FINAL FOCUS Flashcards
What are the pillars of the Well-Architected Framework
Operational Excellence
Performance Efficiency
Security
Reliability
Fault Tolerant
Performance Efficiency Pillar
Democratize advanced technologies
Go global in minutes
Use serverless architectures
Experiment more often
Consider mechanical sympathy
Operational Excellence Pillar
Perform operations as code
Make frequent, small, reversible changes
Refine operations procedures frequently
Anticipate failure
Learn from all operational failures
Private Key
the part of a key pair (a private key and a public key) that is stored locally (on your computer)
a security credential you use to prove your identity (authenticate) when connecting to an instance
AWS Command Line Interface (CLI)
A unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.
AWS SDKs
libraries and sample code templates for various programming languages and platforms (for example, Java, Ruby, .NET, iOS, and Android)
create programmatic access to IAM and AWS services. For example, they take care of tasks such as cryptographically signing requests, managing errors, and retrying requests automatically.
SaaS
a complete application to use on demand. Ex: When you access your personal email through a web browser
FaaS
allows you to execute code in response to events.
IaaS
the building blocks that can be rented to create a product. Ex: When you pay a web hosting fee or using CloudWatch
PaaS
is often used by developers to develop software using web-based tools.
Security Pillar
*Implement a strong identity foundation
* Maintain traceability
* Apply security at all layers
* Automate security best practices
* Protect data in transit and at rest
* Keep people away from data
* Prepare for security events
Reliability Pillar
- Automatically recover from failure
- Test recovery procedures
- Scale horizontally to increase aggregate workload availability
- stop guessing capacity
- Manage change through automation
authentication
who is accessing = entities (users & roles) are the IAM resource objects