GENERAL Flashcards
AWS Core service areas
compute, network, storage, databases
Well-Architected Framework
Only extremely Stupid People ever Shit Remarkably Cool otters (Operational excellence, Security, Performance efficiency, Sustainability, Reliability, Cost optimization)
6 R’s of Migration
Rehosting, Replatforming, Retaining, Repurchasing, Retiring, Refactoring
Rehosting
lift & shift
Replatforming
lift, tinker, & shift
Retiring
get rid of unneeded applications
Retaining
about to be deprecated, keep on-prem
Repurchasing
abandon legacy software vendors
Refactoring
reworking code & architecture changes
Cloud Adoption Framework (CAF)
Big People Generally Show Positive Outcomes (Business, People, Governance, Security, Platform, Operations)
CAF - Business
ensures that IT aligns with business needs and that IT investments link to key business results.
CAF - People
HR hire new staff for cloud adoption
CAF - Governance
focuses on the skills and processes to align IT strategy with business strategy. This ensures that you maximize the business value and minimize risks.
CAF - Platform
principles and patterns for implementing new solutions on the cloud, and migrating on-premises workloads to the cloud.
CAF - Security
ensure security
CAF - Operations
enable, run, use, operate, and recover IT workloads to the level agreed upon with your business stakeholders.
WArchF - Operational excellence
run & monitor systems, continually improve supporting processes
WArchF - Security
keep things secure
WArchF - Reliability
recovery, scalability, durability
WArchF - Performance efficiency
use compute resources efficiently
WArchF - Compute optimization
run systems at lowest price point
WArchF - Sustainability
minimize environmental impact & reduce energy consumption
AWS Control Tower
Create, orchestrate, andmonitor your multi-account environment
Amazon Macie
data security service that discovers sensitive data w/ machine learning. Provides visibility into data security risks & enables automated protection against those risks
Amazon GuardDuty
security monitoring service that analyzes & processes FOUNDATIONAL DATA SOURCES (e.g.CloudTrail, VPC flow logs, DNS logs, etc.)
AWS Shield
managed DDoS protection service
AWS Trusted Advisor
provides recommendations based on AWS best practices. Evaluates your account using checks
AWS Storage Gateway
set of HYBRID cloud storage services providing on-premises access to virtually unlimited cloud storage
AWS CloudHSM
manage & access your keys on single-tenant HSM instances that run in your own VPC
HSM
Hardware Security Module: a physical computing device that safeguards and manages secrets, performs encryption & decryption
AWS Professional Services
AWS ppl who assist enterprise customers w/ cloud migration/adoption
AWS Marketplace
digital catalog to for 3rd-party software built with AWS