AWS Cloud Technical Essentials Flashcards
It is the on-demand delivery of IT resources over the internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider.
Cloud Computing
What are the 6 benefits of Cloud Computing?
- Pay as you go (Elasticity)
- Benefit from massive economies of scale (Cost Savings)
- Stop guessing capacity (Elasticity)
- Increase speed and agility (Agility)
- Stop sending money running and maintaining data centers (Cost Savings)
- Go global in minutes
What are the types of Cloud Computing?
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
It contains the basic building blocks for cloud IT. It typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space. IaaS gives you the highest level of flexibility and management control over your IT resources. It is most similar to the existing IT resources with which many IT departments and developers are familiar.
IaaS
It removes the need for you to manage underlying infrastructure (usually hardware and operating systems), and allows you to focus on the deployment and management of your applications. This helps you be more efficient as you don’t need to worry about resource procurement, capacity planning, software maintenance, patching, or any of the other undifferentiated heavy lifting involved in running your application.
PaaS
It provides you with a complete product that is run and managed by the service provider. In most cases, people referring to SaaS are referring to end-user applications (such as web-based email). With a SaaS offering, you don’t have to think about how the service is maintained or how the underlying infrastructure is managed. You only need to think about how you will use that particular software.
SaaS
What are the types of Cloud Computing?
- Cloud
- Hybrid
- On-premises
What are clusters of Data Centers?
Availability Zone or AZ
An AZ consists of one or more data centers with redundant power, networking, and connectivity. These data centers operate in discrete facilities with undisclosed locations. They are connected using redundant high-speed and low-latency links.
If you see that a resource exists in us-east-1c, you know this resource is located in AZ c of the us-east-1 Region.
What are clusters of AZs called?
Region
What are the four aspects of choosing a Region?
- Compliance - Enterprise companies often need to comply with regulations that require customer data to be stored in a specific geographic territory.
- Latency - IT resources have to be close to your user base
- Price - Prices may vary per region due to local economy and physical nature of operating data centers
- Service Availability - Not all services are available in every region
It consists of Edge locations and regional Edge caches. These are used to cache content closer to end users, thus reducing latency.
Global Edge Network
You can use services like Amazon CloudFront to cache content using the Edge locations.
These are geographic locations worldwide where AWS hosts its data centers. AWS Regions are named after the location where they reside.
Regions
Where is the AWS Cloud Infrastructure built around?
AWS Regions and Availability Zones
It is the URL of the entry point for an AWS web service.
AWS Service Endpoint
What are the types of AWS Service Endpoints?
- Regional
- Global
- Federal Information Processing Standard (FIPS) - FIPS endpoints use a TLS software library that complies with FIPS 140-2. These endpoints might be required by enterprises that interact with the United States government. With FIPS endpoints, the minimum requirement is TLS 1.2. Recommended is TLS 1.3.
- Dual Stack - These endpoints can be accessed using either IPv4 or IPv6 requests.
What does API stand for?
Application Program Interface
How to make API calls in AWS or how do you connect to AWS?
- AWS Management Console - This is a web-based method that you log into from your browser.
- AWS Command Line Interface (CLI)
- AWS Software Development Kits (SDK)
Who is responsible for the security in AWS Cloud?
This is a shared responsibility between AWS and the customer.
What part of the Shared Responsibility Model is AWS responsible for?
AWS is responsible for security of the cloud. This means AWS is required to protect and secure the infrastructure that runs all the services offered in the AWS Cloud. AWS is responsible for:
- Protecting and securing AWS Regions, Availability Zones, and data centers, down to the physical security of the buildings
- Managing the hardware, software, and networking components that run AWS services, such as the physical server, host operating systems, virtualization layers, and AWS networking components
Provide the 3 categories of AWS Services.
- Infrastructure Services - Compute services, such as Amazon Elastic Compute Cloud (Amazon EC2
- Container Services - Services that require less management from the customer, such as Amazon Relational Database Service (Amazon RDS). Container services refer to AWS abstracting application containers behind the scenes, not Docker container services. This enables AWS to move the responsibility of managing that platform away from customers.
- Abstracted Services - Services that require very little management from the customer, such as Amazon Simple Storage Service (Amazon S3)
What part of the Shared Responsibility Model is the customer responsible for?
You’re responsible for security in the cloud. When using any AWS service, you’re responsible for properly configuring the service and your applications, as well as ensuring your data is secure.The level of responsibility you have depends on the AWS service. Some services require you to perform all the necessary security configuration and management tasks, while other more abstracted services require you to only manage the data and control access to your resources.
Who is responsible for Hardware or AWS Global Infrastructure?
AWS
Who is responsible for Regions, AZs, and Edge Locations?
AWS
Who is responsible for the infrastructure in various software components that run AWS services?
AWS
Who is responsible for compute databases, storage, and networking?
AWS
Who is responsible for securing services from the host operating system up through the virtualization layer?
AWS
Who manages the physical host the VM is placed on as well as everything through the hypervisor level?
AWS
Who is responsible for patching the host operating system and the hypervisor?
AWS
Who is responsible for the underlying hardware up through the virtualization layer?
AWS
Who is responsible for the security in the Cloud?
Customer
Who is responsible for patching the operating systems of the customers’ VMs?
Customer
Who is responsible for the security of the base layer in the Cloud?
AWS
Who is responsible for encrypting the data in transit and at rest?
Customer
Who is responsible for configuring firewalls in the Cloud?
Customer
Who is responsible for defining user access?
Customer
Who owns the customer’s data in AWS?
Customer
Does the Shared Responsibility Model vary from service to service?
Yes
Who is responsible for Platform, applications, identity and access management?
Customer
Who is responsible for the security of the Cloud?
AWS
Who is responsible for protecting and securing AWS Regions, Availability Zones, and data centers, down to the physical security of the buildings?
AWS
Who is responsible for managing the hardware, software, and networking components that run AWS services, such as the physical server, host operating systems, virtualization layers, and AWS networking components
AWS
Who is responsible for managing the underlying infrastructure and foundation services?
AWS
Who is responsible for managing the underlying infrastructure and foundation services, operating system, and application platform?
AWS
Who is responsible for operating the infrastructure layer, operating system, and platforms, as well as server-side encryption and data protection?
AWS
Who is responsible for controlling the operating system and application platform, as well as encrypting, protecting, and managing customer data?
Customer
Who is responsible for customer data, encrypting that data, and protecting it through network firewalls and backups?
Customer
Who is responsible for managing customer data and protecting it through client-side encryption?
Customer
Who is responsible for choosing a Region for AWS resources in accordance with data sovereignty regulations?
Customer
Who is responsible for implementing data protection mechanisms, such as encryption and managing backups?
Customer
Who is responsible for using access control to limit who has access to your data and AWS resources?
Customer
Who is responsible for patching and fixing flaws within the infrastructure?
AWS
Who is responsible for patching their guest OS and applications?
Customer
Who is responsible for maintaining the configuration of its infrastructure devices?
AWS
Who is responsible for configuring the guest operating systems, databases, and applications?
Customer
What are the things to remember when creating a root user account?
- Use Multi-factor Authentication (MFA)
- Do not use the root user for everyday tasks, even the administrative ones.
What is the process of giving users permission to access AWS resources and services?
Authorization
What is the process of verifying the user’s identity?
Authentication
What is a single sign-in identity that has complete access to all AWS services and resources in the account?
AWS Root User
What are the two sets of credentials associated with an AWS Root User?
- Email address and Password
- Access keys
What are the two parts of an Access Key?
- Access Key ID
- Secret Access Key