Design Solutions For Organizational Conplexity Flashcards

1
Q

You are managing multiple accounts and you need to ensure that each account can only use resources that it is supposed to. What is a simple and reusable method of doing so?

A

AWS Organizations is a given here. It simplifies a lot of the account management and controls that you would use for this scenario. For resource control, you may use AWS CloudFormation Stacksets to define a specific stack and limit your developers to the created resources. You may also use AWS Service Catalog if you like to define specific product configurations or CloudFormation stacks, and give your developers freedom to deploy them. For permission controls, a combination of IAM policies and SCPs should suffice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are creating a CloudFormation stack and uploading it to AWS Service Catalog so you may share this stack with other AWS accounts in your organization. How can your end-users access the product/portfolio while still granting the least privilege?

A

Your end-users require appropriate IAM permissions to access AWS Service Catalog and launch a CloudFormation stack. The AWSServiceCatalogEndUserFullAccess and AWSServiceCatalogEndUserReadOnlyAccess policies grant access to the AWS Service Catalog end-user console view. When a user who has either of these policies chooses AWS Service Catalog in the AWS Management Console, the end-user console view displays the products that they have permission to launch. You should also provide the user the permission to pass IAM role to CloudFormation so that
the CloudFormation stack can launch the necessary resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you provide access to users in a different account to resources in your account?

A

Use cross-account IAM roles and attach the permissions necessary to access your resources. Have the users in the other account reference this IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you share or link two networks together? (VPCs, VPNs, routes, etc) What if you have restrictions on your traffic e.g. it cannot traverse through the public Internet?

A

Sharing networks or linking two networks is a common theme in a very large organization. This ensures that your networks adhere to the best practices all the time. For VPCs, you can use VPC sharing, VPC Peering, or Transit Gateways. VPNs can utilize Site-to-Site VPN for cross-region or cross-account connections. For strict network compliance, you can access some of your AWS resources privately through shared VPC endpoints. This way, your traffic does not need to traverse through the public Internet. More information on that can be found in this article: https://aws.amazon.com/blogs/networking-and-content-delivery/integrating-aws-transit-gateway-with-aws-privatelink-and-amazon-route-53-resolver/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have multiple accounts under AWS Organizations. Previously, each account can purchase their own RIs, but now, they have to request it from one central account for procurement. What steps should be done to satisfy this requirement in the most secure way?

A

Ensure that all AWS accounts are part of an AWS Organizations structure operating in all features mode. Then create an SCP that contains a deny rule to the ec2:PurchaseReservedInstancesOffering and ec2:ModifyReservedInstances actions. Attach the SCP to each organizational unit (OU) of the AWS Organizations’ structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can you connect multiple VPCs that belong to different AWS accounts and have overlapping CIDRs? If so, how can you manage your route tables so that the correct traffic is routed to the correct VPC?

A

You can connect multiple VPCs together even if they have overlapping CIDRs. What is important is that you are aware of how routing works in AWS. AWS uses longest prefix matching to determine where traffic is delivered to. So to make sure that your traffic is routed properly, be as specific as possible with your routes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Members of a department will need access to your AWS Management Console. Without having to create IAM Users for each member, how can you provide long-term access?

A

You can use your on-premises SAML 2.0-compliant identity provider to grant your members federated access to the AWS Management Console via the AWS single sign-on (SSO) endpoint. This will provide them long term access to the console as long as they can authenticate with the IdP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is it possible for one account to monitor all API actions executed by each member account in an AWS Organization? If so, how does it work?

A

You can configure AWS CloudTrail to create a trail that will log all events for all AWS accounts in that organization. When you create an organization trail, a trail with the name that you give it will be created in every AWS account that belongs to your organization. Users with CloudTrail permissions in member accounts will be able to see this trail. However, users in member accounts will not have sufficient permissions to delete the organization trail, turn logging on or off, change what types of events are logged, or otherwise alter the organization trail in any way. When you create an organization trail in the console, or when you enable CloudTrail as a trusted service in the Organizations, this creates a service-linked role to perform logging tasks in your organization’s member accounts. This role is named AWSServiceRoleForCloudTrail, and is required for CloudTrail to successfully log events for an organization. Log files for an account removed from the organization that were created prior to the account’s removal will still remain in the Amazon S3 bucket where log files are stored for the trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have 50 accounts joined to your AWS Organizations and you will require a central, internal DNS solution to help reduce the network complexity. Each account has its own VPC that will rely on the private DNS solution for resolving different AWS resources (servers, databases, AD domains, etc). What is the least complex network architecture that you can create?

A

Create a shared services VPC in your central account, and connect the other VPCs to yours using VPC peering or AWS Transit Gateway. Set up a private hosted zone in Amazon Route 53 on your shared services VPC and add in the necessary domains/subdomains. Associate the rest of the VPCs to this private hosted zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you easily deploy a basic infrastructure to different AWS regions while at the same time allowing your developers to optimize (but not delete) the launched infrastructures?

A

Use CloudFormation Stacksets to deploy your infrastructure to different regions. Deploy the stack in an administrator account. Create an IAM role that developers can assume so they can optimize the infrastructure. Make sure that the IAM role has a policy that denies deletion for cloudformation-launched resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have multiple VPCs in your organization that are using the same Direct Connect line to connect back to your corporate datacenter. This setup does not account for line failure which will affect the business greatly if something were to happen to the network. How do you make the network more highly available? What if the VPCs span multiple regions?

A

Utilize Site-To-Site VPN between the VPCs and your datacenter and terminate the VPN tunnel at a virtual private gateway. Setup BGP routing.
An alternative solution is to provision another Direct Connect line in another location if you require constant network performance, at the expense of additional cost. If the VPCs span multiple regions, you can use a Direct Connect Gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DX Connection: if you need to access resources located inside a VPC from on prem

A

Create a private virtual interface (VIF) to a VGW attached to the VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DX Connection: if your VPCs are located in different AWS Regions

A

Create a private VIF to a Direct Connect gateway associated with multiple VGWs, where each VGW is attached to a VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DX Connection: associate a Transit Gateway to a Direct Connect gateway

A

Create a transit VIF to a Direct Connect gateway associated with Transit Gateway

Connect up to 3 transit gateways across different regions and accounts over 1 VIF and BGP peering.

This is the most scalable and manageable option if you have to connect to multiple VPCs in multiple locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If need access to AWS public endpoints or services reachable from a public IP address

A

Create a VPN connection to Transit Gateway over Direct Connect public VIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly