDS

A
37
Q

Amazon DynamoDB

A

is a key-value and document database that delivers single-digit millisecond performance at any scale. fully managed, multiregion, multimaster database with built-in security, backup and restore, and in-memory caching for internet-scale applications. DynamoDB can handle more than 10 trillion requests per day and can support peaks of more than 20 million requests per second.

38
Q

Amazon Timestream

A

a fast, scalable, fully managed time series database service for IoT and operational applications that makes it easy to store and analyze trillions of events per day at 1/10th the cost of relational databases.

39
Q

Amazon Quantum Ledger Database (QLDB)

A

a fully managed ledger database that provides a transparent, immutable, and cryptographically verifiable transaction log ‎owned by a central trusted authority. Amazon QLDB tracks each and every application data change and maintains a complete and verifiable history of changes over time.

40
Q

EBS - Elastic Block Store

A

(EBS) is an easy to use, high performance block storage service designed for use with Amazon Elastic Compute Cloud (EC2) for both throughput and transaction intensive workloads at any scale. A broad range of workloads, such as relational and non-relational databases, enterprise applications, containerized applications, big data analytics engines, file systems, and media workflows are widely deployed on Amazon EBS.

41
Q

Amazon EFS - Elastic File System

A

EFS) provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources. Amazon EFS is well suited to support a broad spectrum of use cases from highly parallelized, scale-out workloads that require the highest possible throughput to single-threaded, latency-sensitive workloads. Use cases such as lift-and-shift enterprise applications, big data analytics, web serving and content management, application development and testing, media and entertainment workflows, database backups, and container storage.

42
Q

Amazon Redshift

A

extends data warehouse queries to your data lake, with no loading required. You can run analytic queries against petabytes of data stored locally in Redshift, and directly against exabytes of data stored in Amazon S3.
It is simple to set up, automates most of your administrative tasks, and delivers fast performance at any scale.

43
Q

Amazon Athena

A

an interactive query service to analyze data in Amazon S3 using standard SQL. Athena is serverless, so there is no infrastructure to manage, and you pay only for the queries that you run.

44
Q

Amazon Simple Storage Service - S3

A

an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics.

45
Q

Amazon S3 Glacier

A

Amazon S3 Glacier is a secure, durable, and extremely low-cost cloud storage service for data archiving and long-term backup. It is designed to deliver 99.999999999% durability, and provides comprehensive security and compliance capabilities that can help meet even the most stringent regulatory requirements.

46
Q

AWS Snowball

A

a petabyte-scale data transport solution that uses devices designed to be secure to transfer large amounts of data into and out of the AWS Cloud. Snowball devices use tamper-resistant enclosures, 256-bit encryption, and an industry-standard Trusted Platform Module (TPM) designed to ensure both security and full chain-of-custody for your data.
1 peta = 1,024 terabytes (TB)

47
Q

AWS Snowmobile

A

an Exabyte-scale data transfer service used to move extremely large amounts of data to AWS. You can transfer up to 100PB per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including video libraries, image repositories, or even a complete data center migration.
1EB = 1024PB

48
Q

Amazon API Gateway

A

Amazon API Gateway is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. With a few clicks in the AWS Management Console, you can create REST and WebSocket APIs that act as a “front door” for applications to access data, business logic, or functionality from your backend services, such as workloads running on Amazon Elastic Compute Cloud (Amazon EC2), code running on AWS Lambda, any web application, or real-time communication applications.