AWS Technical Essentials Flashcards
Each AWS Region is associated with
a geographical name
and a Region code.
AWS has planned for many events through
redundancy (data centers with redundant power, networking and high speed and low latency links )
This cluster of data centers is called an
Availability Zone
AWS Region
clusters AZs together and also connects them with redundant high speed and low latency links
four aspects you need to consider when deciding which AWS Region to use
compliance
latency
price
service availability.
are used to cache content closer to end users, thus reducing latency.
Edge locations and regional edge caches
When you decide which AWS Region to host your applications and workloads, consider: latency
If your application is sensitive to latency (the delay between a request for data and the response), choose a Region that is close to your user base
When you decide which AWS Region to host your applications and workloads, consider: price
Due to the local economy and the physical nature of operating data centers, prices vary from one Region to another. Internet connectivity, imported equipment costs, customs, real estate, and other factors impact a Region’s pricing
When you decide which AWS Region to host your applications and workloads, consider: service availability
Some services might not be available in some Regions.
When you decide which AWS Region to host your applications and workloads, consider: compliance
Enterprise companies often must comply with regulations that require customer data to be stored in a specific geographic territory.
When you operate a Region-scoped service,
you only need to select the Region that you want to use.
If you are not asked to specify an individual Availability Zone to deploy the service in, this is an indicator that the service
operates on a Region-scope level
For Region-scoped services, AWS automatically performs actions to
increase data durability and availability.
some services ask you to specify an Availability Zone
You are often responsible for increasing the data durability and high availability of these resources.
When Region-scoped, managed services are not available
make sure your workload is replicated across multiple Availability Zones. At a minimum, you should use two
Every action that you make in AWS is
an API call that is authenticated and authorized
The AWS root user has two sets of credentials associated with it
- the email address and password that were used to create the account
- access keys, which allow you to make programmatic requests from the AWS CLI or AWS API.
Access keys consist of two parts:
Access key ID
Secret access key
best practices for root user
Choose a strong password for the root user.
Enable multi-factor authentication (MFA) for the root user.
Never share your root user password or access keys with anyone.
Disable or delete the access keys associated with the root user.
Create an Identity and Access Management (IAM) user for administrative tasks or everyday tasks.
AWS MFA mechanisms
Virtual MFA
Hardware TOTP token
FIDO security keys
require that people have a valid credential
access management
AM would not be responsible for
application-level access management.