AWSS Flashcards
Dividing resources among regions allows you to do the following.
- Locate your infrastructure geographically closer to your users to allow access with lower possible latency.
- Meet regulatory compliance with legal and banking rules.
- Isolate groups of resources from each other and from larger networks to allow the greatest possible security.
Some AWS resources are not visibly tied to any one region. Here are examples of Global Services.
- AWS Identity & Access Management (IAM)
- Amazon CloudFront
- S3
The service for managing the way access to your account resources is achieved by way of users and groups, roles and policies.
AWS Identity and Access Management (IAM)
The content delivery network you can use to lower access latency for your application users by storing cached versions of frequently requested data at AWS edge locations.
CloudFront
The block of IP addresses assigned for use within a single availability Zone.
Subnet. Private networks - typically use IPv4 protocol. Have have up to 200 subnets per AZ.
One or more independently powered data centers running a wide range of hardware host types.
Availability Zone (AZ)
A resource running without a back up.
Single Point of Failure
Provisioning two or more instances of whatever your workload requires rather than just one. The only effective protection against failures.
Redundancy
What is used to prevent application failure.
Autoscaling and Load Balancing.
A site where AWS deploys physical server infrastructure to provide low latency user access to Amazon-based data. Front line resource for directing the kind of network traffic that can most benefit from speed.
Edge Location
Best Known tenant of edge locations.
CloudFront
Amazon’s Domain Name System (DNS) administration tool for managing domain name registration and traffic routing
Amazon Route 53
A manage service for countering the threat of distributed denial of service (DDoS) attacks against your AWS-based infrastructure.
AWS Shield
A managed service for protecting web applications from web-based threats.
AWS Web Application Firewall (WAF)
A tool designed to use the serverless power that customize CloudFront behavior,
Lambda@Edge
Handle less popular content. Currently 9 worldwide
Regional Edge Cache
AWS Shared Responsibility Model
AWS Responsible for: The security of the cloud & patching underlying virtualization software running in AWS data centers.
You: Security of what’s in the cloud and patching OSs running on EC2 instances
Hides all or some of the underlying configurations and administration work to keep things running. Your responsible for patching , updates and all the regular care. Ex: Elastic Bean–hides all the complexity of it’s runtime environment, leaving you to do beyond uploading your application code.
Managed Resources
Your expected to care for the operating system and everything that’s running on it. If you can edit it, you own it. EX: Ec2,
Unmanaged Resources
Any service outages that could affect the performance of anyone’s workload will appear here. First place you check when troubleshooting a failing application.
Service Health Dashboard
Makes it abundantly clear that it does not permit the use of it’s infrastructure in any illegal, harmful, or offensive way.
AWS Acceptable Use Policy
True or False: AWS Regions connect atleast 2 availability zones located within a single geographic area into a low latency network.
True
A group of 1 or more independent (and fault-protected) data centers located within a single geographic region.
Availability Zone.