Review Deck Flashcards
Amazon Macie
AI/ML security service that helps prevent data loss by automatically discovering, classifying, and protecting sensitive data stored in Amazon S3.
Machine Learning to recognize sensitive data (e.g., PII, intellectual property, etc.), assigns a business value, and provides visibility into where this data is stored and how it is being used in your organization.
Macie continuously monitors data access activity for anomalies, and delivers alerts when it detects risk of unauthorized access or data leak.
Macie can detect global access permissions set on sensitive data, detect upload of API keys inside source code, and verify data is stored and accessed according to customer compliance standards.
Lambda@Edge
Lets you run Lambda functions to customize the content that CloudFront delivers, executing the functions in AWS locations closer to the viewer. Lambda@Edge functions run in response to CloudFront events, without provisioning or managing servers.
You can use Lambda functions to change CloudFront requests and responses at the following points:
– After CloudFront receives a request from a viewer (viewer request)
– Before CloudFront forwards the request to the origin (origin request)
– After CloudFront receives the response from the origin (origin response)
– Before CloudFront forwards the response to the viewer (viewer response)
HTTP 504
Gateway timeout error, usually results when a server is down.
Amazon MQ
Message broker that supports industry-standard APIs and protocols so you can switch from any standards-based message broker without rewriting messaging code in existing applications.
TRUE/FALSE: Step Scaling & Simple Scaling both require you to create CloudWatch alarms.
TRUE
Step Scaling & Simple Scaling both require you to define whether to…
…add or remove instances, and how many, or set the group to an exact size.
Step Scaling and Simple Scaling policies Both require you to…
…specify the high and low thresholds for the alarms.
Simple vs Step Scaling Policies
The main difference is the step adjustments you get with step scaling policies. Step adjustments increase or decrease capacity of an Auto Scaling group based on the size of the alarm breach.
Target Tracking Scaling Policy
Increase or decrease capacity of an Auto Scaling group based on a target value for a specific metric, adding/removing capacity to keep the metric at/near the specified target value.
In addition, a target tracking scaling policy also adjusts to changes in the metric due to a changing load pattern.
Helps resolve over-provisioning of your resources.
Suspend and Resume scaling…
…is used to temporarily pause scaling activities triggered by scaling policies and scheduled actions.
Cooldown periods…
…help to prevent the initiation of additional scaling activities before the effects of previous activities are visible.
This policy must wait for a scaling activity or health check replacement to complete and a cooldown period to expire before responding to additional alarms.
Simple Scaling
Use cases for signed URLs:
– RTMP distribution–signed cookies aren’t supported for RTMP distributions
– Restrict access to individual files
– Use when cookies aren’t supported by users’ clients
Use cases for signed cookies:
– Provide access to multiple restricted files
– To avoid changing existing URLs
Match Viewer
An Origin Protocol Policy which configures CloudFront to communicate with your origin using HTTP or HTTPS, depending on the protocol of the viewer request. CloudFront caches the object only once even if viewers make requests using both HTTP and HTTPS protocols.
Field-Level Encryption…
…allows secure user-submitted uploads of sensitive information to a web server.
TRUE/FALSE: To use signed urls will require changes to existing urls?
TRUE
TRUE/FALSE: Amazon RDS provides metrics in real time for the operating system (OS) that your DB instance runs on.
TRUE
Two ways you can view metrics for an RDS DB instance:
- By using the console
2. View Enhanced Monitoring JSON output from CloudWatch Logs in a monitoring system of your choice
By default, Enhanced Monitoring metrics are stored in the CloudWatch Logs for…
…30 days
To modify the amount of time the metrics are stored in the CloudWatch Logs…
…change the retention for the RDSOSMetrics log group in the CloudWatch console.
Why are CloudWatch and Enhanced Monitoring Metrics different?
The differences can be greater if your DB instances use smaller instance classes, because then there are likely more virtual machines (VMs) that are managed by the hypervisor layer on a single physical instance. Enhanced Monitoring metrics are useful when you want to see how different processes or threads on a DB instance use the CPU.
CloudWatch gathers metrics about CPU utilization from the hypervisor for a DB instance, and Enhanced Monitoring gathers metrics from an agent on the instance. Because the hypervisor does additional work CloudWatch accounts for that in its CPU usage calculation.
TRUE/FALSE: You can use CloudWatch to monitor CPU Utilization of a database.
False–although you can use CloudWatch to monitor CPU Utilization of a database instance, it will not provide CPU bandwidth usage or total memory consumed by each database process.
TRUE/FALSE: CPU% and MEM% metrics are readily available in the Amazon RDS console.
FALSE
CloudTrail Event
The record of an activity in an AWS account.
CloudTrail activities can be…
…an action taken by a user, role, or service that is monitorable by CloudTrail.
CloudTrail events provide a history of…
…API and non-API account activity in AWS Management Console, AWS SDKs, command-line tools, and other AWS services.
Two types of events that can be logged in CloudTrail:
Management events and data events.
What events will CloudTrail log by default?
By default, CloudTrail will log management events, but not data events.
TRUE/FLASE: A CloudTrail trail can be applied only to a single region.
FALSE–CloudTrail trails can be applied to all regions or a single region.
What is considered best practice when creating a CloudTrail trail?
It is considered best practice to create a trails that apply to all regions in the AWS partition you are working.
What is the default region setting when you create a trail in the CloudTrail console?
All regions
Global services… , events are delivered to any trail that includes global services, and are logged as occurring in US East (N. Virginia) Region.
AWS Identity and Access Management (IAM), AWS STS, Amazon CloudFront, and Route 53 (and maybe others…)
CloudTrail can be used to log events most events with the multi-region setting enabled, however…
…it will only cover activity occurring in regional services (EC2, S3, RDS etc.), not global services.
In order for CloudTrail to log activity occurring in global services, you have to add what events parameter in your AWS CLI command?
–include-global-service–
Amazon Elastic File System (EFS)…
…provides simple, scalable, elastic file storage for use with AWS Cloud services and on-premises resources, and when mounted on Amazon EC2 instances, EFS provides a standard file system interface and access semantics, which seamlessly integrate with existing applications and tools.
Can multiple EC2 instances access EFS simultaneously? And what is the benefit?
Yes, when used by multiple EC2 instances, EFS can serve as a common data source and shared file system for multiple workloads and applications on separate EC2 instances, making file sharing much faster.
Can multiple EC2 instances share the same EBS Volumes? Across AZs?
Yes, EC2 instances can share EBS volumes, but no, they cannot share EBS volumes across AZs. However, EC2 instances can share an EFS across AZs.
Is S3 the best choice for file storage?
No, is mainly used for “object storage”, and S3 does not provide the notion of “folders” too.
If you create or update a Lambda function that uses environment variables, does AWS Lambda encrypt them automatically? If so, how?
Yes, The first time you create or update Lambda functions that use environment variables in a region, a default service key is created for you automatically within AWS KMS. This key is used to encrypt environment variables.
Can you use the default KMS key to encrypt environment variables after a Lambda function is created?
No, you must create your own KMS key and choose it instead of the default key. The default key will give errors. Creating a new key also offers more flexibility, including the ability to create, rotate, disable, and define access controls, and to audit the encryption keys used to protect your data.
Network Access Control List (ACL)…
…is an optional layer of security that acts as a firewall, controlling traffic in and out of a VPC network, protecting one or more subnets. A network ACL is great for temporary or ad hoc protection, because you can easily add and remove restrictions in a matter of minutes.
Can IAM policies control network traffic in/out of a VPC?
No
TRUE/FALSE: Adding a rule to a security group can control inbound/outbound VPC network traffic?
FALSE, security groups act as firewalls at the instance-level. Adding a rule to a security group cannot influence traffic in/out of a VPC.
Storage Gateway (file gateway)…
…is both a service and a virtual software appliance deployed into an on-premises environment as a virtual machine (VM) using VMware ESXi, Microsoft Hyper-V, or Linux Kernel-based Virtual Machine (KVM) hypervisor. It serves as a file interface into S3, allowing customers to store and retrieve objects using industry-standard protocols, e.g., Network File System (NFS) and Server Message Block (SMB).
With a file gateway, you can:
– store and retrieve files directly using the NFS version 3 or 4.1 protocol.
– store and retrieve files directly using the SMB file system version, 2 and 3 protocol.
– access data directly in S3 from any AWS Cloud application or service
– manage S3 data using lifecycle policies, cross-region replication, and versioning
Storage Gateway supports which storage standards?
S3 Standard, Amazon S3 Standard-Infrequent Access, Amazon S3 One Zone-Infrequent Access and Amazon Glacier
TRUE/FALSE: Lifecycle policies work with storage gateway file shares?
TRUE–Objects stored in any storage class can be transitioned/archived to Glacier using a Lifecycle Policies. Although you can write directly to S3, lifecycle policies are recommended.
A DynamoDB stream is…
…an ordered flow of information about changes to items in an Amazon DynamoDB table. When you enable a stream on a table, DynamoDB captures information about every modification to data items in the table.
Whenever an application creates, updates, or deletes items in a table, DynamoDB Streams…
…writes a stream record with the primary key attribute(s) of the items that were modified.
A DynamoDB stream record…
…contains information about a data modification to a single item in a DynamoDB table. You can also configure streams so that stream records capture additional information, such as the “before” and “after” images of modified items.
DynamoDB and Lambda
Amazon DynamoDB is integrated with AWS Lambda so that you can create triggers—pieces of code that automatically respond to events in DynamoDB Streams. With triggers, you can build applications that react to data modifications in DynamoDB tables.
If you enable DynamoDB Streams on a table…
…you can associate the stream ARN with a Lambda function that you write. New records appear in the stream immediately after a table item changes. AWS Lambda invokes the Lambda function synchronously when it detects new stream records. The Lambda function can perform any actions you specify, such as sending a notification or initiating a workflow.
By default, DynamoDB Streams must be…
Enabled
FSx for Windows File Server…
…is Windows, Linux, and macOS accessible, fully managed Windows file servers and native Windows file system with the features, performance, and compatibility to easily lift and shift enterprise applications to the AWS Cloud. Thousands of compute instances and devices can access a file system concurrently.