AWS Cloud Overview, IAM, & AWS CLI Flashcards
AWS Region
cluster of data centers
💡 TIP: Most AWS services are region-scoped
How to choose an AWS Region?
- 🔐 Compliance with data governance & legal requirements: data never leaves a region without your explicit permission
- 📍 Proximity to customers: reduced latency
- ✅ Available services within a Region: new services & features are NOT available in every region
- 💰 Pricing: priving varies region to region & transparent on service pricing page
AWS Availability Zone (AZ)
one or more discrete data centers with redundant power, networking, & connectivity
usually 3, min is 3, max is 6
What are some benefits of Availability Zones (AZs)?
- AZs are separate from each others, so that they’re isolated from disasters
- AZs are connected with high bandwidth, ultra-low latency networking
AWS Points of Presence (Edge Locations)
content is delivered to end users with lower latency
Amazon has 400+ Points of Presence in 90+ cities across 40+ countries
IAM
Identity & Access Management;
Global service
Root account
created by default;
should NOT be used or shared
IAM User
IAM Identity to represent people within your organization;
can be grouped
IAM User Group
group of IAM users;
only contain users, NOT other groups
users don’t have to belong to group & user can belong to multiple groups
IAM Policy
JSON documents that define a set of permissions for making requests to AWS services and can be used by IAM Users, User Groups, & IAM Roles
💡 TIP: Apply the least privilege principle
IAM Policy Structure
- Version: policy language version, always include “2012-10-17”
- Id: identifier for the policy (optional)
- Statement: one or more individual statements
IAM Policy Statement Structure
- Sid: identifier for the statement (optional)
- Effect: whether the statement allows or denies access (i.e. Allow, Deny)
- Principal: account/user/role to which this policy applied to
- Action: list of actions this policy allows or denies (i.e. s3:GetObject)
- Resource: list of resources to which the actions applied to
- Condition: conditions for when this policy is in effect (optional)
AWS Managed Policy
standalone policy that is created and adminstered by AWS
(i.e. IAMReadOnlyAccess)
Inline Policy
policy created for a single IAM identity (a user, group, or role)
💡 TIP: If a policy could apply to more than one entity, it’s better to use. a managed policy
Multi Factor Authentication (MFA)
password you know + security device you own
✨ Best Practice: Root Accounts & IAM users (at a minimum) should be protected with MFA