Azure fundamental Flashcards
VM
emulated PC, running a guest OS
Virtual processors, memory, storage, and networking resources
Hosts an OS
Controlled via remote desktop client
containers
execution environment for applications,
no guest OS,
ex. Docker
- Virtualization environment for running applications
- Run on top of a host OS, but don’t include an OS for the app running inside a container; it bundles the libraries and components needed to run the app
- Ex. 5 containers running on a server with 1 Linux kernel; all containers and the apps within them share the same Linux kernel
- Kernel = lowest level of software that interfaces with hardware in a computer; it interfaces all applications that run in “user mode” down to the physical hardware
- Linux kernel = a free and open-source, monolithic, Unix-like operating system kernel
Serverless computing
application code without server,
processing time by function
Cloud-hosted execution environment that runs code separately from underlying host environment
Create an instance of the service, add code, but requires/allows no infrastructure configuration or maintenance
managing the server infrastructure and allocation/de-allocation of resources based on demand.
- Infrastructure isn’t your responsibility
- you deploy your code and it automatically runs with high availability.
- Scaling and performance are handled automatically
- Application continue working under any workload
- No configuration needed for scaling
- billed only for the exact resources you use
- Event driven = resource are only allocated from a direct action, ex. time that takes to run your code
- no need to reserve capacity.
focus on the logic you need to execute and the trigger that is used to run your code.
configure serverless apps to respond to events and only triggered by an event. Event could be:
- a REST endpoint
- a periodic timer
- a message received from another Azure service.
storage
store data on disk or cloud
“Lift and shift”
gradually moves infrastructure and admin cost to cloud
Consumption-based pricing model
pay-as-you-go, No upfront costs, no need to buy infrastructure, pay resources when needed, stop paying when no longer needed
Vertical scaling (scaling up)
add resources to increase power of an existing server,
ex. add more CPUs, RAM, etc.
Horizontal scaling (scaling out)
add more servers that functions together as 1 unit.
cloud computing - Elastic
Automatically adding or removing resources,
accommodate for spikes or sacks in traffic
cloud computing - Current
environment maintains software patches, hardware setup, upgrades, etc,
Hardware upgrades and maintenance are done by provider
cloud computing - Reliable
Data backup,
disaster recovery
data replication services,
cloud computing - Global
data centers all over the globe
this allows better response time, redundancy and locality
cloud computing - Secure
Physical security:
entry to a datacenter,
access to server racks, walls, cameras, gates, security personnel.
Digital security:
connection to systems,
to access data over the network, etc.
fault tolerance
redundancy in the cloud services architecture that a backup component takes place when a component fails.
Criminal Justice Information Services (CJIS)
FBI database
Cloud Security Alliance (CSA) STAR Certification
achieving ISO/IEC 27001 certification,
meet Cloud Controls Matrix (CCM), cloud security
General Data Protection Regulation (GDPR)
european privacy law
EU model clauses
guarantees around transfers of personal data outside of the EU,
freely move data from Europe to rest of world
Health Insurance Portability and Accountability Act (HIPAA)
Protected Health Information (PHI),
Health Information Technology for Economic and Clinical Health Act (HITECH) Act
International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27018
code of practice,
cover handling of personal information by cloud service provider
Multi-Tier Cloud Security (MTCS) Singapore
security certifications for cloud providers
Service Organization Controls (SOC)
cloud service audit for data security, availability, processing integrity, and confidentiality
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
framework consists of standards, guidelines, and best practices to manage cybersecurity-related risks,
audits by third-party Federal Risk and Authorization Management Program (FedRAMP),
validated by Health Information Trust Alliance (HITRUST)
UK Government G-Cloud
cloud computing certification in UK