Fundamentals Flashcards
IAM Policies
allow or deny access to AWS services when attached to IAM User, Group, or Role
(T/F) IAM is global
True
IDP (ID Provider)
IAM - authenticate and authorize (based on policies)
(T/F) IAM is free
True
(T/F) IAM has direct control on federated accounts.
False
Access Keys
Long-Term credentials within IAM users. Used for CLI. Don’t change regularly or automatically. IAM user can have two access keys. Can be created, deleted, inactive, active. Default to active..
Two parts to Access Keys
Key ID and Secret Access Key. Once you get the secret access key, you can’t get it again so WRITE that down
Public Service
Accessed anywhere with Internet
Private Service
Access through VPC
(T/F) Nothing from the Internet can get to the VPC unless it is configured to do so.
True
AWS Zones
Pubic Internet Zone -> AWS Public Zone -> AWS Private Zone
Command Line Interface (CLI) use the region code (ap-southeast-2) whereas the console uses the regions name which looks like…
Asia Pacific (Sydney)
VPC Default is assigned
One account & One Region
Two types of VPC
Default and Custom
(T/F) Custom VPC can have more than one region
True
VPC CIDR
IP Addresses a VPC can use. Default VPC is always the same 172.31.0.0/16
(T/F) Custom VPC can only have one CIDR
False
Default VPC are always configured the same way when it comes to subnets
One subnet in each AZ in the region. Each subnet will have its own CIDR so subnet in AZ one could be 172.31.211.0/20
Each VPC subnet comes with…
Internet Gateway, Security Group, NACL
EC2 Instance
OS Configured for your needs
(T/F) EC2 Instances are private by default
True, need to configure public access
EC2 are AZ resilient which means
If the AZ fails, the instance fails
EC2 On-Demand Billing
By second or hour depending on the OS
EC2 Popular Types of storage
Local host storage or Elastic Block Storage (EBS)
EC2 Lifecycle
Running, Stopped, Terminated
EC2 Running, you pay for
CPU, Memory, Disk (storage), networking
EC2 Stopped, you pay for
Just Disk (storage)
EC2 Terminated, you pay for
Nothing but once it it is terminated it cannot be recreated
Amazon Machine Image (AMI)
Used to create an EC2 instance or created from an EC2 instance. It is the image that configures the stack
AMI Contains three things
Permissions, Root Volume, Block Device Mapping
AMI Permissions
Public - Everyone Allowed
Owner (private) - implicit allow
Explicit - specific AWS accounts allowed
AMI Root volume
Think C:\ in Windows or ROOT in Linux
AMI Block Device Mapping
Which volume is boot and which is data
Connect to EC2 by…
RDP for Windows or SSH for Linux