Section 1 AWS and SA Fundamentals Flashcards
Principle
A Person or App that ccan make Authenticated or Anonymous Requests
Authentication
Authenticating a Principle against an Identity
Identity
Objects that require authentication and are authorized to access resources
Authorization
The process of checking and allowing or denying access toa resource for an identity
Shared Resposibility Model - Customer
- Customer Data
- Platform
- Applications
- Identity & Access Managment
- OS
- Network & Firewall Configuration
- Encryption
- Network Protection
Shared Resposibility Model - AWS
- Software
- Compute
- Storage
- Databse
- Networking
- Hardware
- Regions
- Availibility Zones (AZ)
- Edge Locations
Service Model
Defines how a service or product is delivered, how you pay, and what you receive
Stack
- Data Center
- Network Storage
- Hosts / Servers
- Virtulization
- Operating System (OS)
- Runtme
- Application
- Data
3 types of Service Models
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
AWS Resposibility
- Data Center
- Network & Storage
- Virtulization
Infrastructure as a Service (IaaS)
Client Resposibility
- Operating System (OS)
- Runtime
- Application
- Data
Platform as a Service (PaaS)
AWS Resposibility
- Data Center
- Network & Storage
- Virtulization
- Runtime
Platform as a Service (PaaS)
Client Resposibility
- Application
- Data
Software as a Service (Saas)
AWS Responsibility
- Data Center
- Network & Storage
- Virtulization
- Host / Servers
- Application
Software as a Service (Saas)
Client Responsibility
- Data
High Availability (HA)
Hardware, Software, and Configuration allowing system to recover quickly in the event of a failure with some User impact
Fault Tolerant
System Designed to operate through a failure with no User Impact
Recovery Point Objective (RPO)
Max time between a failure and the last successful backup
Recovery Time Objective (RTO)
Max amount of time a system is down and recovers
Vertical Scaling
Adding additional CPU or Memory
Horizontal Scaling
Adding Additional machines into a resource pool
3 tiers of Application Design
- Presentation
- Logic
- Data
Presentation Application Tier
Interacts with consumer of the App
Logic Application Tier
Delivers the App’s functionallity
Data Application Tier
Controls interaction with database
Monolithic Application
Hard to Scale and has to be sone Vertically
Encryption
Process of taking Plaintext and converting it into Ciphertext and vise versa
Synnetrical Encryption
Same key is used for encryption and decryption
Asymetrical Encryption
Public Key & Private Key
Encryption At Rest
Encrypting a file that is stored
Encryption In Transit
Encrypting the communication between 2 entities
Region
Contains multiple Avalibility Zones (AZs)\
Avalibility Zone (AZ)
Seperate and isolated networks
Edge Location
Small pocket of AWS compute, storage, and networking close to a major population
Well Architected Framework
- Secure
- Reliable
- Performance Efficiency
- Operational Excellence
- Cost Optimization
Well Architected Framework
Security Design Principle
- Strong Identity Foundation
- Enable traceability
- Security to all layers
- Automated Security
- Protect Data In Transit & At Rest
- Prepare for Security events
Well Architected Framework
Reliability Design Princple
- Test recovery Procedures
- Automatically recovery from failure
- Scale Horizontally
- Stop guessing capacity
- Manage Change in Automation
Well Architected Framework
Performance Design Princple
- Democratize Advanced Tech
- Go Global in Minutes
- Use Serverless Architecture
- Experiment More Often
- Mechanically Sympathy
Well Architected Framework
Operation Excellence Design Princple
- Perform Operations as Code
- Annotate Documentation
- Make Frewuent, Small, Revisable Changes
- Refine Operation Procedures Frequently
- Anticipate Failure
- Learn from All Operational Failures
Well Architected Framework
Cost Optimization Design Princple
- Adopt a Consumption Model
- Measure Overall Efficiency
- Stop Spending Money on Data Center Operations
- Analyze & Attribute Expenditures
- Use Managed Services to Reduce Cost of Ownership
Elastic Scaling
Automation and Horizontal Scaling Used to Match capacity with Demand
Simple Storage Service (S3)
Global Object Storage that can be used to store objects
S3 Region
Holds Buckets
S3 Buckets
Holds Objects
Objects
- Similar to Files
- 0 to 5 TB
CloudFormation
Infrastructure as Code (IaC) Product
CloudFormation can Creat, Manage, and Remove Infrastructure using?
- JSON
- YAMIL