Study Guide Flashcards
Why do customers move to AWS?
Customers move to AWS to increase agility.
- Accelerate time to market – By spending less time acquiring and managing infrastructure, you can focus on developing features that deliver value to your customers.
- Increase innovation – You can speed up your digital transformation by using AWS, which provides tools to more easily access the latest technologies and best practices. For example, you can use AWS to develop automations, adopt containerization, and use machine learning.
- Scale seamlessly – You can provision additional resources to support new features and scale existing resources up or down to match demand.
Customers also move to AWS to reduce complexity and risk.
- Optimize costs – You can reduce costs by paying for only what you use. Instead of paying for on-premises hardware, which you might not use at full capacity, you can pay for compute resources only while you’re using them.
- Minimize security vulnerabilities – Moving to AWS puts your applications and data behind the advanced physical security of the AWS data centers. With AWS, you have many tools to manage access to your resources.
- Reduce management complexity – Using AWS services can reduce the need to maintain physical data centers, perform hardware maintenance, and manage physical infrastructure.
What are key test concerns for Lambda?
Lambda is lightest workload; but has limitations as it can’t run more than 15 minutes or 10 Gigs; If Lambda is in the answer, then check the question for any time limitations
A group of one or more data centers is called _________?
an Availability Zone.
An Availability Zone is one or more discrete data centers with redundant power, networking, and connectivity in an AWS Region.
What 4 factors do you use to determine the right Region for your services, applications, and data?
Governance and legal requirements – Consider any legal requirements based on data governance, sovereignty, or privacy laws.
Latency – Close proximity to customers means better performance.
Service availability – Not all AWS services are available in all Regions.
Cost – Different Regions have different costs. Research the pricing for the services that you plan to use and compare costs to make the best decision for your workloads.
When should you consider using Local Zones?
You can use AWS Local Zones for highly demanding applications that require single-digit millisecond latency to end users. Examples include:
Media and entertainment content creation – Includes live production, video editing, and graphics-intensive virtual workstations for artists in geographic proximity
Real-time multiplayer gaming – Includes real-time multiplayer game sessions, to maintain a reliable gameplay experience
Machine learning hosting and training – For high-performance, low latency inferencing
Augmented reality (AR) and virtual reality (VR) – Includes immersive entertainment, data driven insights, and engaging virtual training experiences
NOTE: exam, if low latency is the driver, then local zone might be the best option; deploying subnets close to resources
What are edge locations used for?
Edge locations are in major cities around the world. They receive requests and cache copies of your content for faster delivery.
To deliver content to end users with lower latency, you use a global network of edge locations that support AWS services. CloudFront delivers customer content through a worldwide network of point of presence (PoP) locations, which consists of edge locations and Regional edge cache servers.
Regional edge caches, used by default with CloudFront, are used when you have content that is not accessed frequently enough to remain in an edge location. Regional edge caches absorb this content and provide an alternative to the need to retrieve that content from the origin server.
exam – also edge locations are associated with caching while local zones have some storage, compute, db, etc.; improves performance… such as caching content
One common use for edge locations is to ___________________.
serve content closer to your customers
exam – any question mentioning caching implies edge location; watch for keywords on the exam!!! use local for low latency/millisecond access
The ______________ helps cloud architects build secure, high-performing, resilient, and efficient application infrastructures.
AWS Well-Architected Framework
With the tool, you can gather data and get recommendations to:
* Minimize system failures and operational costs.
* Dive deep into business and infrastructure processes.
* Provide best practice guidance.
* Deliver on the cloud computing value proposition.
What are the 6 well architected framework pillars?
- Security – Use AWS security best practices to build policies and processes to protect data and assets. Allow auditing and traceability. Monitor, alert, and audit actions and changes to your environment in real time.
- Cost optimization – Achieve cost efficiency while considering fluctuating resource needs.
- Reliability – Meet well-defined operational thresholds for applications. This includes support to recover from failures, handling increased demand, and mitigating disruption.
- Performance efficiency – Deliver efficient performance for a set of resources like instances, storage, databases, space, and time.
- Operational excellence – Run and monitor systems that deliver business value. Continually improve supporting processes and procedures.
- Sustainability – Minimize and understand your environmental impact when running cloud workload
As a best practice, what should you require for your root user?
- multi-factor authentication (MFA)
- set up an admin user that you normally use
___________ is a web service that helps you securely control access to AWS resources.
And what is it used for?
AWS Identity and Access Management (IAM)
Use IAM to control who is authenticated (signed in) and authorized (has permissions)
exam - IAM users sign in with credentials and permissions… not email(?)
A ___________ is an entity that can request an action or operation on an AWS resource
principal
Exam: users & principals don’t have any privileges by default; also, best to grant permissions to groups and assign users to groups; IAM roles for short lived needs
Exam - if you see “temporary permissions” then it’s a ROLE
Exam- set up users for “long term” needs
With IAM, Each user has their own ___________.
credentials
NOTE: by default, no access until granted
Programmatic access gives your IAM user the credentials to make API calls in the AWS CLI or AWS SDKs. AWS provides an SDK for programming languages such as Java, Python, and .NET.
When programmatic access is granted to your IAM user, it creates _______________________ ?
a unique key pair that comprises an access key ID and a secret access key. Use your key pair to configure the AWS CLI, or make API calls through an AWS SDK.
An IAM _____________ is a collection of IAM users.
An IAM user group
NOTE: minimizes admin load; cumulative effect with privileges: A user can be a member of more than one user group. Example, Richard is a member of the Analysts group and the Billing group. Richard gets permissions from both IAM user groups.
IAM _________ deliver temporary AWS credentials.
roles; Use roles to delegate access to users, applications, or services that don’t normally have access to your AWS resources.
Exam - Roles are temporary; when a user assumes a role, they only have the permissions that are granted to the role and do not follow their group’s inherited permissions.
What is used to give roles access to resources?
IAM Policy assignments
_______ are attached to an identity or resource to define its permissions. AWS evaluates these when a principal, such as a user, makes a request.
policies
What are the 4 security policy types?
Policy types
* Identity-based policies – Attach managed and inline policies to IAM identities. These identities include users, groups to which users belong, and roles.
* Resource-based policies – Attach inline policies to resources. The most common examples of resource-based policies are Amazon S3 bucket policies and IAM role trust policies.
* AWS Organizations service control policies (SCPs) – Use Organizations SCPs to define the maximum permissions for account members of an organization or organizational unit (OU).
* IAM permissions boundaries – AWS supports permissions boundaries for IAM entities (users or roles). Use IAM permissions boundaries to set the maximum permissions that an IAM entity can receive
Exam - know the difference … resources refers to AWS service policies; permissions boundaries are guardrails; don’t have permissions to SCPs; to give access you Grant permissions (IAM identity-based policy & IAM resource-based policy); you set maximum permissions through IAM permission boundaries and AWS org service control policies (SCPs)
_____________ policies are JSON permissions policy documents that control:
* Which actions an IAM identity (users, groups of users, and roles) can perform
* On which resources they can perform these actions
* Under what conditions they can perform these actions
Identity-based
Exam: know permission boundaries; know roles are for valid short live credentials; have 2 options: identity & resources
When granting permissions:
- Identity-based policies are assigned to users, groups, and roles.
- Resource-based policies are assigned to resources.
NOTE:
* Resource-based policies are checked when someone tries to access the resource.
Given the following Identity-based policy example, what access would you have?
you can attach the example policy statement to your IAM user
Exam - Policy “EAR” to remember, Effect-Action-Resource … know the resource can be a bucket or ???… know how to recognize the EAR from JSON for the exam but don’t need to write JSON
Then, that user is allowed to stop and start EC2 instances in your account if the condition is met. Here, the EC2 instances that your IAM user can control must have a tag with key Owner and value equal to the IAM user name.
In the Resource element, the policy lists an Amazon Resource Name (ARN) with a wildcard (asterisk) character. Wildcards are used to apply a policy element to more than one resource or action. This policy applies for resources in any account number and Region with any resource ID. It can be reused in multiple accounts without having to rewrite the policy with your AWS account ID.
How are IAM policies evaluated?
AWS evaluates all policies that are applicable to the request context. The following list summarizes the AWS evaluation logic for policies within a single account:
* By default, all requests are implicitly denied with the exception of the AWS account root user, which has full access. This policy is called an implicit deny.
* An explicit allow in an identity-based policy or resource-based policy overrides this default. There are additional security controls that can override an explicit allow with an implicit deny, such as permissions boundaries and SCPs.
* An explicit deny in any policy overrides any allows
___________ is a strategy that is focused on creating multiple layers of security.
Defense in depth
Apply a defense-in-depth approach with multiple security controls to all layers.