FlashCards
IAM
Identity Access Management. it’s a global service. Root account created by default, shouldn’t be shared or used.
Users are people in your org and can be grouped.
Groups can only contain users, not other groups
6 Advantages of Cloud computing
- Trade capital expense for Opex
- Benefit from massive economies of scale
- Stop guessing capacity
- Increase speed and agility
- Stop spending money running Datacenters
- Go global in minutes.
Types of Cloud Computing Models
- Infrastructure as a Service (IaaS)
- Platform as a service (PaaS)
- Software as a Service (SaaS)
Infrastructure as a Serive (IaaS)
infrastructure as a service contains the basic building blocks for Cloud IT and typically provides access to networking features, computers, and data storage. Easily parallel with traditional on prem IT
Platform as a Service (PaaS)
Removes the need for your organization to manage the underlying infrastructure (Usually hardware and OS) and allows you to focus on the deployment & management of your applications.
Software as a Service (SaaS)
Provides you with a complete product that is run and managed by the service provider. You don’t have to think about the underlying infrastructure. All managed by the provider. Ex: gmail.
Cloud Computing Deployment Models
- Cloud
- Hybrid
- On Premise
Benefits of AWS Security
- Keep your data safe
- Meet Compliance Requirements
- Save Money
- Scale Quickly
3 pricing fundamentals
- Compute
- Storage
- Data transfer out
Problems solved by Cloud
Flexibility Cost-effectiveness Scalability Elasticity High availability Agility
MFA
Multi Factor Authentication
3 types of MFA devices
Virtual MFA Device
Universal 2nd factor (u2F) security
Hardware key fob MFA device
3 ways to access AWS
AWS management Console
CLI
SDK
IAM credentials report
Account level. Shows all users and status of credentials
IAM access advisor
A single User
Access advisor shows the service permissions granted to a user and when those services was last used.
You can use this information to update security policy
IAM guidelines & best Practices
Do not use the root account except for account set up
One physical user = one AWS user
Assign users to groups and assign permissions to groups
Create strong password policy
Use and enforce the use of MFA
Never share IAM keys
Security Groups - EC2
Control how traffic is allowed into or out of our EC2 instances
Security groups only contain ALLOW rules
Rules can reference by IP or by security group
.PORT 22
SSH (secure Shell) - how to log into Linux instances
Port 21
FTP (File transport Protocol)
Port 80
HTTP - access unsecured websites
Port 443
HTTPS - secured website
Port 3389
RDP - Remote Desktop Protocol - log into a windows instance
EC2 instance Purchasing Options
On Demand instance Reserved Convertible reserved Scheduled reserved instances Spot instances Dedicated host
EC2 on Demand
Pay for what you use
Linux - billing per second, after the first minute.
Windows - billing per hour
Highest cost but no upfront payments
Recommended for short term and un interrupted workloads