AWS Notes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Module 2

Amazon Elastic Compute Cloud (Amazon EC2) provides secure, resizable compute capacity in the cloud as Amazon EC2 instances. With traditional on-premises resources, you have to do the following: Spend money upfront to purchase hardware. Wait for the servers to be delivered to you. Install the servers in your physical data center. Make all the necessary configurations. By comparison, with an Amazon EC2 instance you can use a virtual server to run applications in the AWS Cloud. You can provision and launch an Amazon EC2 instance within minutes. You can stop using it when you have finished running a workload. You pay only for the compute time you use when an instance is running, not when it is stopped or terminated. You can save costs by paying only for server capacity that you need or want. Amazon EC2 instance types General purpose instances provide a balance of compute, memory, and networking resources. You can use them for a variety of workloads, such as: application servers gaming servers backend servers for enterprise applications small and medium databases Suppose that you have an application in which the resource needs for compute, memory, and networking are roughly equivalent. You might consider running it on a general purpose instance because the application does not require optimization in any single resource area. Compute optimized instances are ideal for compute-bound applications that benefit from high-performance processors. Like general purpose instances, you can use compute optimized instances for workloads such as web, application, and gaming servers. However, the difference is compute optimized applications are ideal for high-performance web servers, compute-intensive applications servers, and dedicated gaming servers. You can also use compute optimized instances for batch processing workloads that require processing many transactions in a single group. Memory optimized instances are designed to deliver fast performance for workloads that process large datasets in memory. In computing, memory is a temporary storage area. It holds all the data and instructions that a central processing unit (CPU) needs to be able to complete actions. Before a computer program or application is able to run, it is loaded from storage into memory. This preloading process gives the CPU direct access to the computer program. Suppose that you have a workload that requires large amounts of data to be preloaded before running an application. This scenario might be a high-performance database or a workload that involves performing real-time processing of a large amount of unstructured data. In these types of use cases, consider using a memory optimized instance. Memory optimized instances enable you to run workloads with high memory needs and receive great performance. Accelerated computing instances use hardware accelerators, or coprocessors, to perform some functions more efficiently than is possible in software running on CPUs. Examples of these functions include floating-point number calculations, graphics processing, and data pattern matching. In computing, a hardware accelerator is a component that can expedite data processing. Accelerated computing instances are ideal for workloads such as graphics applications, game streaming, and application streaming. Storage optimized instances are designed for workloads that require high, sequential read and write access to large datasets on local storage. Examples of workloads suitable for storage optimized instances include distributed file systems, data warehousing applications, and high-frequency online transaction processing (OLTP) systems. In computing, the term input/output operations per second (IOPS) is a metric that measures the performance of a storage device. It indicates how many different input or output operations a device can perform in one second. Storage optimized instances are designed to deliver tens of thousands of low-latency, random IOPS to applications. You can think of input operations as data put into a system, such as records entered into a database. An output operation is data generated by a server. An example of output might be the analytics performed on the records in a database. If you have an application that has a high IOPS requirement, a storage optimized instance can provide better performance over other instance types not optimized for this kind of use case. Match each description to an Amazon EC2 instance type. Memory optimized --> Ideal for high-performance databases Storage optimized --> Suitable for data warehousing applications General purpose --> Balances compute, memory, and networking resources Compute optimized --> Offers high-performance processors Amazon EC2 pricing With Amazon EC2, you pay only for the compute time that you use. Amazon EC2 offers a variety of pricing options for different use cases. For example, if your use case can withstand interruptions, you can save with Spot Instances. You can also save by committing early and locking in a minimum level of use with Reserved Instances. On-Demand Instances are ideal for short-term, irregular workloads that cannot be interrupted. No upfront costs or minimum contracts apply. The instances run continuously until you stop them, and you pay for only the compute time you use. Sample use cases for On-Demand Instances include developing and testing applications and running applications that have unpredictable usage patterns. On-Demand Instances are not recommended for workloads that last a year or longer because these workloads can experience greater cost savings using Reserved Instances. AWS offers Savings Plans for several compute services, including Amazon EC2. Amazon EC2 Savings Plans enable you to reduce your compute costs by committing to a consistent amount of compute usage for a 1-year or 3-year term. This term commitment results in savings of up to 66% over On-Demand costs. Any usage up to the commitment is charged at the discounted plan rate (for example, $10 an hour). Any usage beyond the commitment is charged at regular On-Demand rates. Later in this course, you will review AWS Cost Explorer, a tool that enables you to visualize, understand, and manage your AWS costs and usage over time. If you are considering your options for Savings Plans, AWS Cost Explorer can analyze your Amazon EC2 usage over the past 7, 30, or 60 days. AWS Cost Explorer also provides customized recommendations for Savings Plans. These recommendations estimate how much you could save on your monthly Amazon EC2 costs, based on previous Amazon EC2 usage and the hourly commitment amount in a 1-year or 3-year plan. Reserved Instances are a billing discount applied to the use of On-Demand Instances in your account. You can purchase Standard Reserved and Convertible Reserved Instances for a 1-year or 3-year term, and Scheduled Reserved Instances for a 1-year term. You realize greater cost savings with the 3-year option. At the end of a Reserved Instance term, you can continue using the Amazon EC2 instance without interruption. However, you are charged On-Demand rates until you do one of the following: Terminate the instance. Purchase a new Reserved Instance that match Spot Instances are ideal for workloads with flexible start and end times, or that can withstand interruptions. Spot Instances use unused Amazon EC2 computing capacity and offer you cost savings at up to 90% off of On-Demand prices. Suppose that you have a background processing job that can start and stop as needed (such as the data processing job for a customer survey). You want to start and stop the processing job without affecting the overall operations of your business. If you make a Spot request and Amazon EC2 capacity is available, your Spot Instance launches. However, if you make a Spot request and Amazon EC2 capacity is unavailable, the request is not successful until capacity becomes available. The unavailable capacity might delay the launch of your background processing job. After you have launched a Spot Instance, if capacity is no longer available or demand for Spot Instances increases, your instance may be interrupted. This might not pose any issues for your background processing job. However, in the earlier example of developing and testing applications, you would most likely want to avoid unexpected interruptions. Therefore, choose a different EC2 instance type that is ideal for those tasks. Dedicated Hosts are physical servers with Amazon EC2 instance capacity that is fully dedicated to your use. You can use your existing per-socket, per-core, or per-VM software licenses to help maintain license compliance. You can purchase On-Demand Dedicated Hosts and Dedicated Hosts Reservations. Of all the Amazon EC2 options that were covered, Dedicated Hosts are the most expensive. What is the difference between Amazon EC2 Savings Plans and Spot Instances? Amazon EC2 Savings Plans are ideal for workloads that involve a consistent amount of compute usage over a 1-year or 3-year term. With Amazon EC2 Savings Plans, you can reduce your compute costs by up to 72% over On-Demand costs. Spot Instances are ideal for workloads with flexible start and end times, or that can withstand interruptions. With Spot Instances, you can reduce your compute costs by up to 90% over On-Demand costs. Unlike Amazon EC2 Savings Plans, Spot Instances do not require contracts or a commitment to a consistent amount of compute usage. Scaling Amazon EC2 Scalability involves beginning with only the resources you need and designing your architecture to automatically respond to changing demand by scaling out or in. As a result, you pay for only the resources you use. You don't have to worry about a lack of computing capacity to meet your customers' needs. If you wanted the scaling process to happen automatically, which AWS service would you use? The AWS service that provides this functionality for Amazon EC2 instances is Amazon EC2 Auto Scaling. Amazon EC2 Auto Scaling enables you to automatically add or remove Amazon EC2 instances in response to changing application demand. By automatically scaling your instances in and out as needed, you are able to maintain a greater sense of application availability. Within Amazon EC2 Auto Scaling, you can use two approaches: dynamic scaling and predictive scaling. Dynamic scaling responds to changing demand. Predictive scaling automatically schedules the right number of Amazon EC2 instances based on predicted demand. When you create an Auto Scaling group, you can set the minimum number of Amazon EC2 instances. The minimum capacity is the number of Amazon EC2 instances that launch immediately after you have created the Auto Scaling group. In this example, the Auto Scaling group has a minimum capacity of one Amazon EC2 instance. Next, you can set the desired capacity at two Amazon EC2 instances even though your application needs a minimum of a single Amazon EC2 instance to run. The third configuration that you can set in an Auto Scaling group is the maximum capacity. For example, you might configure the Auto Scaling group to scale out in response to increased demand, but only to a maximum of four Amazon EC2 instances. Because Amazon EC2 Auto Scaling uses Amazon EC2 instances, you pay for only the instances you use, when you use them. You now have a cost-effective architecture that provides the best customer experience while reducing expenses. Directing traffic with Elastic Load Balancing Elastic Load Balancing is the AWS service that automatically distributes incoming application traffic across multiple resources, such as Amazon EC2 instances. A load balancer acts as a single point of contact for all incoming web traffic to your Auto Scaling group. This means that as you add or remove Amazon EC2 instances in response to the amount of incoming traffic, these requests route to the load balancer first. Then, the requests spread across multiple resources that will handle them. For example, if you have multiple Amazon EC2 instances, Elastic Load Balancing distributes the workload across the multiple instances so that no single instance has to carry the bulk of it. Although Elastic Load Balancing and Amazon EC2 Auto Scaling are separate services, they work together to help ensure that applications running in Amazon EC2 can provide high performance and availability. Low-demand period Here's an example of how Elastic Load Balancing works. Suppose that a few customers have come to the coffee shop and are ready to place their orders. If only a few registers are open, this matches the demand of customers who need service. The coffee shop is less likely to have open registers with no customers. In this example, you can think of the registers as Amazon EC2 instances. High-demand period Throughout the day, as the number of customers increases, the coffee shop opens more registers to accommodate them. In the diagram, the Auto Scaling group represents this. Additionally, a coffee shop employee directs customers to the most appropriate register so that the number of requests can evenly distribute across the open registers. You can think of this coffee shop employee as a load balancer.

Module 3

Building a global footprint To understand the AWS global infrastructure, consider the coffee shop. If an event such as a parade, flood, or power outage impacts one location, customers can still get their coffee by visiting a different location only a few blocks away. This is similar to how the AWS global infrastructure works. AWS global infrastructure Selecting a Region When determining the right Region for your services, data, and applications, consider the following four business factors. Compliance with data governance and legal requirements - Depending on your company and location, you might need to run your data out of specific areas. For example, if your company requires all of its data to reside within the boundaries of the UK, you would choose the London Region. Not all companies have location-specific data regulations, so you might need to focus more on the other three factors. Proximity to your customers - Selecting a Region that is close to your customers will help you to get content to them faster. For example, your company is based in Washington, DC, and many of your customers live in Singapore. You might consider running your infrastructure in the Northern Virginia Region to be close to company headquarters, and run your applications from the Singapore Region. Available services within a Region - Sometimes, the closest Region might not have all the features that you want to offer to customers. AWS is frequently innovating by creating new services and expanding on features within existing services. However, making new services available around the world sometimes requires AWS to build out physical hardware one Region at a time. Suppose that your developers want to build an application that uses Amazon Braket (AWS quantum computing platform). As of this course, Amazon Braket is not yet available in every AWS Region around the world, so your developers would have to run it in one of the Regions that already offers it. Pricing - Suppose that you are considering running applications in both the United States and Brazil. The way Brazil's tax structure is set up, it might cost 50% more to run the same workload out of the São Paulo Region compared to the Oregon Region. You will learn in more detail that several factors determine pricing, but for now know that the cost of services can vary from Region to Region. Availability Zones An Availability Zone is a single data center or a group of data centers within a Region. Availability Zones are located tens of miles apart from each other. This is close enough to have low latency (the time between when content requested and received) between Availability Zones. However, if a disaster occurs in one part of the Region, they are distant enough to reduce the chance that multiple Availability Zones are affected. Running Amazon EC2 instances in multiple Availability Zones To review examples of running an Amazon EC2 instance in one or more Availability Zones, select Start. Step 1 Amazon EC2 instance in a single Availability Zone Suppose that you're running an application on a single Amazon EC2 instance in the Northern California Region. The instance is running in the us-west-1a Availability Zone. If us-west-1a were to fail, you would lose your instance. Step 2 Amazon EC2 instances in multiple Availability Zones A best practice is to run applications across at least two Availability Zones in a Region. In this example, you might choose to run a second Amazon EC2 instance in us-west-1b. Step 3 Availability Zone failure If us-west-1a were to fail, your application would still be running in us-west-1b. Planning for failure and deploying applications across multiple Availability Zones is an important part of building a resilient and highly available architecture. Which statement best describes an Availability Zone? A geographical area that contains AWS resources Correctly unselected A single data center or group of data centers within a Region Correctly selected A data center that an AWS service uses to perform service-specific operations Correctly unselected A service that you can use to run AWS infrastructure within your own on-premises data center in a hybrid approach Correctly unselected SUBMIT Correct The correct response option is A single data center or group of data centers within a Region. The other response options are incorrect because: A Region is a geographical area that contains AWS resources. An edge location is a data center that an AWS service uses to perform service-specific operations. Edge locations are examined in the next section of this module. AWS Outposts is a service that you can use to run AWS infrastructure, services, and tools in your own on-premises data center in a hybrid approach. AWS Outposts is explored later in this module. Edge locations An edge location is a site that Amazon CloudFront uses to store cached copies of your content closer to your customers for faster delivery. Select each marker to learn more. How to provision AWS resources In AWS, everything is an API call. An API is an application programming interface. And what that means is, there are pre determined ways for you to interact with AWS services. And you can invoke or call these APIs to provision, configure, and manage your AWS resources. The AWS Management Console is a web-based interface for accessing and managing AWS services. You can quickly access recently used services and search for other services by name, keyword, or acronym. The console includes wizards and automated workflows that can simplify the process of completing tasks. You can also use the AWS Console mobile application to perform tasks such as monitoring resources, viewing alarms, and accessing billing information. Multiple identities can stay logged into the AWS Console mobile app at the same time. To save time when making API requests, you can use the AWS Command Line Interface (AWS CLI). AWS CLI enables you to control multiple AWS services directly from the command line within one tool. AWS CLI is available for users on Windows, macOS, and Linux. By using AWS CLI, you can automate the actions that your services and applications perform through scripts. For example, you can use commands to launch an Amazon EC2 instance, connect an Amazon EC2 instance to a specific Auto Scaling group, and more. Another option for accessing and managing AWS services is the software development kits (SDKs). SDKs make it easier for you to use AWS services through an API designed for your programming language or platform. SDKs enable you to use AWS services with your existing applications or create entirely new applications that will run on AWS. To help you get started with using SDKs, AWS provides documentation and sample code for each supported programming language. Supported programming languages include C++, Java, .NET, and more. AWS Elastic Beanstalk With AWS Elastic Beanstalk, you provide code and configuration settings, and Elastic Beanstalk deploys the resources necessary to perform the following tasks: Adjust capacity Load balancing Automatic scaling Application health monitoring AWS CloudFormation With AWS CloudFormation, you can treat your infrastructure as code. This means that you can build an environment by writing lines of code instead of using the AWS Management Console to individually provision resources. AWS CloudFormation provisions your resources in a safe, repeatable manner, enabling you to frequently build your infrastructure and applications without having to perform manual actions. It determines the right operations to perform when managing your stack and rolls back changes automatically if it detects errors. In Module 3, you learned about the following concepts: AWS Regions and Availability Zones Edge locations and Amazon CloudFront The AWS Management Console, AWS CLI, and SDKs AWS Elastic Beanstalk AWS CloudFormation Module 3 Quiz Which statement is TRUE for the AWS global infrastructure? A Region consists of a single Availability Zone. Correctly unselected An Availability Zone consists of two or more Regions. Correctly unselected A Region consists of two or more Availability Zones. Correctly selected An Availability Zone consists of a single Region. Correctly unselected SUBMIT Correct The correct response option is A Region consists of two or more Availability Zones. For example, the South America (São Paulo) Region is sa-east-1. It includes three Availability Zones: sa-east-1a, sa-east-1b, and sa-east-1c. Which statement best describes Amazon CloudFront? A service that enables you to run infrastructure in a hybrid cloud approach Correctly unselected A serverless compute engine for containers Correctly unselected A service that enables you to send and receive messages between software components through a queue Correctly unselected A global content delivery service Correctly selected SUBMIT Correct The correct response option is A global content delivery service. Amazon CloudFront is a content delivery service. It uses a network of edge locations to cache content and deliver content to customers all over the world. When content is cached, it is stored locally as a copy. This content might be video files, photos, webpages, and so on. The other response options are incorrect because: AWS Outposts is a service that enables you to run infrastructure in a hybrid cloud approach. AWS Fargate is a serverless compute engine for containers. Amazon Simple Queue Service (Amazon SQS) is a service that enables you to send, store, and receive messages between software components through a queue. Which site does Amazon CloudFront use to cache copies of content for faster delivery to users at any location? Region Correctly unselected Availability Zone Correctly unselected Edge location Correctly selected Origin Correctly unselected SUBMIT Correct The correct response option is Edge location. The other response options are incorrect because: A Region is a separate geographical location with multiple locations that are isolated from each other. An Availability Zone is a fully isolated portion of the AWS global infrastructure. An origin is the server from which CloudFront gets your files. Examples of CloudFront origins include Amazon Simple Storage Service (Amazon S3) buckets and web servers. Note: Amazon S3 is explored later in this course. Which action can you perform with AWS Outposts? Automate actions for AWS services and applications through scripts. Correctly unselected Access wizards and automated workflows to perform tasks in AWS services. Correctly unselected Develop AWS applications in supported programming languages. Correctly unselected Extend AWS infrastructure and services to your on-premises data center. Correctly selected SUBMIT Correct The correct response option is Extend AWS infrastructure and services to your on-premises data center. The other response options are incorrect because: The AWS Command Line Interface (AWS CLI) is used to automate actions for AWS services and applications through scripts. The AWS Management Console includes wizards and workflows that you can use to complete tasks in AWS services. Software development kits (SDKs) enable you to develop AWS applications in supported programming languages. Module 4 Connectivity to AWS Amazon Virtual Private Cloud (Amazon VPC) Imagine the millions of customers who use AWS services. Also, imagine the millions of resources that these customers have created, such as Amazon EC2 instances. Without boundaries around all of these resources, network traffic would be able to flow between them unrestricted. A networking service that you can use to establish boundaries around your AWS resources is Amazon Virtual Private Cloud (Amazon VPC). Amazon VPC enables you to provision an isolated section of the AWS Cloud. In this isolated section, you can launch resources in a virtual network that you define. Within a virtual private cloud (VPC), you can organize your resources into subnets. A subnet is a section of a VPC that can contain resources such as Amazon EC2 instances. Internet gateway To allow public traffic from the internet to access your VPC, you attach an internet gateway to the VPC. An internet gateway is a connection between a VPC and the internet. You can think of an internet gateway as being similar to a doorway that customers use to enter the coffee shop. Without an internet gateway, no one can access the resources within your VPC. What if you have a VPC that includes only private resources? Virtual private gateway To access private resources in a VPC, you can use a virtual private gateway. Here's an example of how a virtual private gateway works. You can think of the internet as the road between your home and the coffee shop. Suppose that you are traveling on this road with a bodyguard to protect you. You are still using the same road as other customers, but with an extra layer of protection. The bodyguard is like a virtual private network (VPN) connection that encrypts (or protects) your internet traffic from all the other requests around it. The virtual private gateway is the component that allows protected internet traffic to enter into the VPC. Even though your connection to the coffee shop has extra protection, traffic jams are possible because you're using the same road as other customers. A virtual private gateway enables you to establish a virtual private network (VPN) connection between your VPC and a private network, such as an on-premises data center or internal corporate network. A virtual private gateway allows traffic into the VPC only if it is coming from an approved network. AWS Direct Connect AWS Direct Connect is a service that enables you to establish a dedicated private connection between your data center and a VPC. Suppose that there is an apartment building with a hallway directly linking the building to the coffee shop. Only the residents of the apartment building can travel through this hallway. This private hallway provides the same type of dedicated connection as AWS Direct Connect. Residents are able to get into the coffee shop without needing to use the public road shared with other customers. The private connection that AWS Direct Connect provides helps you to reduce network costs and increase the amount of bandwidth that can travel through your network. Subnets and network access control lists To learn more about the role of subnets within a VPC, review the following example from the coffee shop. First, customers give their orders to the cashier. The cashier then passes the orders to the barista. This process allows the line to keep running smoothly as more customers come in. Suppose that some customers try to skip the cashier line and give their orders directly to the barista. This disrupts the flow of traffic and results in customers accessing a part of the coffee shop that is restricted to them. To fix this, the owners of the coffee shop divide the counter area by placing the cashier and the barista in separate workstations. The cashier's workstation is public facing and designed to receive customers. The barista's area is private. The barista can still receive orders from the cashier but not directly from customers. This is similar to how you can use AWS networking services to isolate resources and determine exactly how network traffic flows. In the coffee shop, you can think of the counter area as a VPC. The counter area divides into two separate areas for the cashier's workstation and the barista's workstation. In a VPC, subnets are separate areas that are used to group together resources. Subnets A subnet is a section of a VPC in which you can group resources based on security or operational needs. Subnets can be public or private. Public subnets contain resources that need to be accessible by the public, such as an online store's website. Private subnets contain resources that should be accessible only through your private network, such as a database that contains customers' personal information and order histories. In a VPC, subnets can communicate with each other. For example, you might have an application that involves Amazon EC2 instances in a public subnet communicating with databases that are located in a private subnet. Network traffic in a VPC When a customer requests data from an application hosted in the AWS Cloud, this request is sent as a packet. A packet is a unit of data sent over the internet or a network. It enters into a VPC through an internet gateway. Before a packet can enter into a subnet or exit from a subnet, it checks for permissions. These permissions indicate who sent the packet and how the packet is trying to communicate with the resources in a subnet. The VPC component that checks packet permissions for subnets is a network access control list (ACL). Network access control lists (ACLs) A network access control list (ACL) is a virtual firewall that controls inbound and outbound traffic at the subnet level. For example, step outside of the coffee shop and imagine that you are in an airport. In the airport, travelers are trying to enter into a different country. You can think of the travelers as packets and the passport control officer as a network ACL. The passport control officer checks travelers' credentials when they are both entering and exiting out of the country. If a traveler is on an approved list, they are able to get through. However, if they are not on the approved list or are explicitly on a list of banned travelers, they cannot come in. Each AWS account includes a default network ACL. When configuring your VPC, you can use your account's default network ACL or create custom network ACLs. By default, your account's default network ACL allows all inbound and outbound traffic, but you can modify it by adding your own rules. For custom network ACLs, all inbound and outbound traffic is denied until you add rules to specify which traffic to allow. Additionally, all network ACLs have an explicit deny rule. This rule ensures that if a packet doesn't match any of the other rules on the list, the packet is denied. Stateless packet filtering Network ACLs perform stateless packet filtering. They remember nothing and check packets that cross the subnet border each way: inbound and outbound. Recall the previous example of a traveler who wants to enter into a different country. This is similar to sending a request out from an Amazon EC2 instance and to the internet. When a packet response for that request comes back to the subnet, the network ACL does not remember your previous request. The network ACL checks the packet response against its list of rules to determine whether to allow or deny. After a packet has entered a subnet, it must have its permissions evaluated for resources within the subnet, such as Amazon EC2 instances. The VPC component that checks packet permissions for an Amazon EC2 instance is a security group. Security groups A security group is a virtual firewall that controls inbound and outbound traffic for an Amazon EC2 instance. By default, a security group denies all inbound traffic and allows all outbound traffic. You can add custom rules to configure which traffic to allow or deny. For this example, suppose that you are in an apartment building with a door attendant who greets guests in the lobby. You can think of the guests as packets and the door attendant as a security group. As guests arrive, the door attendant checks a list to ensure they can enter the building. However, the door attendant does not check the list again when guests are exiting the building If you have multiple Amazon EC2 instances within a subnet, you can associate them with the same security group or use different security groups for each instance. Stateful packet filtering Security groups perform stateful packet filtering. They remember previous decisions made for incoming packets. Consider the same example of sending a request out from an Amazon EC2 instance to the internet. When a packet response for that request returns to the instance, the security group remembers your previous request. The security group allows the response to proceed, regardless of inbound security group rules. Both network ACLs and security groups enable you to configure custom rules for the traffic in your VPC. As you continue to learn more about AWS security and networking, make sure to understand the differences between network ACLs and security groups. Knowledge check For this review exercise, imagine that your company is launching an online photo storage application. Help determine which VPC component should be used for certain aspects of the application. In the following, match each part of the application to the correct VPC component. Private subnet - Isolate databases containing customers' personal information. Virtual private gateway - Create a VPN connection between the VPC and the internal corporate network. Public subnet - Support the customer-facing website. AWS Direct Connect - Establish a dedicated connection between the on-premises data center and the VPC. Which statement best describes an AWS account's default network access control list? It is stateless and denies all inbound and outbound traffic. Correctly unselected It is stateful and allows all inbound and outbound traffic. Correctly unselected It is stateless and allows all inbound and outbound traffic. Correctly selected It is stateful and denies all inbound and outbound traffic. Correctly unselected SUBMIT Correct The correct response option is It is stateless and allows all inbound and outbound traffic. Network access control lists (ACLs) perform stateless packet filtering. They remember nothing and check packets that cross the subnet border each way: inbound and outbound. Each AWS account includes a default network ACL. When configuring your VPC, you can use your account's default network ACL or create custom network ACLs. By default, your account's default network ACL allows all inbound and outbound traffic, but you can modify it by adding your own rules. For custom network ACLs, all inbound and outbound traffic is denied until you add rules to specify which traffic should be allowed. Additionally, all network ACLs have an explicit deny rule. This rule ensures that if a packet doesn't match any of the other rules on the list, the packet is denied. Global networking Domain Name System (DNS) Suppose that AnyCompany has a website hosted in the AWS Cloud. Customers enter the web address into their browser, and they are able to access the website. This happens because of Domain Name System (DNS) resolution. DNS resolution involves a customer DNS resolver communicating with a company DNS server. You can think of DNS as being the phone book of the internet. DNS resolution is the process of translating a domain name to an IP address. For example, suppose that you want to visit AnyCompany's website. When you enter the domain name into your browser, this request is sent to a customer DNS resolver. The customer DNS resolver asks the company DNS server for the IP address that corresponds to AnyCompany's website. The company DNS server responds by providing the IP address for AnyCompany's website, 192.0.2.0. Amazon Route 53 Amazon Route 53 is a DNS web service. It gives developers and businesses a reliable way to route end users to internet applications hosted in AWS. Amazon Route 53 connects user requests to infrastructure running in AWS (such as Amazon EC2 instances and load balancers). It can route users to infrastructure outside of AWS. Another feature of Route 53 is the ability to manage the DNS records for domain names. You can register new domain names directly in Route 53. You can also transfer DNS records for existing domain names managed by other domain registrars. This enables you to manage all of your domain names within a single location. In the previous module, you learned about Amazon CloudFront, a content delivery service. The following example describes how Route 53 and Amazon CloudFront work together to deliver content to customers. Example: How Amazon Route 53 and Amazon CloudFront deliver content Suppose that AnyCompany's application is running on several Amazon EC2 instances. These instances are in an Auto Scaling group that attaches to an Application Load Balancer. A customer requests data from the application by going to AnyCompany's website. Amazon Route 53 uses DNS resolution to identify AnyCompany.com's corresponding IP address, 192.0.2.0. This information is sent back to the customer. The customer's request is sent to the nearest edge location through Amazon CloudFront. Amazon CloudFront connects to the Application Load Balancer, which sends the incoming packet to an Amazon EC2 instance. Content Delivery Network (CDN) A network that delivers edge content to users based on their geographical location. Knowledge check Which statement best describes DNS resolution? Launching resources in a virtual network that you define Correctly unselected Storing local copies of content at edge locations around the world Correctly unselected Connecting a VPC to the internet Correctly unselected Translating a domain name to an IP address Correctly selected SUBMIT Correct The correct response option is Translating a domain name to an IP address. For example, if you want to visit AnyCompany's website, you enter the domain name into your PC and this request is sent to a DNS server. Next, the DNS server asks the web server for the IP address that corresponds to AnyCompany's website. The web server responds by providing the IP address for AnyCompany's website, 192.0.2.0. In Module 4, you learned about the following concepts: Structuring and connecting to a VPC Securing VPC resources with network access control lists and security groups Using Amazon Route 53 and Amazon CloudFront to deliver content Module 4 Quiz Your company has an application that uses Amazon EC2 instances to run the customer-facing website and Amazon RDS database instances to store customers' personal information. How should the developer configure the VPC according to best practices? Place the Amazon EC2 instances in a private subnet and the Amazon RDS database instances in a public subnet. Correctly unselected Place the Amazon EC2 instances in a public subnet and the Amazon RDS database instances in a private subnet. Correctly selected Place the Amazon EC2 instances and the Amazon RDS database instances in a public subnet. Correctly unselected Place the Amazon EC2 instances and the Amazon RDS database instances in a private subnet. Correctly unselected SUBMIT Correct The correct response option is Place the Amazon EC2 instances in a public subnet and the Amazon RDS databases instances in a private subnet. A subnet is a section of a VPC in which you can group resources based on security or operational needs. Subnets can be public or private. Public subnets contain resources that need to be accessible by the public, such as an online store's website. Private subnets contain resources that should be accessible only through your private network, such as a database that contains customers' personal information and order histories. Which component or service can be used to establish a private dedicated connection between your company's data center and AWS? Private subnet Correctly unselected DNS Correctly unselected AWS Direct Connect Correctly selected Amazon CloudFront Correctly unselected SUBMIT Correct The correct response option is AWS Direct Connect. The other response options are incorrect because: A private subnet is a section of a VPC in which you can group resources that should be accessed only through your private network. Although it is private, it is not used for establishing a connection between a data center and AWS. DNS stands for Domain Name System, which is a directory used for matching domain names to IP addresses. Amazon CloudFront is a content delivery service. You can use CloudFront to store cached copies of your content at edge locations that are close to your customers. Which statement best describes security groups? They are stateful and deny all inbound traffic by default. Correctly selected They are stateful and allow all inbound traffic by default. Correctly unselected They are stateless and deny all inbound traffic by default. Correctly unselected They are stateless and allow all inbound traffic by default. Correctly unselected SUBMIT Correct The correct response option is Security groups are stateful and deny all inbound traffic by default. Security groups are stateful. This means that they use previous traffic patterns and flows when evaluating new requests for an instance. By default, security groups deny all inbound traffic, but you can add custom rules to fit your operational and security needs. Which component is used to connect a VPC to the internet? Public subnet Correctly unselected Edge location Correctly unselected Security group Correctly unselected Internet gateway Correctly selected SUBMIT Correct The correct response option is Internet gateway. The other response options are incorrect because: A public subnet is a section of a VPC that contains public-facing resources. An edge location is a site that Amazon CloudFront uses to store cached copies of your content for faster delivery to customers. A security group is a virtual firewall that controls inbound and outbound traffic for an Amazon EC2 instance. Which service is used to manage the DNS records for domain names? Amazon Virtual Private Cloud Correctly unselected AWS Direct Connect Correctly unselected Amazon CloudFront Correctly unselected Amazon Route 53 Correctly selected SUBMIT Correct The correct response option is Amazon Route 53. Amazon Route 53 is a DNS web service. It gives developers and businesses a reliable way to route end users to internet applications that host in AWS. Another feature of Route 53 is the ability to manage the DNS records for domain names. You can transfer DNS records for existing domain names managed by other domain registrars. You can also register new domain names directly in Route 53. The other response options are incorrect because: Amazon Virtual Private Cloud (Amazon VPC) is a service that enables you to provision an isolated section of the AWS Cloud. In this isolated section, you can launch resources in a virtual network that you define. AWS Direct Connect is a service that enables you to establish a dedicated private connection between your data center and VPC. Amazon CloudFront is a content delivery service. It uses a network of edge locations to cache content and deliver content to customers all over the world.

Messaging and queuing

Messaging and queuing Loosely coupled architecture: single failure won't cause cascading failures. Monolithic applications and microservices Applications are made of multiple components. The components communicate with each other to transmit data, fulfill requests, and keep the application running. Suppose that you have an application with tightly coupled components. These components might include databases, servers, the user interface, business logic, and so on. This type of architecture can be considered a monolithic application. In this approach to application architecture, if a single component fails, other components fail, and possibly the entire application fails. To help maintain application availability when a single component fails, you can design your application through a microservices approach. In a microservices approach, application components are loosely coupled. In this case, if a single component fails, the other components continue to work because they are communicating with each other. The loose coupling prevents the entire application from failing. When designing applications on AWS, you can take a microservices approach with services and components that fulfill different functions. Two services facilitate application integration: Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Service (Amazon SQS). Amazon Simple Notification Service (Amazon SNS) is a publish/subscribe service. Using Amazon SNS topics, a publisher publishes messages to subscribers. This is similar to the coffee shop; the cashier provides coffee orders to the barista who makes the drinks. In Amazon SNS, subscribers can be web servers, email addresses, AWS Lambda functions, or several other options. Amazon Simple Queue Service (Amazon SQS) is a message queuing service. Using Amazon SQS, you can send, store, and receive messages between software components, without losing messages or requiring other services to be available. In Amazon SQS, an application sends messages into a queue. A user or service retrieves a message from the queue, processes it, and then deletes it from the queue. Payload: Data contained within a message Which AWS service is the best choice for publishing messages to subscribers? Amazon Simple Queue Service (Amazon SQS) Correctly unselected Amazon EC2 Auto Scaling Correctly unselected Amazon Simple Notification Service (Amazon SNS) Correctly selected Elastic Load Balancing Correctly unselected SUBMIT Correct The correct response option is Amazon Simple Notification Service (Amazon SNS). Amazon SNS is a publish/subscribe service. Using Amazon SNS topics, a publisher publishes messages to subscribers. The other response options are incorrect because: Amazon Simple Queue Service (Amazon SQS) is a message queuing service. It does not use the message subscription and topic model that is involved with Amazon SNS. Amazon EC2 Auto Scaling enables you to automatically add or remove Amazon EC2 instances in response to changing application demand. Elastic Load Balancing is the AWS service that automatically distributes incoming application traffic across multiple resources, such as Amazon EC2 instances. Additional compute services Serverless computing Earlier in this module, you learned about Amazon EC2, a service that lets you run virtual servers in the cloud. If you have applications that you want to run in Amazon EC2, you must do the following: Provision instances (virtual servers). Upload your code. Continue to manage the instances while your application is running. The term "serverless" means that your code runs on servers, but you do not need to provision or manage these servers. With serverless computing, you can focus more on innovating new products and features instead of maintaining servers. Another benefit of serverless computing is the flexibility to scale serverless applications automatically. Serverless computing can adjust the applications' capacity by modifying the units of consumptions, such as throughput and memory. An AWS service for serverless computing is AWS Lambda. AWS Lambda is a service that lets you run code without needing to provision or manage servers. While using AWS Lambda, you pay only for the compute time that you consume. Charges apply only when your code is running. You can also run code for virtually any type of application or backend service, all with zero administration. For example, a simple Lambda function might involve automatically resizing uploaded images to the AWS Cloud. In this case, the function triggers when uploading a new image. You upload your code to Lambda. You set your code to trigger from an event source, such as AWS services, mobile applications, or HTTP endpoints. Lambda runs your code only when triggered. You pay only for the compute time that you use. In the previous example of resizing images, you would pay only for the compute time that you use when uploading new images. Uploading the images triggers Lambda to run code for the image resizing function. In AWS, you can also build and run containerized applications. Containers Containers provide you with a standard way to package your application's code and dependencies into a single object. You can also use containers for processes and workflows in which there are essential requirements for security, reliability, and scalability. Example: Containers One host with multiple containers Suppose that a company's application developer has an environment on their computer that is different from the environment on the computers used by the IT operations staff. The developer wants to ensure that the application's environment remains consistent regardless of deployment, so they use a containerized approach. This helps to reduce time spent debugging applications and diagnosing differences in computing environments. Tens of hosts with hundreds of containers When running containerized applications, it's important to consider scalability. Suppose that instead of a single host with multiple containers, you have to manage tens of hosts with hundreds of containers. Alternatively, you have to manage possibly hundreds of hosts with thousands of containers. At a large scale, imagine how much time it might take for you to monitor memory usage, security, logging, and so on. Summary Container orchestration services help you to deploy, manage, and scale your containerized applications. Next, you will learn about two services that provide container orchestration: Amazon Elastic Container Service and Amazon Elastic Kubernetes Service. Amazon Elastic Container Service (Amazon ECS) Amazon Elastic Container Service (Amazon ECS) is a highly scalable, high-performance container management system that enables you to run and scale containerized applications on AWS. Amazon ECS supports Docker containers. Docker is a software platform that enables you to build, test, and deploy applications quickly. AWS supports the use of open-source Docker Community Edition and subscription-based Docker Enterprise Edition. With Amazon ECS, you can use API calls to launch and stop Docker-enabled applications. Amazon Elastic Kubernetes Service (Amazon EKS) Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed service that you can use to run Kubernetes on AWS. Kubernetes is open-source software that enables you to deploy and manage containerized applications at scale. A large community of volunteers maintains Kubernetes, and AWS actively works together with the Kubernetes community. As new features and functionalities release for Kubernetes applications, you can easily apply these updates to your applications managed by Amazon EKS. AWS Fargate AWS Fargate is a serverless compute engine for containers. It works with both Amazon ECS and Amazon EKS. When using AWS Fargate, you do not need to provision or manage servers. AWS Fargate manages your server infrastructure for you. You can focus more on innovating and developing your applications, and you pay only for the resources that are required to run your containers.

Module 10

Module 10 introduction Learning objectives In this module, you will learn how to: Summarize the five pillars of the Well-Architected Framework. Explain the six benefits of cloud computing. The AWS Well-Architected Framework The AWS Well-Architected Framework The AWS Well-Architected Framework helps you understand how to design and operate reliable, secure, efficient, and cost-effective systems in the AWS Cloud. It provides a way for you to consistently measure your architecture against best practices and design principles and identify areas for improvement. The Well-Architected Framework is based on five pillars: Operational excellence Security Reliability Performance efficiency Cost optimization Operational excellence - Operational excellence is the ability to run and monitor systems to deliver business value and to continually improve supporting processes and procedures. Design principles for operational excellence in the cloud include performing operations as code, annotating documentation, anticipating failure, and frequently making small, reversible changes. Security - The Security pillar is the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies. When considering the security of your architecture, apply these best practices: Automate security best practices when possible. Apply security at all layers. Protect data in transit and at rest. Reliability - Reliability is the ability of a system to do the following: Recover from infrastructure or service disruptions Dynamically acquire computing resources to meet demand Mitigate disruptions such as misconfigurations or transient network issues Reliability includes testing recovery procedures, scaling horizontally to increase aggregate system availability, and automatically recovering from failure. Performance efficiency - Performance efficiency is the ability to use computing resources efficiently to meet system requirements and to maintain that efficiency as demand changes and technologies evolve. Evaluating the performance efficiency of your architecture includes experimenting more often, using serverless architectures, and designing systems to be able to go global in minutes. Cost optimization - Cost optimization is the ability to run systems to deliver business value at the lowest price point. Cost optimization includes adopting a consumption model, analyzing and attributing expenditure, and using managed services to reduce the cost of ownership. Knowledge check Which pillar of the AWS Well-Architected Framework focuses on the ability of a workload to consistently and correctly perform its intended functions? Operational Excellence Correctly unselected Performance Efficiency Correctly unselected Security Correctly unselected Reliability Correctly selected SUBMIT Correct The correct response option is Reliability. The other response options are incorrect because: The Operational Excellence pillar includes the ability to run workloads effectively, gain insights into their operations, and continuously improve supporting processes to deliver business value. The Performance Efficiency pillar focuses on using computing resources efficiently to meet system requirements, and to maintain that efficiency as demand changes and technologies evolve. The Security pillar includes protecting data, systems, and assets, and using cloud technologies to improve the security of your workloads. Benefits of the AWS Cloud Advantages of cloud computing Operating in the AWS Cloud offers many benefits over computing in on-premises or hybrid environments. In this section, you will learn about six advantages of cloud computing: Trade upfront expense for variable expense. Benefit from massive economies of scale. Stop guessing capacity. Increase speed and agility. Stop spending money running and maintaining data centers. Go global in minutes. Trade upfront expense for variable expense. - Upfront expenses include data centers, physical servers, and other resources that you would need to invest in before using computing resources. Instead of investing heavily in data centers and servers before you know how you're going to use them, you can pay only when you consume computing resources. Benefit from massive economies of scale. - By using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers aggregates in the cloud, providers such as AWS can achieve higher economies of scale. Economies of scale translate into lower pay-as-you-go prices. Stop guessing capacity. - With cloud computing, you don't have to predict how much infrastructure capacity you will need before deploying an application. For example, you can launch Amazon Elastic Compute Cloud (Amazon EC2) instances when needed and pay only for the compute time you use. Instead of paying for resources that are unused or dealing with limited capacity, you can access only the capacity that you need, and scale in or out in response to demand. Increase speed and agility. - The flexibility of cloud computing makes it easier for you to develop and deploy applications. This flexibility also provides your development teams with more time to experiment and innovate. Stop spending money running and maintaining data centers. - Cloud computing in data centers often requires you to spend more money and time managing infrastructure and servers. A benefit of cloud computing is the ability to focus less on these tasks and more on your applications and customers. Go global in minutes. - The AWS Cloud global footprint enables you to quickly deploy applications to customers around the world, while providing them with low latency. Knowledge check Which process is an example of benefiting from massive economies of scale? Deploying an application in multiple Regions around the world Correctly unselected Receiving lower pay-as-you-go prices as the result of AWS customers' aggregated usage of services Correctly selected Paying for compute time as you use it instead of investing upfront costs in data centers Correctly unselected Scaling your infrastructure capacity in and out to meet demand Correctly unselected SUBMIT Correct The correct response option is: Receiving lower pay-as-you-go prices as the result of AWS customers' aggregated usage of services. Because usage from hundreds of thousands of customers is aggregated in the cloud, providers such as AWS can achieve higher economies of scale. The economies of scale translate into lower pay-as-you-go prices. The other response options are incorrect because: Deploying an application in multiple Regions around the world: This process is an example of Go global in minutes. Paying for compute time as you use it instead of investing upfront costs in data centers: This process is an example of Trade upfront expense for variable expense. Scaling your infrastructure capacity in and out to meet demand: This process is an example of Stop guessing capacity. Module 10 summary In Module 10, you learned about the following concepts: The five pillars of the AWS Well-Architected Framework: Operational excellence Security Reliability Performance efficiency Cost optimization Six advantages of cloud computing: Trade upfront expense for variable expense. Benefit from massive economies of scale. Stop guessing capacity. Increase speed and agility. Stop spending money running and maintaining data centers. Go global in minutes. Module 10 quiz Which pillar of the AWS Well-Architected Framework includes the ability to run workloads effectively and gain insights into their operations? Cost Optimization Correctly unselected Operational Excellence Correctly selected Performance Efficiency Correctly unselected Reliability Correctly unselected SUBMIT Correct The correct response option is Operational Excellence. The other response options are incorrect because: The Cost Optimization pillar focuses on the ability to run systems to deliver business value at the lowest price point. The Performance Efficiency pillar focuses on using computing resources efficiently to meet system requirements and to maintain that efficiency as demand changes and technologies evolve. The Reliability pillar focuses on the ability of a workload to consistently and correctly perform its intended functions. What are the benefits of cloud computing? (Select TWO.) Increase speed and agility.Correctly checked Benefit from smaller economies of scale.Correctly unchecked Trade variable expense for upfront expense.Correctly unchecked Maintain infrastructure capacity.Correctly unchecked Stop spending money running and maintaining data centers.Correctly checked SUBMIT Correct The two correct response options are: Increase speed and agility. Stop spending money running and maintaining data centers. The six advantages of cloud computing are: Trade upfront expense for variable expense. Benefit from massive economies of scale. Stop guessing capacity. Increase speed and agility. Stop spending money running and maintaining data centers. Go global in minutes. Exam details Exam domains The AWS Certified Cloud Practitioner exam includes four domains: Cloud Concepts Security and Compliance Technology Billing and Pricing The areas covered describe each domain in the Exam Guide for the AWS Certified Cloud Practitioner certification. For a description of each domain, review the AWS Certified Cloud Practitioner website. You are encouraged to read the information in the Exam Guide as part of your preparation for the exam. Each domain in the exam is weighted. The weight represents the percentage of questions in the exam that correspond to that particular domain. These are approximations, so the questions on your exam may not match these percentages exactly. The exam does not indicate the domain associated with a question. In fact, some questions can potentially fall under multiple domains. Domain Percentage of exam Domain 1: Cloud Concepts 26% Domain 2: Security and Compliance 25% Domain 3: Technology 33% Domain 4: Billing and Pricing 16% Total 100% You are encouraged to use these benchmarks to help you determine how to allocate your time studying for the exam. Recommended experience Candidates for the AWS Certified Cloud Practitioner exam should have a basic understanding of IT services and their uses in the AWS Cloud platform. We recommend that you have at least six months of experience with the AWS Cloud in any role, including project managers, IT managers, sales managers, decision makers, and marketers. These roles are in addition to those working in finance, procurement, and legal departments. Exam details The AWS Certified Cloud Practitioner exam consists of 65 questions to be completed in 90 minutes. The minimum passing score is 70%. Two types of questions are included on the exam: multiple choice and multiple response. A multiple-choice question has one correct response and three incorrect responses, or distractors. A multiple-response question has two or more correct responses out of five or more options. On the exam, there is no penalty for guessing. Any questions that you do not answer are scored as incorrect. If you are not sure of what the correct answer is, it's always best for you to guess instead of leaving any questions unanswered. The exam enables you to flag any questions that you'd like to review before submitting the exam. This helps you to use your time during the exam efficiently, knowing that you can always go back and review any questions that you were initially unsure of. Whitepapers and resources As part of your preparation for the AWS Certified Cloud Practitioner exam, we recommend that you review the following whitepapers and resources: Overview of Amazon Web Services How AWS Pricing Works Compare AWS Support Plans Exam strategies This section explores several strategies that can help you to increase the probability of passing the exam. To learn more, select the + symbol next to each strategy. Read the full question. - First, make sure that you read each question in full. Key words or phrases in the question that, if left unread, could result in you selecting an incorrect response option. Predict the answer before reviewing the response options. - Next, try to predict the correct answer before looking at any of the response options. This strategy helps you to draw directly from your knowledge and skills without distraction from incorrect response options. If your prediction turns out to be one of the response options, this can be helpful for knowing whether you're on the right track. However, make sure that you review all the other response options for that question. Eliminate incorrect response options. - Before selecting your response to a question, eliminate any options that you believe to be incorrect. This strategy helps you to focus on the correct option (or options, for multiple-response questions) and ensure that you have fulfilled all the requirements of the question. Multiple choice AWS Certified Cloud Practitioner exam results are reported as a score from 100-1,000. What is the minimum passing score? 650 Correctly unselected 700 Correctly selected 850 Correctly unselected 900 Correctly unselected SUBMIT Correct The correct response option is 700. Key words and phrases that you might have identified in this question include minimum and AWS Certified Cloud Practitioner. Multiple response Which domains are included on the AWS Certified Cloud Practitioner exam? (Select TWO.) Strategy: Think back to the exam domains that were reviewed earlier in this module. Based on the domains that you recall learning about, which response options do you think that you can eliminate as incorrect? Security and ComplianceCorrectly checked Automation and OptimizationCorrectly unchecked Monitoring and ReportingCorrectly unchecked Billing and PricingCorrectly checked Deployment and ProvisioningCorrectly unchecked SUBMIT Correct The two correct response options are: Security and Compliance Billing and Pricing Key words and phrases that you might have identified in this question include domains and AWS Certified Cloud Practitioner. The other three response options are domains that are included on the AWS Certified SysOps Administrator - Associate exam.

Module 2 Quiz

You want to use an Amazon EC2 instance for a batch processing workload. What would be the best Amazon EC2 instance type to use? General purpose Correctly unselected Memory optimized Correctly unselected Compute optimized Correctly selected Storage optimized Correctly unselected SUBMIT Correct The correct response option is Compute optimized. The other response options are incorrect because: General purpose instances provide a balance of compute, memory, and networking resources. This instance family would not be the best choice for the application in this scenario. Compute optimized instances are more well suited for batch processing workloads than general purpose instances. Memory optimized instances are more ideal for workloads that process large datasets in memory, such as high-performance databases. Storage optimized instances are designed for workloads that require high, sequential read and write access to large datasets on local storage. The question does not specify the size of data that will be processed. Batch processing involves processing data in groups. A compute optimized instance is ideal for this type of workload, which would benefit from a high-performance processor. What are the contract length options for Amazon EC2 Reserved Instances? (Select TWO.) 1 yearCorrectly checked 2 yearsCorrectly unchecked 3 yearsCorrectly checked 4 yearsCorrectly unchecked 5 yearsCorrectly unchecked SUBMIT Correct The two correct response options are: 1 year 3 years Reserved Instances require a commitment of either 1 year or 3 years. The 3-year option offers a larger discount. You have a workload that will run for a total of 6 months and can withstand interruptions. What would be the most cost-efficient Amazon EC2 purchasing option? Reserved Instance Correctly unselected Spot Instance Correctly selected Dedicated Instance Correctly unselected On-Demand Instance Correctly unselected SUBMIT Correct The correct response option is Spot Instance. The other response options are incorrect because: Reserved Instances require a contract length of either 1 year or 3 years. The workload in this scenario will only be running for 6 months. Dedicated Instances run in a virtual private cloud (VPC) on hardware that is dedicated to a single customer. They have a higher cost than the other response options, which run on shared hardware. On-Demand Instances fulfill the requirements of running for only 6 months and withstanding interruptions. However, a Spot Instance would be the best choice because it does not require a minimum contract length, is able to withstand interruptions, and costs less than an On-Demand Instance. Which process is an example of Elastic Load Balancing? Ensuring that no single Amazon EC2 instance has to carry the full workload on its own Correctly selected Removing unneeded Amazon EC2 instances when demand is low Correctly unselected Adding a second Amazon EC2 instance during an online store's popular sale Correctly unselected Automatically adjusting the number of Amazon EC2 instances to meet demand Correctly unselected SUBMIT Correct The correct response option is Ensuring that no single Amazon EC2 instance has to carry the full workload on its own. Elastic Load Balancing is the AWS service that automatically distributes incoming application traffic across multiple resources, such as Amazon EC2 instances. This helps to ensure that no single resource becomes overutilized. The other response options are all examples of Auto Scaling. You want to deploy and manage containerized applications. Which service should you use? AWS Lambda Correctly unselected Amazon Simple Notification Service (Amazon SNS) Correctly unselected Amazon Simple Queue Service (Amazon SQS) Correctly unselected Amazon Elastic Kubernetes Service (Amazon EKS) Correctly selected SUBMIT Correct The correct response option is Amazon Elastic Kubernetes Service (Amazon EKS). Amazon EKS is a fully managed Kubernetes service. Kubernetes is open-source software that enables you to deploy and manage containerized applications at scale. The other response options are incorrect because: AWS Lambda is a service that lets you run code without provisioning or managing servers. Amazon Simple Queue Service (Amazon SQS) is a service that enables you to send, store, and receive messages between software components through a queue. Amazon Simple Notification Service (Amazon SNS) is a publish/subscribe service. Using Amazon SNS topics, a publisher publishes messages to subscribers.

Module 7

Module 7 introduction Learning objectives In this module, you will learn how to: Summarize approaches to monitoring your AWS environment. Describe the benefits of Amazon CloudWatch. Describe the benefits of AWS CloudTrail. Describe the benefits of AWS Trusted Advisor. Amazon CloudWatch Amazon CloudWatch is a web service that enables you to monitor and manage various metrics and configure alarm actions based on data from those metrics. CloudWatch uses metrics to represent the data points for your resources. AWS services send metrics to CloudWatch. CloudWatch then uses these metrics to create graphs automatically that show how performance has changed over time. CloudWatch alarms With CloudWatch, you can create alarms that automatically perform actions if the value of your metric has gone above or below a predefined threshold. For example, suppose that your company's developers use Amazon EC2 instances for application development or testing purposes. If the developers occasionally forget to stop the instances, the instances will continue to run and incur charges. In this scenario, you could create a CloudWatch alarm that automatically stops an Amazon EC2 instance when the CPU utilization percentage has remained below a certain threshold for a specified period. When configuring the alarm, you can specify to receive a notification whenever this alarm is triggered. CloudWatch dashboard The CloudWatch dashboard feature enables you to access all the metrics for your resources from a single location. For example, you can use a CloudWatch dashboard to monitor the CPU utilization of an Amazon EC2 instance, the total number of requests made to an Amazon S3 bucket, and more. You can even customize separate dashboards for different business purposes, applications, or resources. AWS CloudTrail AWS CloudTrail records API calls for your account. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, and more. You can think of CloudTrail as a "trail" of breadcrumbs (or a log of actions) that someone has left behind them. Recall that you can use API calls to provision, manage, and configure your AWS resources. With CloudTrail, you can view a complete history of user activity and API calls for your applications and resources. Events are typically updated in CloudTrail within 15 minutes after an API call. You can filter events by specifying the time and date that an API call occurred, the user who requested the action, the type of resource that was involved in the API call, and more. Example: AWS CloudTrail event Suppose that the coffee shop owner is browsing through the AWS Identity and Access Management (IAM) section of the AWS Management Console. They discover that a new IAM user named Mary was created, but they do not know who, when, or which method created the user. To answer these questions, the owner navigates to AWS CloudTrail. In the CloudTrail Event History section, the owner applies a filter to display only the events for the "CreateUser" API action in IAM. The owner locates the event for the API call that created an IAM user for Mary. This event record provides complete details about what occurred: On January 1, 2020 at 9:00 AM, IAM user John created a new IAM user (Mary) through the AWS Management Console. CloudTrail Insights Within CloudTrail, you can also enable CloudTrail Insights. This optional feature allows CloudTrail to automatically detect unusual API activities in your AWS account. For example, CloudTrail Insights might detect that a higher number of Amazon EC2 instances than usual have recently launched in your account. You can then review the full event details to determine which actions you need to take next. Knowledge check Which tasks can you perform using AWS CloudTrail? (Select TWO.) Monitor your AWS infrastructure and resources in real timeCorrectly unchecked Track user activities and API requests throughout your AWS infrastructureCorrectly checked View metrics and graphs to monitor the performance of resourcesCorrectly unchecked Filter logs to assist with operational analysis and troubleshootingCorrectly checked Configure automatic actions and alerts in response to metricsCorrectly unchecked SUBMIT Correct The correct two response options are: Track user activities and API requests throughout your AWS infrastructure Filter logs to assist with operational analysis and troubleshooting The other response options are tasks that you can perform in Amazon CloudWatch. AWS Trusted Advisor AWS Trusted Advisor is a web service that inspects your AWS environment and provides real-time recommendations in accordance with AWS best practices. Trusted Advisor compares its findings to AWS best practices in five categories: Cost Optimization Performance Security Fault tolerance Service limits For the checks in each category, Trusted Advisor offers a list of recommended actions and additional resources to learn more about AWS best practices. The guidance provided by AWS Trusted Advisor can benefit your company at all stages of deployment. For example, you can use AWS Trusted Advisor to assist you while you are creating new workflows and developing new applications. Or you can use it while you are making ongoing improvements to existing applications and resources. AWS Trusted Advisor dashboard When you access the Trusted Advisor dashboard on the AWS Management Console, you can review completed checks for cost optimization, performance, security, fault tolerance, and service limits. For each category: bulletThe green check indicates the number of items for which it detected no problems. bulletThe orange triangle represents the number of recommended investigations. bulletThe red circle represents the number of recommended actions. In Module 7, you learned about the following concepts: Amazon CloudWatch AWS CloudTrail AWS Trusted Advisor Additional resources To learn more about the concepts that were explored in Module 7, review these resources. Management and Governance on AWS Monitoring and Observability Configuration, Compliance, and Auditing AWS Management & Governance Blog Whitepaper: AWS Governance at Scale Module 7 Quiz Which actions can you perform using Amazon CloudWatch? (Select TWO.) Monitor your resources' utilization and performanceCorrectly checked Receive real-time guidance for improving your AWS environmentCorrectly unchecked Compare your infrastructure to AWS best practices in five categoriesCorrectly unchecked Access metrics from a single dashboardCorrectly checked Automatically detect unusual account activityCorrectly unchecked SUBMIT Correct The two correct response options are: Monitor your resources' utilization and performance Access metrics from a single dashboard The other response options are incorrect because: Receiving real-time recommendations for improving your AWS environment can be performed by AWS Trusted Advisor. Comparing your infrastructure to AWS best practices in five categories can be performed by AWS Trusted Advisor. Automatically detecting unusual account activity can be performed by AWS CloudTrail. Which service enables you to review the security of your Amazon S3 buckets by checking for open access permissions? Amazon CloudWatch Correctly unselected AWS CloudTrail Correctly unselected AWS Trusted Advisor Correctly selected Amazon GuardDuty Correctly unselected SUBMIT Correct The correct response option is AWS Trusted Advisor. AWS Trusted Advisor is a web service that inspects your AWS environment and provides real-time recommendations in accordance with AWS best practices. The inspection includes security checks, such as Amazon S3 buckets with open access permissions. The other response options are incorrect because: Amazon CloudWatch is a web service that enables you to monitor and manage various metrics for the resources that run your applications. AWS CloudTrail is a web service that enables you to review details for user activities and API calls that have occurred within your AWS environment. Amazon GuardDuty is a service that provides intelligent threat detection for your AWS environment and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment. Which categories are included in the AWS Trusted Advisor dashboard? (Select TWO.) ReliabilityCorrectly unchecked PerformanceCorrectly checked ScalabilityCorrectly unchecked ElasticityCorrectly unchecked Fault toleranceCorrectly checked SUBMIT Correct The two correct response options are: Performance Fault tolerance AWS Trusted Advisor continuously inspects your AWS environment and provides best practice recommendations across five categories: cost optimization, performance, security, fault tolerance, and service limits.

Module 8

Module 8 introduction Learning objectives In this module, you will learn how to: Describe AWS pricing and support models. Describe the AWS Free Tier. Describe key benefits of AWS Organizations and consolidated billing. Explain the benefits of AWS Budgets. Explain the benefits of AWS Cost Explorer. Explain the primary benefits of the AWS Pricing Calculator. Distinguish between the various AWS Support Plans. Describe the benefits of AWS Marketplace. AWS Free Tier The AWS Free Tier enables you to begin using certain services without having to worry about incurring costs for the specified period. Three types of offers are available: Always Free 12 Months Free Trials For each free tier offer, make sure to review the specific details about exactly which resource types are included. Always Free - These offers do not expire and are available to all AWS customers. For example, AWS Lambda allows 1 million free requests and up to 3.2 million seconds of compute time per month. Amazon DynamoDB allows 25 GB of free storage per month. 12 Months Free - These offers are free for 12 months following your initial sign-up date to AWS. Examples include specific amounts of Amazon S3 Standard Storage, thresholds for monthly hours of Amazon EC2 compute time, and amounts of Amazon CloudFront data transfer out. Trials - Short-term free trial offers start from the date you activate a particular service. The length of each trial might vary by number of days or the amount of usage in the service. For example, Amazon Inspector offers a 90-day free trial. Amazon Lightsail (a service that enables you to run virtual private servers) offers 750 free hours of usage over a 30-day period. Knowledge check The AWS Free Tier includes offers that are available to new AWS customers for a certain period of time following their AWS sign-up date. What is the duration of this period? 3 months Correctly unselected 6 months Correctly unselected 9 months Correctly unselected 12 months Correctly selected SUBMIT Correct The correct response option is 12 months. The AWS Free Tier consists of three types of offers that allow customers to use AWS services without incurring costs: Always free, 12 months free, and Trials. For 12 months after you first sign up for an AWS account, you can take advantage of offers in the 12 Months Free category. Examples of offers in this category include specific amounts of Amazon S3 Standard Storage, thresholds for monthly hours of Amazon EC2 compute time, and amounts of Amazon CloudFront data transfer out. AWS pricing concepts How AWS pricing works AWS offers a range of cloud computing services with pay-as-you-go pricing. To learn more, select the + symbol next to each category. Pay for what you use. - For each service, you pay for exactly the amount of resources that you actually use, without requiring long-term contracts or complex licensing. Pay less when you reserve. - Some services offer reservation options that provide a significant discount compared to On-Demand Instance pricing. For example, suppose that your company is using Amazon EC2 instances for a workload that needs to run continuously. You might choose to run this workload on Amazon EC2 Instance Savings Plans, because the plan allows you to save up to 72% over the equivalent On-Demand Instance capacity. Pay less with volume-based discounts when you use more. - Some services offer tiered pricing, so the per-unit cost is incrementally lower with increased usage. For example, the more Amazon S3 storage space you use, the less you pay for it per GB. AWS Pricing Calculator The AWS Pricing Calculator lets you explore AWS services and create an estimate for the cost of your use cases on AWS. You can organize your AWS estimates by groups that you define. A group can reflect how your company is organized, such as providing estimates by cost center. When you have created an estimate, you can save it and generate a link to share it with others. Suppose that your company is interested in using Amazon EC2. However, you are not yet sure which AWS Region or instance type would be the most cost-efficient for your use case. In the AWS Pricing Calculator, you can enter details such as the kind of operating system you need, memory requirements, and input/output (I/O) requirements. By using the AWS Pricing Calculator, you can review an estimated comparison of different EC2 instance types across AWS Regions. AWS pricing examples This section presents a few examples of pricing in AWS services. AWS Lambda To learn more about AWS Lambda pricing, select each tab. AWS LAMBDA PRICING For AWS Lambda, you are charged based on the number of requests for your functions and the time that it takes for them to run. AWS Lambda allows 1 million free requests and up to 3.2 million seconds of compute time per month. You can save on AWS Lambda costs by signing up for Compute Savings Plans. Compute Savings Plans offer lower compute costs in exchange for committing to a consistent amount of usage over a 1-year or 3-year term. This is an example of paying less when you reserve. PRICING EXAMPLE If you have used AWS Lambda in multiple AWS Regions, you can view the itemized charges by Region on your bill. In this example, all the AWS Lambda usage occurred in the Northern Virginia Region. The bill lists separate charges for the number of requests for functions and their duration. Both the number of requests and the total duration of requests in this example are under the thresholds in the AWS Free Tier, so the account owner would not have to pay for any AWS Lambda usage in this month. Amazon EC2 To learn more about Amazon EC2 pricing, select each tab. AMAZON EC2 PRICING With Amazon EC2, you pay for only the compute time that you use while your instances are running. For some workloads, you can significantly reduce Amazon EC2 costs by using Spot Instances. For example, suppose that you are running a batch processing job that is able to withstand interruptions. Using a Spot Instance would provide you with up to 90% cost savings while still meeting the availability requirements of your workload. You can find additional cost savings for Amazon EC2 by considering Savings Plans and Reserved Instances. PRICING EXAMPLE The service charges in this example include details for the following items: Each Amazon EC2 instance type that has been used The amount of Amazon EBS storage space that has been provisioned The length of time that Elastic Load Balancing has been used In this example, all the usage amounts are under the thresholds in the AWS Free Tier, so the account owner would not have to pay for any Amazon EC2 usage in this month. Amazon S3 To learn more about Amazon S3 pricing, select each tab. AMAZON S3 PRICING For Amazon S3 pricing, consider the following cost components: Storage - You pay for only the storage that you use. You are charged the rate to store objects in your Amazon S3 buckets based on your objects' sizes, storage classes, and how long you have stored each object during the month. Requests and data retrievals - You pay for requests made to your Amazon S3 objects and buckets. For example, suppose that you are storing photo files in Amazon S3 buckets and hosting them on a website. Every time a visitor requests the website that includes these photo files, this counts towards requests you must pay for. Data transfer - There is no cost to transfer data between different Amazon S3 buckets or from Amazon S3 to other services within the same AWS Region. However, you pay for data that you transfer into and out of Amazon S3, with a few exceptions. There is no cost for data transferred into Amazon S3 from the internet or out to Amazon CloudFront. There is also no cost for data transferred out to an Amazon EC2 instance in the same AWS Region as the Amazon S3 bucket. Management and replication - You pay for the storage management features that you have enabled on your account's Amazon S3 buckets. These features include Amazon S3 inventory, analytics, and object tagging. PRICING EXAMPLE The AWS account in this example has used Amazon S3 in two Regions: Northern Virginia and Ohio. For each Region, itemized charges are based on the following factors: The number of requests to add or copy objects into a bucket The number of requests to retrieve objects from a bucket The amount of storage space used All the usage for Amazon S3 in this example is under the AWS Free Tier limits, so the account owner would not have to pay for any Amazon S3 usage in this month. Billing dashboard Use the AWS Billing & Cost Management dashboard to pay your AWS bill, monitor your usage, and analyze and control your costs. Compare your current month-to-date balance with the previous month, and get a forecast of the next month based on current usage. View month-to-date spend by service. View Free Tier usage by service. Access Cost Explorer and create budgets. Purchase and manage Savings Plans. Publish AWS Cost and Usage Reports. Consolidated billing In an earlier module, you learned about AWS Organizations, a service that enables you to manage multiple AWS accounts from a central location. AWS Organizations also provides the option for consolidated billing. The consolidated billing feature of AWS Organizations enables you to receive a single bill for all AWS accounts in your organization. By consolidating, you can easily track the combined costs of all the linked accounts in your organization. The default maximum number of accounts allowed for an organization is 4, but you can contact AWS Support to increase your quota, if needed. On your monthly bill, you can review itemized charges incurred by each account. This enables you to have greater transparency into your organization's accounts while still maintaining the convenience of receiving a single monthly bill. Another benefit of consolidated billing is the ability to share bulk discount pricing, Savings Plans, and Reserved Instances across the accounts in your organization. For instance, one account might not have enough monthly usage to qualify for discount pricing. However, when multiple accounts are combined, their aggregated usage may result in a benefit that applies across all accounts in the organization. Example: Consolidated billing To review an example of consolidated billing, select Start. START Step 1 Suppose that you are the business leader who oversees your company's AWS billing. Your company has three AWS accounts used for separate departments. Instead of paying each location's monthly bill separately, you decide to create an organization and add the three accounts. You manage the organization through the primary account. Example: Consolidated billing To review an example of consolidated billing, select Start. START Step 1 Suppose that you are the business leader who oversees your company's AWS billing. Your company has three AWS accounts used for separate departments. Instead of paying each location's monthly bill separately, you decide to create an organization and add the three accounts. You manage the organization through the primary account. 1 2 3 Step 2 Each month, AWS charges your primary payer account for all the linked accounts in a consolidated bill. Through the primary account, you can also get a detailed cost report for each linked account. The monthly consolidated bill also includes the account usage costs incurred by the primary account. This cost is not a premium charge for having a primary account. The consolidated bill shows the costs associated with any actions of the primary account (such as storing files in Amazon S3 or running Amazon EC2 instances). Consolidated billing also enables you to share volume pricing discounts across accounts. Some AWS services, such as Amazon S3, provide volume pricing discounts that give you lower prices the more that you use the service. In Amazon S3, after customers have transferred 10 TB of data in a month, they pay a lower per-GB transfer price for the next 40 TB of data transferred. In this example, there are three separate AWS accounts that have transferred different amounts of data in Amazon S3 during the current month: Account 1 has transferred 2 TB of data. Account 2 has transferred 5 TB of data. Account 3 has transferred 7 TB of data. Because no single account has passed the 10 TB threshold, none of them is eligible for the lower per-GB transfer price for the next 40 TB of data transferred. Now, suppose that these three separate accounts are brought together as linked accounts within a single AWS organization and are using consolidated billing. When the Amazon S3 usage for the three linked accounts is combined (2+5+7), this results in a combined data transfer amount of 14 TB. This exceeds the 10-TB threshold. With consolidated billing, AWS combines the usage from all accounts to determine which volume pricing tiers to apply, giving you a lower overall price whenever possible. AWS then allocates each linked account a portion of the overall volume discount based on the account's usage. In this example, Account 3 would receive a greater portion of the overall volume discount because at 7 TB, it has transferred more data than Account 1 (at 2 TB) and Account 2 (at 5 TB). AWS Budgets In AWS Budgets, you can create budgets to plan your service usage, service costs, and instance reservations. The information in AWS Budgets updates three times a day. This helps you to accurately determine how close your usage is to your budgeted amounts or to the AWS Free Tier limits. In AWS Budgets, you can also set custom alerts when your usage exceeds (or is forecasted to exceed) the budgeted amount. Example: AWS Budgets Suppose that you have set a budget for Amazon EC2. You want to ensure that your company's usage of Amazon EC2 does not exceed $200 for the month. In AWS Budgets, you could set a custom budget to notify you when your usage has reached half of this amount ($100). This setting would allow you to receive an alert and decide how you would like to proceed with your continued use of Amazon EC2. To learn more, select each marker. AWS Cost Explorer AWS Cost Explorer AWS Cost Explorer is a tool that enables you to visualize, understand, and manage your AWS costs and usage over time. AWS Cost Explorer includes a default report of the costs and usage for your top five cost-accruing AWS services. You can apply custom filters and groups to analyze your data. For example, you can view resource usage at the hourly level. Example: AWS Cost Explorer This example of the AWS Cost Explorer dashboard displays monthly costs for Amazon EC2 instances over a 6-month period. The bar for each month separates the costs for different Amazon EC2 instance types (such as t2.micro or m3.large). By analyzing your AWS costs over time, you can make informed decisions about future costs and how to plan your budgets. AWS Support plans AWS Support AWS offers four different Support plans to help you troubleshoot issues, lower costs, and efficiently use AWS services. You can choose from the following Support plans to meet your company's needs: Basic Developer Business Enterprise Basic Support Basic Support is free for all AWS customers. It includes access to whitepapers, documentation, and support communities. With Basic Support, you can also contact AWS for billing questions and service limit increases. With Basic Support, you have access to a limited selection of AWS Trusted Advisor checks. Additionally, you can use the AWS Personal Health Dashboard, a tool that provides alerts and remediation guidance when AWS is experiencing events that may affect you. If your company needs support beyond the Basic level, you could consider purchasing Developer, Business, or Enterprise Support. Developer, Business, and Enterprise Support The Developer, Business, and Enterprise Support plans include all the benefits of Basic Support, in addition to the ability to open an unrestricted number of technical support cases. These three Support plans have pay-by-the-month pricing and require no long-term contracts. The information in this course highlights only a selection of details for each Support plan. A complete overview of what is included in each Support plan, including pricing for each plan, is available on the AWS Support site. In general, for pricing, the Developer plan has the lowest cost, the Business plan is in the middle, and the Enterprise plan has the highest cost. Developer Support - Customers in the Developer Support plan have access to features such as: Best practice guidance Client-side diagnostic tools Building-block architecture support, which consists of guidance for how to use AWS offerings, features, and services together For example, suppose that your company is exploring AWS services. You've heard about a few different AWS services. However, you're unsure of how to potentially use them together to build applications that can address your company's needs. In this scenario, the building-block architecture support that is included with the Developer Support plan could help you to identify opportunities for combining specific services and features. Business Support - Customers with a Business Support plan have access to additional features, including: Use-case guidance to identify AWS offerings, features, and services that can best support your specific needs All AWS Trusted Advisor checks Limited support for third-party software, such as common operating systems and application stack components Suppose that your company has the Business Support plan and wants to install a common third-party operating system onto your Amazon EC2 instances. You could contact AWS Support for assistance with installing, configuring, and troubleshooting the operating system. For advanced topics such as optimizing performance, using custom scripts, or resolving security issues, you may need to contact the third-party software provider directly. Enterprise Support - In addition to all the features included in the Basic, Developer, and Business Support plans, customers with an Enterprise Support plan have access to features such as: Application architecture guidance, which is a consultative relationship to support your company's specific use cases and applications Infrastructure event management: A short-term engagement with AWS Support that helps your company gain a better understanding of your use cases. This also provides your company with architectural and scaling guidance. A Technical Account Manager Technical Account Manager (TAM) The Enterprise Support plan includes access to a Technical Account Manager (TAM). If your company has an Enterprise Support plan, the TAM is your primary point of contact at AWS. They provide guidance, architectural reviews, and ongoing communication with your company as you plan, deploy, and optimize your applications. Your TAM provides expertise across the full range of AWS services. They help you design solutions that efficiently use multiple services together through an integrated approach. For example, suppose that you are interested in developing an application that uses several AWS services together. Your TAM could provide insights into how to best use the services together. They achieve this, while aligning with the specific needs that your company is hoping to address through the new application. Knowledge check Which Support plan includes all AWS Trusted Advisor checks at the lowest cost? Basic Correctly unselected Developer Correctly unselected Business Correctly selected Enterprise Correctly unselected SUBMIT Correct The correct response option is Business. Only the Business and Enterprise Support plans include all AWS Trusted Advisor checks. Of these two Support plans, the Business Support plan has a lower cost. AWS Marketplace AWS Marketplace is a digital catalog that includes thousands of software listings from independent software vendors. You can use AWS Marketplace to find, test, and buy software that runs on AWS. For each listing in AWS Marketplace, you can access detailed information on pricing options, available support, and reviews from other AWS customers. You can also explore software solutions by industry and use case. For example, suppose that your company is in the healthcare industry. In AWS Marketplace, you can review use cases that software helps you to address, such as implementing solutions to protect patient records or using machine learning models to analyze a patient's medical history and predict possible health risks. AWS Marketplace categories AWS Marketplace offers products in several categories, such as Infrastructure Products, Business Applications, Data Products, and DevOps. Within each category, you can narrow your search by browsing through product listings in subcategories. For example, subcategories in the DevOps category include areas such as Application Development, Monitoring, and Testing. Module 8 summary In Module 8, you learned about the following concepts: Three types of offers included in the AWS Free Tier: 12 months free, Always free, and Trials Benefits of consolidated billing in AWS Organizations Tools for planning, estimating, and reviewing AWS costs Differences between the four AWS Support plans: Basic, Developer, Business, and Enterprise How to discover software in AWS Marketplace Module 8 Quiz Which action can you perform with consolidated billing? Review how much cost your predicted AWS usage will incur by the end of the month. Correctly unselected Create an estimate for the cost of your use cases on AWS. Correctly unselected Combine usage across accounts to receive volume pricing discounts. Correctly selected Visualize and manage your AWS costs and usage over time. Correctly unselected SUBMIT Correct The correct response option is: Combine usage across accounts to receive volume pricing discounts. The other response options are incorrect because: Review how much cost your predicted AWS usage will incur by the end of the month - You can perform this action in AWS Budgets. Create an estimate for the cost of your use cases on AWS - You can perform this action in AWS Pricing Calculator. Visualize and manage your AWS costs and usage over time - You can perform this action in AWS Cost Explorer. Which pricing tool is used to visualize, understand, and manage your AWS costs and usage over time? AWS Pricing Calculator Correctly unselected AWS Budgets Correctly unselected AWS Cost Explorer Correctly selected AWS Free Tier Correctly unselected SUBMIT Correct The correct response option is AWS Cost Explorer. AWS Cost Explorer includes a default report of the costs and usage for your top five cost-accruing AWS services. You can apply custom filters and groups to analyze your data. For example, you can view resource usage at the hourly level. The other response options are incorrect because: AWS Pricing Calculator enables you to create an estimate for the cost of your use cases on AWS. AWS Budgets enables you to create budgets to plan your service usage, service costs, and instance reservations. In AWS Budgets, you can also set custom alerts when your usage exceeds (or is forecasted to exceed) the budgeted amount. The AWS Free Tier is a program that consists of three types of offers that allow customers to use AWS services without incurring costs: Always free, 12 months free, and Trials. Which pricing tool enables you to receive alerts when your service usage exceeds a threshold that you have defined? Billing dashboard in the AWS Management Console Correctly unselected AWS Budgets Correctly selected AWS Free Tier Correctly unselected AWS Cost Explorer Correctly unselected SUBMIT Correct The correct response option is AWS Budgets. In AWS Budgets, you can set custom alerts that will notify you when your service usage exceeds (or is forecasted to exceed) the amount that you have budgeted. Your budget can be based on costs or usage. For example, you can set an alert that will notify you when you have incurred $100.00 of costs in Amazon EC2 or 500,000 requests in AWS Lambda. The other response options are incorrect because: From the billing dashboard in the AWS Management Console, you can view details on your AWS bill, such as service costs by Region, month to date spend, and more. However, you cannot set alerts from the billing dashboard. The AWS Free Tier is a program that consists of three types of offers that allow customers to use AWS services without incurring costs: Always free, 12 months free, and Trials. AWS Cost Explorer is a tool that enables you to visualize, understand, and manage your AWS costs and usage over time. Your company wants to receive support from an AWS Technical Account Manager (TAM). Which support plan should you choose? Developer Correctly unselected Enterprise Correctly selected Basic Correctly unselected Business Correctly unselected SUBMIT Correct The correct response option is Enterprise. A Technical Account Manager (TAM) is available only to AWS customers with an Enterprise Support plan. A TAM provides guidance, architectural reviews, and ongoing communication with your company as you plan, deploy, and optimize your applications. Which service or resource is used to find third-party software that runs on AWS? AWS Marketplace Correctly selected AWS Free Tier Correctly unselected AWS Support Correctly unselected Billing dashboard in the AWS Management Console Correctly unselected SUBMIT Correct The correct response option is AWS Marketplace. AWS Marketplace is a digital catalog that includes thousands of software listings from independent software vendors. You can use AWS Marketplace to find, test, and buy software that runs on AWS. The other response options are incorrect because: The AWS Free Tier consists of offers that allow customers to use AWS services without incurring costs. These offers are related to AWS services, not third-party software that can be used on AWS. AWS Support is a resource that can answer questions about best practices, assist with troubleshooting issues, help you to identify ways to optimize your use of AWS services, and so on. You can use the billing dashboard in the AWS Management Console to view details such as service costs by Region, the top services being used by your account, and forecasted billing costs. From the billing dashboard, you can also access other AWS billing tools, such as AWS Cost Explorer, AWS Budgets, and AWS Budgets Reports.

Module 9

Module 9 introduction Learning objectives In this module, you will learn how to: Understand migration and innovation in the AWS Cloud. Summarize the AWS Cloud Adoption Framework (AWS CAF). Summarize the six key factors of a cloud migration strategy. Describe the benefits of AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile. Summarize the broad scope of innovative solutions that AWS offers. AWS Cloud Adoption Framework (AWS CAF) Six core perspectives of the Cloud Adoption Framework At the highest level, the AWS Cloud Adoption Framework (AWS CAF) organizes guidance into six areas of focus, called Perspectives. Each Perspective addresses distinct responsibilities. The planning process helps the right people across the organization prepare for the changes ahead. In general, the Business, People, and Governance Perspectives focus on business capabilities, whereas the Platform, Security, and Operations Perspectives focus on technical capabilities. Business Perspective - The Business Perspective ensures that IT aligns with business needs and that IT investments link to key business results. Use the Business Perspective to create a strong business case for cloud adoption and prioritize cloud adoption initiatives. Ensure that your business strategies and goals align with your IT strategies and goals. Common roles in the Business Perspective include: Business managers Finance managers Budget owners Strategy stakeholders People Perspective - The People Perspective supports development of an organization-wide change management strategy for successful cloud adoption. Use the People Perspective to evaluate organizational structures and roles, new skill and process requirements, and identify gaps. This helps prioritize training, staffing, and organizational changes. Common roles in the People Perspective include: Human resources Staffing People managers Governance Perspective - The Governance Perspective focuses on the skills and processes to align IT strategy with business strategy. This ensures that you maximize the business value and minimize risks. Use the Governance Perspective to understand how to update the staff skills and processes necessary to ensure business governance in the cloud. Manage and measure cloud investments to evaluate business outcomes. Common roles in the Governance Perspective include: Chief Information Officer (CIO) Program managers Enterprise architects Business analysts Portfolio managers Platform Perspective - The Platform Perspective includes principles and patterns for implementing new solutions on the cloud, and migrating on-premises workloads to the cloud. Use a variety of architectural models to understand and communicate the structure of IT systems and their relationships. Describe the architecture of the target state environment in detail. Common roles in the Platform Perspective include: Chief Technology Officer (CTO) IT managers Solutions architects Security Perspective - The Security Perspective ensures that the organization meets security objectives for visibility, auditability, control, and agility. Use the AWS CAF to structure the selection and implementation of security controls that meet the organization's needs. Common roles in the Security Perspective include: Chief Information Security Officer (CISO) IT security managers IT security analysts Operations Perspective - The Operations Perspective helps you to enable, run, use, operate, and recover IT workloads to the level agreed upon with your business stakeholders. Define how day-to-day, quarter-to-quarter, and year-to-year business is conducted. Align with and support the operations of the business. The AWS CAF helps these stakeholders define current operating procedures and identify the process changes and training needed to implement successful cloud adoption. Common roles in the Operations Perspective include: IT operations managers IT support managers Knowledge check Which Perspective of the AWS Cloud Adoption Framework helps you design, implement, and optimize your AWS infrastructure based on your business goals and perspectives? Business Perspective Correctly unselected Platform Perspective Correctly selected Operations Perspective Correctly unselected People Perspective Correctly unselected SUBMIT Correct The correct response option is Platform Perspective. The Platform Perspective of the AWS Cloud Adoption Framework also includes principles for implementing new solutions and migrating on-premises workloads to the cloud. The other response options are incorrect because: The Business Perspective helps you to move from a model that separates business and IT strategies into a business model that integrates IT strategy. The Operations Perspective focuses on operating and recovering IT workloads to meet the requirements of your business stakeholders. The People Perspective helps Human Resources (HR) employees prepare their teams for cloud adoption by updating organizational processes and staff skills to include cloud-based competencies. 6 strategies for migration When migrating applications to the cloud, six of the most common migration strategies that you can implement are: Rehosting Replatforming Refactoring/re-architecting Repurchasing Retaining Retiring Rehosting - Rehosting also known as "lift-and-shift" involves moving applications without changes. In the scenario of a large legacy migration, in which the company is looking to implement its migration and scale quickly to meet a business case, the majority of applications are rehosted. Replatforming - Replatforming, also known as "lift, tinker, and shift," involves making a few cloud optimizations to realize a tangible benefit. Optimization is achieved without changing the core architecture of the application. Refactoring/re-architecting - Refactoring (also known as re-architecting) involves reimagining how an application is architected and developed by using cloud-native features. Refactoring is driven by a strong business need to add features, scale, or performance that would otherwise be difficult to achieve in the application's existing environment. Repurchasing - Repurchasing involves moving from a traditional license to a software-as-a-service model. For example, a business might choose to implement the repurchasing strategy by migrating from a customer relationship management (CRM) system to Salesforce.com. Retaining - Retaining consists of keeping applications that are critical for the business in the source environment. This might include applications that require major refactoring before they can be migrated, or, work that can be postponed until a later time. Retiring - Retiring is the process of removing applications that are no longer needed. Knowledge check Which migration strategy involves moving to a different product? Refactoring Correctly unselected Retiring Correctly unselected Replatforming Correctly unselected Repurchasing Correctly selected SUBMIT Correct The correct response option is Repurchasing. Repurchasing involves replacing an existing application with a cloud-based version, such as software found in AWS Marketplace. The other response options are incorrect because: Refactoring involves changing how an application is architected and developed, typically by using cloud-native features. Retiring involves removing an application that is no longer used or that can be turned off. Replatforming involves selectively optimizing aspects of an application to achieve benefits in the cloud without changing the core architecture of the application. It is also known as "lift, tinker, and shift." AWS Snow Family AWS Snow Family members The AWS Snow Family is a collection of physical devices that help to physically transport up to exabytes of data into and out of AWS. AWS Snow Family is composed of AWS Snowcone, AWS Snowball, and AWS Snowmobile. These devices offer different capacity points, and most include built-in computing capabilities. AWS owns and manages the Snow Family devices and integrates with AWS security, monitoring, storage management, and computing capabilities. To learn about each category, select each tab. AWS SNOWCONE AWS Snowcone is a small, rugged, and secure edge computing and data transfer device. It features 2 CPUs, 4 GB of memory, and 8 TB of usable storage. AWS SNOWBALL AWS Snowball offers two types of devices: Snowball Edge Storage Optimized devices are well suited for large-scale data migrations and recurring transfer workflows, in addition to local computing with higher capacity needs. Storage: 80 TB of hard disk drive (HDD) capacity for block volumes and Amazon S3 compatible object storage, and 1 TB of SATA solid state drive (SSD) for block volumes. Compute: 40 vCPUs, and 80 GiB of memory to support Amazon EC2 sbe1 instances (equivalent to C5). Snowball Edge Compute Optimized provides powerful computing resources for use cases such as machine learning, full motion video analysis, analytics, and local computing stacks. Storage: 42-TB usable HDD capacity for Amazon S3 compatible object storage or Amazon EBS compatible block volumes and 7.68 TB of usable NVMe SSD capacity for Amazon EBS compatible block volumes. Compute: 52 vCPUs, 208 GiB of memory, and an optional NVIDIA Tesla V100 GPU. Devices run Amazon EC2 sbe-c and sbe-g instances, which are equivalent to C5, M5a, G3, and P3 instances. AWS SNOWMOBILE AWS Snowmobile is an exabyte-scale data transfer service used to move large amounts of data to AWS. You can transfer up to 100 petabytes of data per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi trailer truck. Knowledge check What is the storage capacity of Snowball Edge Storage Optimized? 40 TB Correctly unselected 60 TB Correctly unselected 80 TB Correctly selected 100 TB Correctly unselected SUBMIT Correct The correct response option is 80 TB. Snowball Edge Storage Optimized is a device that enables you to transfer large amounts of data into and out of AWS. It provides 80 TB of usable HDD storage. Innovation with AWS Innovate with AWS Services When examining how to use AWS services, it is important to focus on the desired outcomes. You are properly equipped to drive innovation in the cloud if you can clearly articulate the following conditions: The current state The desired state The problems you are trying to solve Consider some of the paths you might explore in the future as you continue on your cloud journey. Serverless applications - With AWS, serverless refers to applications that don't require you to provision, maintain, or administer servers. You don't need to worry about fault tolerance or availability. AWS handles these capabilities for you. AWS Lambda is an example of a service that you can use to run serverless applications. If you design your architecture to trigger Lambda functions to run your code, you can bypass the need to manage a fleet of servers. Building your architecture with serverless applications enables your developers to focus on their core product instead of managing and operating servers. Artificial intelligence - AWS offers a variety of services powered by artificial intelligence (AI). For example, you can perform the following tasks: Convert speech to text with Amazon Transcribe. Discover patterns in text with Amazon Comprehend. Identify potentially fraudulent online activities with Amazon Fraud Detector. Build voice and text chatbots with Amazon Lex. Machine learning - Traditional machine learning (ML) development is complex, expensive, time consuming, and error prone. AWS offers Amazon SageMaker to remove the difficult work from the process and empower you to build, train, and deploy ML models quickly. You can use ML to analyze data, solve complex problems, and predict outcomes before they happen. Knowledge check Which service enables you to quickly build, train, and deploy machine learning models? Amazon Textract Correctly unselected Amazon Lex Correctly unselected AWS DeepRacer Correctly unselected Amazon SageMaker Correctly selected SUBMIT Correct The correct response option is Amazon SageMaker. With Amazon SageMaker, you can quickly and easily begin working on machine learning projects. You do not need to follow the traditional process of manually bringing together separate tools and workflows. The other response options are incorrect because: Amazon Textract is a machine learning service that automatically extracts text and data from scanned documents. Amazon Lex is a service that enables you to build conversational interfaces using voice and text. AWS DeepRacer is an autonomous 1/18 scale race car that you can use to test reinforcement learning models. Module 9 summary In Module 9, you learned about the following concepts: The AWS Cloud Adoption Framework The six strategies for migration The AWS Snow Family Innovation with AWS services Which Perspective of the AWS Cloud Adoption Framework helps you structure the selection and implementation of permissions? Governance Perspective Correctly unselected Security Perspective Correctly selected Operations Perspective Correctly unselected Business Perspective Correctly unselected SUBMIT Correct The correct response option is Security Perspective. The Security Perspective of the AWS Cloud Adoption Framework also helps you to identify areas on non-compliance and plan ongoing security initiatives. The other response options are incorrect because: The Governance Perspective helps you to identify and implement best practices for IT governance and support business processes with technology. The Operations Perspective focuses on operating and recovering IT workloads to meet the requirements of your business stakeholders. The Business Perspective helps you to move from a model that separates business and IT strategies into a business model that integrates IT strategy. Which strategies are included in the six strategies for application migration? (Select TWO.) RevisitingCorrectly unchecked RetainingCorrectly checked RememberingCorrectly unchecked RedevelopingCorrectly unchecked RehostingCorrectly checked SUBMIT Correct The two correct response options are: Retaining Rehosting The application migration strategies are rehosting, replatforming, refactoring/re-architecting, repurchasing, retaining, and retiring. What is the storage capacity of AWS Snowmobile? 40 PB Correctly unselected 60 PB Correctly unselected 80 PB Correctly unselected 100 PB Correctly selected SUBMIT Correct The correct response option is 100 PB. AWS Snowmobile is a service that is used for transferring up to 100 PB of data to AWS. Each Snowmobile is a 45-foot long shipping container that is pulled by a semi trailer truck. Which statement best describes Amazon Lex? A service that enables you to build conversational interfaces using voice and text Correctly selected A machine learning service that automatically extracts text and data from scanned documents Correctly unselected A document database service that supports MongoDB workloads Correctly unselected A service that enables you to identify potentially fraudulent online activities Correctly unselected SUBMIT Correct The correct response option is Amazon Lex. In Amazon Lex, you can quickly build, test, and deploy conversational chatbots to use in your applications. The other response options are incorrect because: A machine learning service that automatically extracts text and data from scanned document describes Amazon Textract. A document database service that supports MongoDB workloads describes Amazon DocumentDB. A service that enables you to identify potentially fraudulent online activities describes Amazon Fraud Detector.

Module 1

In computing, a client can be a web browser or desktop application that a person interacts with to make requests to computer servers. A server can be services such as Amazon Elastic Compute Cloud (Amazon EC2), a type of virtual server. For example, suppose that a client makes a request for a news article, the score in an online game, or a funny video. The server evaluates the details of this request and fulfills it by returning the information to the client. Module 1 Cloud Computing - the on-demand delivery of IT resources over the internet with pay-as-you-go pricing. 3 Cloud Computing Deployment Models: Cloud-based deployment On-premises deployment Hybrid deployment Cloud-based Run all parts of the application in the cloud. Migrate existing applications to the cloud. Design and build new applications in the cloud. For example, a company might create an application consisting of virtual servers, databases, and networking components that are fully based in the cloud. On-Premises Deploy resources by using virtualization and resource management tools. Increase resource utilization by using application management and virtualization technologies. For example, you might have applications that run on technology that is fully kept in your on-premises data center. Though this model is much like legacy IT infrastructure, its incorporation of application management and virtualization technologies helps to increase resource utilization. Hybrid Connect cloud-based resources to on-premises infrastructure. Integrate cloud-based resources with legacy IT applications. For example, suppose that a company wants to use cloud services that can automate batch data processing and analytics. However, the company has several legacy applications that are more suitable on premises and will not be migrated to the cloud. With a hybrid deployment, the company would be able to keep the legacy applications on premises while benefiting from the data and analytics services that run in the cloud. Benefits of cloud computing Trade upfront expense for variable expense Stop spending money to run and maintain data centers Stop guessing capacity Benefit from massive economies of scale Increase speed and agility Go global in minutes Trade upfront expense for variable expense - Upfront expense refers to data centers, physical servers, and other resources that you would need to invest in before using them. Variable expense means you only pay for computing resources you consume instead of investing heavily in data centers and servers before you know how you're going to use them. By taking a cloud computing approach that offers the benefit of variable expense, companies can implement innovative solutions while saving on costs. Stop spending money to run and maintain data centers - Computing in data centers often requires you to spend more money and time managing infrastructure and servers. A benefit of cloud computing is the ability to focus less on these tasks and more on your applications and customers. Stop guessing capacity - With cloud computing, you don't have to predict how much infrastructure capacity you will need before deploying an application. For example, you can launch Amazon EC2 instances when needed, and pay only for the compute time you use. Instead of paying for unused resources or having to deal with limited capacity, you can access only the capacity that you need. You can also scale in or scale out in response to demand. Benefit from massive economies of scale - By using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers can aggregate in the cloud, providers, such as AWS, can achieve higher economies of scale. The economy of scale translates into lower pay-as-you-go prices. Increase speed and agility - The flexibility of cloud computing makes it easier for you to develop and deploy applications. This flexibility provides you with more time to experiment and innovate. When computing in data centers, it may take weeks to obtain new resources that you need. By comparison, cloud computing enables you to access new resources within minutes. Go global in minutes - The global footprint of the AWS Cloud enables you to deploy applications to customers around the world quickly, while providing them with low latency. This means that even if you are located in a different part of the world than your customers, customers are able to access your applications with minimal delays. Later in this course, you will explore the AWS global infrastructure in greater detail. You will examine some of the services that you can use to deliver content to customers around the world. Module 1 Quiz What is cloud computing? Backing up files that are stored on desktop and mobile devices to prevent data loss Correctly unselected Deploying applications connected to on-premises infrastructure Correctly unselected Running code without needing to manage or provision servers Correctly unselected On-demand delivery of IT resources and applications through the internet with pay-as-you-go pricing Correctly selected SUBMIT Correct The correct response option is On-demand delivery of IT resources and applications through the internet with pay-as-you-go pricing. The other response options are incorrect because: It is possible to back up files to the cloud, but this response option does not describe cloud computing as a whole. Deploying applications connected to on-premises infrastructure is a sample use case for a hybrid cloud deployment. Remember that cloud computing also has cloud and on-premises (or private cloud) deployment models. AWS Lambda is an AWS service that lets you run code without needing to manage or provision servers. This description does not describe cloud computing as a whole. AWS Lambda is explained in greater detail later in the course. What is another name for on-premises deployment? Private cloud deployment Correctly selected Cloud-based application Correctly unselected Hybrid deployment Correctly unselected AWS Cloud Correctly unselected SUBMIT Correct The correct response option is Private cloud deployment. The other response options are incorrect because: Cloud-based applications are fully deployed in the cloud and do not have any parts that run on premises. A hybrid deployment connects infrastructure and applications between cloud-based resources and existing resources that are not in the cloud, such as on-premises resources. However, a hybrid deployment is not equivalent to an on-premises deployment because it involves resources that are located in the cloud. The AWS Cloud offers three cloud deployment models: cloud, hybrid, and on-premises. This response option is incorrect because the AWS Cloud is not equivalent to only an on-premises deployment. How does the scale of cloud computing help you to save costs? You do not have to invest in technology resources before using them. Correctly unselected The aggregated cloud usage from a large number of customers results in lower pay-as-you-go prices. Correctly selected Accessing services on-demand helps to prevent excess or limited capacity. Correctly unselected You can quickly deploy applications to customers and provide them with low latency. Correctly unselected SUBMIT Correct The correct response option is The aggregated cloud usage from a large number of customers results in lower pay-as-you-go prices. This answer describes how customers can benefit from massive economies of scale in cloud computing. The other response options are incorrect because: Not having to invest in technology resources before using them relates to Trade upfront expense for variable expense. Accessing services on-demand to prevent excess or limited capacity relates to Stop guessing capacity. Quickly deploying applications to customers and providing them with low latency relates to Go global in minutes.

Module 5

Module 5 Instance stores Block-level storage volumes behave like physical hard drives. An instance store provides temporary block-level storage for an Amazon EC2 instance. An instance store is disk storage that is physically attached to the host computer for an EC2 instance, and therefore has the same lifespan as the instance. When the instance is terminated, you lose any data in the instance store. Instance stores To review an example of how instance stores work, select Start. Step 1 An Amazon EC2 instance with an attached instance store is running. Instance stores To review an example of how instance stores work, select Start. START Step 1 An Amazon EC2 instance with an attached instance store is running. Step 2 The instance is stopped or terminated. Instance stores To review an example of how instance stores work, select Start. START Step 1 An Amazon EC2 instance with an attached instance store is running. 1 2 3 Step 2 The instance is stopped or terminated. Step 3 All data on the attached instance store is deleted. Amazon EC2 instances are virtual servers. If you start an instance from a stopped state, the instance might start on another host, where the previously used instance store volume does not exist. Therefore, AWS recommends instance stores for use cases that involve temporary data that you do not need in the long term. Amazon Elastic Block Store (Amazon EBS) is a service that provides block-level storage volumes that you can use with Amazon EC2 instances. If you stop or terminate an Amazon EC2 instance, all the data on the attached EBS volume remains available. To create an EBS volume, you define the configuration (such as volume size and type) and provision it. After you create an EBS volume, it can attach to an Amazon EC2 instance. Because EBS volumes are for data that needs to persist, it's important to back up the data. You can take incremental backups of EBS volumes by creating Amazon EBS snapshots. Amazon EBS snapshots An EBS snapshot is an incremental backup. This means that the first backup taken of a volume copies all the data. For subsequent backups, only the blocks of data that have changed since the most recent snapshot are saved. Incremental backups are different from full backups, in which all the data in a storage volume copies each time a backup occurs. The full backup includes data that has not changed since the most recent backup. Instance Stores: When stopping or terminating an EC2 instance, data is deleted Best for temporary data that is not kept long term Amazon EBS Volumes: When stopping or terminating an EC2 instance, data remains available Best for data that requires retention Amazon Simple Storage Service (Amazon S3) Object storage In object storage, each object consists of data, metadata, and a key. The data might be an image, video, text document, or any other type of file. Metadata contains information about what the data is, how it is used, the object size, and so on. An object's key is its unique identifier. Recall that when you modify a file in block storage, only the pieces that are changed are updated. When a file in object storage is modified, the entire object is updated. Amazon Simple Storage Service (Amazon S3) Amazon Simple Storage Service (Amazon S3) is a service that provides object-level storage. Amazon S3 stores data as objects in buckets. You can upload any type of file to Amazon S3, such as images, videos, text files, and so on. For example, you might use Amazon S3 to store backup files, media files for a website, or archived documents. Amazon S3 offers unlimited storage space. The maximum file size for an object in Amazon S3 is 5 TB. When you upload a file to Amazon S3, you can set permissions to control visibility and access to it. You can also use the Amazon S3 versioning feature to track changes to your objects over time. Amazon S3 storage classes With Amazon S3, you pay only for what you use. You can choose from a range of storage classes to select a fit for your business and cost needs. When selecting an Amazon S3 storage class, consider these two factors: How often you plan to retrieve your data How available you need your data to be S3 Standard - Designed for frequently accessed data Stores data in a minimum of three Availability Zones S3 Standard provides high availability for objects. This makes it a good choice for a wide range of use cases, such as websites, content distribution, and data analytics. S3 Standard has a higher cost than other storage classes intended for infrequently accessed data and archival storage. S3 Standard-Infrequent Access (S3 Standard-IA) - Ideal for infrequently accessed data Similar to S3 Standard but has a lower storage price and higher retrieval price S3 Standard-IA is ideal for data infrequently accessed but requires high availability when needed. Both S3 Standard and S3 Standard-IA store data in a minimum of three Availability Zones. S3 Standard-IA provides the same level of availability as S3 Standard but with a lower storage price and a higher retrieval price. S3 One Zone-Infrequent Access (S3 One Zone-IA) - Stores data in a single Availability Zone Has a lower storage price than S3 Standard-IA Compared to S3 Standard and S3 Standard-IA, which store data in a minimum of three Availability Zones, S3 One Zone-IA stores data in a single Availability Zone. This makes it a good storage class to consider if the following conditions apply: You want to save costs on storage. You can easily reproduce your data in the event of an Availability Zone failure. S3 Intelligent-Tiering - Ideal for data with unknown or changing access patterns Requires a small monthly monitoring and automation fee per object In the S3 Intelligent-Tiering storage class, Amazon S3 monitors objects' access patterns. If you haven't accessed an object for 30 consecutive days, Amazon S3 automatically moves it to the infrequent access tier, S3 Standard-IA. If you access an object in the infrequent access tier, Amazon S3 automatically moves it to the frequent access tier, S3 Standard. S3 Glacier - Low-cost storage designed for data archiving Able to retrieve objects within a few minutes to hours S3 Glacier is a low-cost storage class that is ideal for data archiving. For example, you might use this storage class to store archived customer records or older photos and video files. S3 Glacier Deep Archive - Lowest-cost object storage class ideal for archiving Able to retrieve objects within 12 hours When deciding between Amazon S3 Glacier and Amazon S3 Glacier Deep Archive, consider how quickly you need to retrieve archived objects. You can retrieve objects stored in the S3 Glacier storage class within a few minutes to a few hours. By comparison, you can retrieve objects stored in the S3 Glacier Deep Archive storage class within 12 hours. Knowledge check You want to store data that is infrequently accessed but must be immediately available when needed. Which Amazon S3 storage class should you use? S3 Intelligent-Tiering Correctly unselected S3 Glacier Deep Archive Correctly unselected S3 Standard-IA Correctly selected S3 Glacier Correctly unselected SUBMIT Correct The correct response option is S3 Standard-IA. The S3 Standard-IA storage class is ideal for data that is infrequently accessed but requires high availability when needed. Both S3 Standard and S3 Standard-IA store data in a minimum of three Availability Zones. S3 Standard-IA provides the same level of availability as S3 Standard but at a lower storage price. The other response options are incorrect because: In the S3 Intelligent-Tiering storage class, Amazon S3 monitors objects' access patterns. If you haven't accessed an object for 30 consecutive days, Amazon S3 automatically moves it to the infrequent access tier, S3 Standard-IA. If you access an object in the infrequent access tier, Amazon S3 automatically moves it to the frequent access tier, S3 Standard. S3 Glacier and S3 Glacier Deep Archive are low-cost storage classes that are ideal for data archiving. They would not be the best choice for this scenario, which requires high availability. You can retrieve objects stored in the S3 Glacier storage class within a few minutes to a few hours. By comparison, you can retrieve objects stored in the S3 Glacier Deep Archive storage class within 12 hours. Comparing Amazon EBS and Amazon S3 Round one. Let's say you're running a photo analysis website where users upload a photo of themselves, and your application finds the animals that look just like them. You have potentially millions of animal pictures that all need to be indexed and possibly viewed by thousands of people at once. This is the perfect use case for S3. S3 is already web enabled. Every object already has a URL that you can control access rights to who can see or manage the image. It's regionally distributed, which means that it has 11 nines of durability, so no need to worry about backup strategies. S3 is your backup strategy. Plus the cost savings is substantial overrunning the same storage load on EBS. With the additional advantage of being serverless, no Amazon EC2 instances are needed. Sounds like S3 is the judge's winner here for this round. But wait, round two, you have an 80-gigabyte video file that you're making edit corrections on. To know the best storage class here, we need to understand the difference between object storage and block storage. Object storage treats any file as a complete, discreet object. Now this is great for documents, and images, and video files that get uploaded and consumed as entire objects, but every time there's a change to the object, you must re-upload the entire file. There are no delta updates. Block storage breaks those files down to small component parts or blocks. This means, for that 80-gigabyte file, when you make an edit to one scene in the film and save that change, the engine only updates the blocks where those bits live. If you're making a bunch of micro edits, using EBS, elastic block storage, is the perfect use case. If you were using S3, every time you saved the changes, the system would have to upload all 80 gigabytes, the whole thing, every time. EBS clearly wins round two. This means, if you are using complete objects or only occasional changes, S3 is victorious. If you are doing complex read, write, change functions, then, absolutely, EBS is your knockout winner. Your winner depends on your individual workload. Each service is the right service for specific needs. Once you understand what you need, you will know which service is your champion! Amazon Elastic File System (Amazon EFS) File storage In file storage, multiple clients (such as users, applications, servers, and so on) can access data that is stored in shared file folders. In this approach, a storage server uses block storage with a local file system to organize files. Clients access data through file paths. Compared to block storage and object storage, file storage is ideal for use cases in which a large number of services and resources need to access the same data at the same time. Amazon Elastic File System (Amazon EFS) is a scalable file system used with AWS Cloud services and on-premises resources. As you add and remove files, Amazon EFS grows and shrinks automatically. It can scale on demand to petabytes without disrupting applications. Comparing Amazon EBS and Amazon EFS Amazon EBS An Amazon EBS volume stores data in a single Availability Zone. To attach an Amazon EC2 instance to an EBS volume, both the Amazon EC2 instance and the EBS volume must reside within the same Availability Zone. Amazon EFS Amazon EFS is a regional service. It stores data in and across multiple Availability Zones. The duplicate storage enables you to access data concurrently from all the Availability Zones in the Region where a file system is located. Additionally, on-premises servers can access Amazon EFS using AWS Direct Connect. Amazon Relational Database Service (Amazon RDS) Relational databases In a relational database, data is stored in a way that relates it to other pieces of data. An example of a relational database might be the coffee shop's inventory management system. Each record in the database would include data for a single item, such as product name, size, price, and so on. Relational databases use structured query language (SQL) to store and query data. This approach allows data to be stored in an easily understandable, consistent, and scalable way. For example, the coffee shop owners can write a SQL query to identify all the customers whose most frequently purchased drink is a medium latte. Example of data in a relational database: ID Product name Size Price 1 Medium roast ground coffee 12 oz. $5.30 2 Dark roast ground coffee 20 oz. $9.27 Amazon Relational Database Service Amazon Relational Database Service (Amazon RDS) is a service that enables you to run relational databases in the AWS Cloud. Amazon RDS is a managed service that automates tasks such as hardware provisioning, database setup, patching, and backups. With these capabilities, you can spend less time completing administrative tasks and more time using data to innovate your applications. You can integrate Amazon RDS with other services to fulfill your business and operational needs, such as using AWS Lambda to query your database from a serverless application. Amazon RDS provides a number of different security options. Many Amazon RDS database engines offer encryption at rest (protecting data while it is stored) and encryption in transit (protecting data while it is being sent and received). Amazon RDS database engines Amazon RDS is available on six database engines, which optimize for memory, performance, or input/output (I/O). Supported database engines include: Amazon Aurora PostgreSQL MySQL MariaDB Oracle Database Microsoft SQL Server Amazon Aurora Amazon Aurora is an enterprise-class relational database. It is compatible with MySQL and PostgreSQL relational databases. It is up to five times faster than standard MySQL databases and up to three times faster than standard PostgreSQL databases. Amazon Aurora helps to reduce your database costs by reducing unnecessary input/output (I/O) operations, while ensuring that your database resources remain reliable and available. Consider Amazon Aurora if your workloads require high availability. It replicates six copies of your data across three Availability Zones and continuously backs up your data to Amazon S3. Amazon DynamoDB Nonrelational databases In a nonrelational database, you create tables. A table is a place where you can store and query data. Nonrelational databases are sometimes referred to as "NoSQL databases" because they use structures other than rows and columns to organize data. One type of structural approach for nonrelational databases is key-value pairs. With key-value pairs, data is organized into items (keys), and items have attributes (values). You can think of attributes as being different features of your data. In a key-value database, you can add or remove attributes from items in the table at any time. Additionally, not every item in the table has to have the same attributes. Example of data in a nonrelational database: Key Value 1 Name: John Doe Address: 123 Any Street Favorite drink: Medium latte 2 Name: Mary Major Address: 100 Main Street Birthday: July 5, 1994 Amazon DynamoDB Amazon DynamoDB is a key-value database service. It delivers single-digit millisecond performance at any scale. To learn about features of DynamoDB, select each flashcard to flip it. Serverless DynamoDB is serverless, which means that you do not have to provision, patch, or manage servers. You also do not have to install, maintain, or operate software. Automatic Scaling As the size of your database shrinks or grows, DynamoDB automatically scales to adjust for changes in capacity while maintaining consistent performance. This makes it a suitable choice for use cases that require high performance while scaling. Round one, Relational databases have been around since the moment businesses started using computers. Being able to build complex analysis of data spread across multiple tables, is the strength of any relational system. In this round, you have a sales supply chain management system that you have to analyze for weak spots. Using RDS is the clear winner here because it's built for business analytics, because you need complex relational joins. Round one easily goes to RDS. Round two, the use case, pretty much anything else. Now that sounds weird, but despite what your standalone legacy database vendor would have you believe, most of what people use expensive relational databases for, has nothing to do with complex relationships. In fact, a lot of what people put into these databases ends up just being look-up tables. For this round, imagine you have an employee contact list: names, phone numbers, emails, employee IDs. Well, this is all single table territory. I could use a relational database for this, but the things that make relational databases great, all of that complex functionality, creates overhead and lag and expense if you're not actually using it. This is where non-relational databases, Dynamo DB, delivers the knockout punch. By eliminating all the overhead, DynamoDB allows you to build powerful, incredibly fast databases where you don't need complex joint functionality. DynamoDB comes out the undisputed champion. Once again, the winner depends on your individual workload. Each service is the right service for specific needs. And once you understand what you need, you will know again, which service is your champion. Knowledge check What are the scenarios in which you should use Amazon Relational Database Service (Amazon RDS)? (Select TWO.) Running a serverless databaseCorrectly unchecked Using SQL to organize dataCorrectly checked Storing data in a key-value databaseCorrectly unchecked Scaling up to 10 trillion requests per dayCorrectly unchecked Storing data in an Amazon Aurora databaseCorrectly checked SUBMIT Correct The two correct response options are: Using SQL to organize data Storing data in an Amazon Aurora database The other three response options are scenarios in which you should use Amazon DynamoDB. Amazon Redshift Amazon Redshift is a data warehousing service that you can use for big data analytics. It offers the ability to collect data from many sources and helps you to understand relationships and trends across your data. Ability to use a Single API call AWS Database Migration Service (AWS DMS) AWS Database Migration Service (AWS DMS) enables you to migrate relational databases, nonrelational databases, and other types of data stores. With AWS DMS, you move data between a source database and a target database. The source and target databases can be of the same type or different types. During the migration, your source database remains operational, reducing downtime for any applications that rely on the database. For example, suppose that you have a MySQL database that is stored on premises in an Amazon EC2 instance or in Amazon RDS. Consider the MySQL database to be your source database. Using AWS DMS, you could migrate your data to a target database, such as an Amazon Aurora database. Other use cases for AWS DMS Development and test database migrations Enabling developers to test applications against production data without affecting production users Database consolidation Combining several databases into a single database Continuous replication Sending ongoing copies of your data to other target sources instead of doing a one-time migration Additional database services Amazon DocumentDB - Amazon DocumentDB is a document database service that supports MongoDB workloads. (MongoDB is a document database program.) Amazon Neptune - Amazon Neptune is a graph database service. You can use Amazon Neptune to build and run applications that work with highly connected datasets, such as recommendation engines, fraud detection, and knowledge graphs. Amazon Quantum Ledger Database (Amazon QLDB) - Amazon Quantum Ledger Database (Amazon QLDB) is a ledger database service. You can use Amazon QLDB to review a complete history of all the changes that have been made to your application data. Amazon Managed Blockchain - Amazon Managed Blockchain is a service that you can use to create and manage blockchain networks with open-source frameworks. Blockchain is a distributed ledger system that lets multiple parties run transactions and share data without a central authority. Amazon ElastiCache - Amazon ElastiCache is a service that adds caching layers on top of your databases to help improve the read times of common requests. It supports two types of data stores: Redis and Memcached. Amazon DynamoDB Accelerator - Amazon DynamoDB Accelerator (DAX) is an in-memory cache for DynamoDB. It helps improve response times from single-digit milliseconds to microseconds. Module 5 summary In Module 5, you learned about the following concepts: Amazon EC2 instance store and Amazon EBS Amazon S3 Amazon EFS Relational databases and Amazon RDS Nonrelational databases and DynamoDB Amazon Redshift AWS DMS Additional database services and accelerators Module 5 Module Which Amazon S3 storage classes are optimized for archival data? (Select TWO.) S3 StandardCorrectly unchecked S3 GlacierCorrectly checked S3 Intelligent-TieringCorrectly unchecked S3 Standard-IACorrectly unchecked S3 Glacier Deep ArchiveCorrectly checked SUBMIT Correct The correct two response options are: S3 Glacier S3 Glacier Deep Archive Objects stored in the S3 Glacier storage class can be retrieved within a few minutes to a few hours. By comparison, objects that are stored in the S3 Glacier Deep Archive storage class can be retrieved within 12 hours. The other response options are incorrect because: S3 Standard is a storage class that is ideal for frequently accessed data, not archival data. S3 Intelligent-Tiering monitors access patterns of objects and automatically moves them between the S3 Standard and S3 Standard-IA storage classes. It is not designed for archival data. S3 Standard-IA is ideal for data that is infrequently accessed but requires high availability when needed. Which statement or statements are TRUE about Amazon EBS volumes and Amazon EFS file systems? EBS volumes store data within a single Availability Zone. Amazon EFS file systems store data across multiple Availability Zones. Correctly selected EBS volumes store data across multiple Availability Zones. Amazon EFS file systems store data within a single Availability Zone. Correctly unselected EBS volumes and Amazon EFS file systems both store data within a single Availability Zone. Correctly unselected EBS volumes and Amazon EFS file systems both store data across multiple Availability Zones. Correctly unselected SUBMIT Correct The correct response option is: EBS volumes store data within a single Availability Zone. Amazon EFS file systems store data across multiple Availability Zones. An EBS volume must be located in the same Availability Zone as the Amazon EC2 instance to which it is attached. Data in an Amazon EFS file system can be accessed concurrently from all the Availability Zones in the Region where the file system is located. You want to store data in an object storage service. Which AWS service is best for this type of storage? Amazon Managed Blockchain Correctly unselected Amazon Elastic File System (Amazon EFS) Correctly unselected Amazon Elastic Block Store (Amazon EBS) Correctly unselected Amazon Simple Storage Service (Amazon S3) Correctly selected SUBMIT Correct The correct response option is Amazon Simple Storage Service (Amazon S3). The other response options are incorrect because: Amazon Managed Blockchain is a service that you can use to create and manage blockchain networks with open-source frameworks. Blockchain is a distributed ledger system that lets multiple parties run transactions and share data without a central authority. Amazon Elastic File System (Amazon EFS) is a scalable file system used with AWS Cloud services and on-premises resources. It does not store data as object storage. Amazon Elastic Block Store (Amazon EBS) is a service that provides block-level storage volumes that you can use with Amazon EC2 instances. Which statement best describes Amazon DynamoDB? A service that enables you to run relational databases in the AWS Cloud Correctly unselected A serverless key-value database service Correctly selected A service that you can use to migrate relational databases, nonrelational databases, and other types of data stores Correctly unselected An enterprise-class relational database Correctly unselected SUBMIT Correct The correct response option is A serverless key-value database service. Amazon DynamoDB is a key-value database service. It is serverless, which means that you do not have to provision, patch, or manage servers. The other response options are incorrect because: A service that enables you to run relational databases in the AWS Cloud describes Amazon Relational Database Service (Amazon RDS). A service that you can use to migrate relational databases, nonrelational databases, and other types of data stores describes AWS Database Migration Service (AWS DMS). An enterprise-class relational database describes Amazon Aurora. Which service is used to query and analyze data across a data warehouse? Amazon Redshift Correctly selected Amazon Neptune Correctly unselected Amazon DocumentDB Correctly unselected Amazon ElastiCache Correctly unselected SUBMIT Correct The correct response option is Amazon Redshift. Amazon Redshift is a data warehousing service that you can use for big data analytics. Use Amazon Redshift to collect data from many sources and help you understand relationships and trends across your data. The other response options are incorrect because: Amazon Neptune is a graph database service. You can use Amazon Neptune to build and run applications that work with highly connected datasets, such as recommendation engines, fraud detection, and knowledge graphs. Amazon DocumentDB is a document database service that supports MongoDB workloads. Amazon ElastiCache is a service that adds caching layers on top of your databases to help improve the read times of common requests.

Module 6

Module 6 introduction Learning objectives In this module, you will learn how to: Explain the benefits of the shared responsibility model. Describe multi-factor authentication (MFA). Differentiate between the AWS Identity and Access Management (IAM) security levels. Explain the main benefits of AWS Organizations. Describe security policies at a basic level. Summarize the benefits of compliance with AWS. Explain additional AWS security services at a basic level. Shared responsibility model The AWS shared responsibility model Throughout this course, you have learned about a variety of resources that you can create in the AWS Cloud. These resources include Amazon EC2 instances, Amazon S3 buckets, and Amazon RDS databases. Who is responsible for keeping these resources secure: you (the customer) or AWS? The answer is both. The reason is that you do not treat your AWS environment as a single object. Rather, you treat the environment as a collection of parts that build upon each other. AWS is responsible for some parts of your environment and you (the customer) are responsible for other parts. This concept is known as the shared responsibility model. The shared responsibility model divides into customer responsibilities (commonly referred to as "security in the cloud") and AWS responsibilities (commonly referred to as "security of the cloud"). You can think of this model as being similar to the division of responsibilities between a homeowner and a homebuilder. The builder (AWS) is responsible for constructing your house and ensuring that it is solidly built. As the homeowner (the customer), it is your responsibility to secure everything in the house by ensuring that the doors are closed and locked. Customers: Security in the cloud - Customers are responsible for the security of everything that they create and put in the AWS Cloud. When using AWS services, you, the customer, maintain complete control over your content. You are responsible for managing security requirements for your content, including which content you choose to store on AWS, which AWS services you use, and who has access to that content. You also control how access rights are granted, managed, and revoked. The security steps that you take will depend on factors such as the services that you use, the complexity of your systems, and your company's specific operational and security needs. Steps include selecting, configuring, and patching the operating systems that will run on Amazon EC2 instances, configuring security groups, and managing user accounts. AWS: Security of the cloud - AWS is responsible for security of the cloud. AWS operates, manages, and controls the components at all layers of infrastructure. This includes areas such as the host operating system, the virtualization layer, and even the physical security of the data centers from which services operate. AWS is responsible for protecting the global infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure includes AWS Regions, Availability Zones, and edge locations. AWS manages the security of the cloud, specifically the physical infrastructure that hosts your resources, which include: Physical security of data centers Hardware and software infrastructure Network infrastructure Virtualization infrastructure Although you cannot visit AWS data centers to see this protection firsthand, AWS provides several reports from third-party auditors. These auditors have verified its compliance with a variety of computer security standards and regulations. Knowledge check Which tasks are the responsibilities of customers? (Select TWO.) Maintaining network infrastructureCorrectly unchecked Patching software on Amazon EC2 instancesCorrectly checked Implementing physical security controls at data centersCorrectly unchecked Setting permissions for Amazon S3 objectsCorrectly checked Maintaining servers that run Amazon EC2 instancesCorrectly unchecked SUBMIT Correct The correct two response options are: Patching software on Amazon EC2 instances Setting permissions for Amazon S3 objects The other three response options are tasks that are the responsibility of AWS. User permissions and access AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. IAM gives you the flexibility to configure access based on your company's specific operational and security needs. You do this by using a combination of IAM features, which are explored in detail in this lesson: IAM users, groups, and roles IAM policies Multi-factor authentication You will also learn best practices for each of these features. AWS account root user When you first create an AWS account, you begin with an identity known as the root user. The root user is accessed by signing in with the email address and password that you used to create your AWS account. You can think of the root user as being similar to the owner of the coffee shop. It has complete access to all the AWS services and resources in the account. Best practice: Do not use the root user for everyday tasks. Instead, use the root user to create your first IAM user and assign it permissions to create other users. Then, continue to create other IAM users, and access those identities for performing regular tasks throughout AWS. Only use the root user when you need to perform a limited number of tasks that are only available to the root user. Examples of these tasks include changing your root user email address and changing your AWS support plan. IAM users An IAM user is an identity that you create in AWS. It represents the person or application that interacts with AWS services and resources. It consists of a name and credentials. By default, when you create a new IAM user in AWS, it has no permissions associated with it. To allow the IAM user to perform specific actions in AWS, such as launching an Amazon EC2 instance or creating an Amazon S3 bucket, you must grant the IAM user the necessary permissions. Best practice: We recommend that you create individual IAM users for each person who needs to access AWS. Even if you have multiple employees who require the same level of access, you should create individual IAM users for each of them. This provides additional security by allowing each IAM user to have a unique set of security credentials. IAM policies An IAM policy is a document that allows or denies permissions to AWS services and resources. IAM policies enable you to customize users' levels of access to resources. For example, you can allow users to access all of the Amazon S3 buckets within your AWS account, or only a specific bucket. Best practice: Follow the security principle of least privilege when granting permissions. By following this principle, you help to prevent users or roles from having more permissions than needed to perform their tasks. For example, if an employee needs access to only a specific bucket, specify the bucket in the IAM policy. Do this instead of granting the employee access to all of the buckets in your AWS account. Example: IAM policy Here's an example of how IAM policies work. Suppose that the coffee shop owner has to create an IAM user for a newly hired cashier. The cashier needs access to the receipts kept in an Amazon S3 bucket with the ID: AWSDOC-EXAMPLE-BUCKET. This example IAM policy allows permission to view a list of objects in the Amazon S3 bucket with ID awsdoc-example-bucket, and also access them. In this example, the IAM policy is allowing specific actions within Amazon S3: ListObject and GetObject. The policy also mentions a specific bucket ID: awsdoc-example-bucket. When the owner attaches this policy to the cashier's IAM user, it will allow the cashier to view a list of the objects in the awsdoc-example-bucket bucket and also access them. If the owner wants the cashier to be able to access other services and perform other actions in AWS, the owner must attach additional policies to specify these services and actions. Now, suppose that the coffee shop has hired a few more cashiers. Instead of assigning permissions to each individual IAM user, the owner places the users into an IAM group. IAM groups An IAM group is a collection of IAM users. When you assign an IAM policy to a group, all users in the group are granted permissions specified by the policy. Here's an example of how this might work in the coffee shop. Instead of assigning permissions to cashiers one at a time, the owner can create a "Cashiers" IAM group. The owner can then add IAM users to the group and then attach permissions at the group level. Assigning IAM policies at the group level also makes it easier to adjust permissions when an employee transfers to a different job. For example, if a cashier becomes an inventory specialist, the coffee shop owner removes them from the "Cashiers" IAM group and adds them into the "Inventory Specialists" IAM group. This ensures that employees have only the permissions that are required for their current role. What if a coffee shop employee hasn't switched jobs permanently, but instead, rotates to different workstations throughout the day? This employee can get the access they need through IAM roles. IAM roles In the coffee shop, an employee rotates to different workstations throughout the day. Depending on the staffing of the coffee shop, this employee might perform several duties: work at the cash register, update the inventory system, process online orders, and so on. When the employee needs to switch to a different task, they give up their access to one workstation and gain access to the next workstation. The employee can easily switch between workstations, but at any given point in time, they can have access to only a single workstation. This same concept exists in AWS with IAM roles. An IAM role is an identity that you can assume to gain temporary access to permissions. Before an IAM user, application, or service can assume an IAM role, they must be granted permissions to switch to the role. When someone assumes an IAM role, they abandon all previous permissions that they had under a previous role and assume the permissions of the new role. Best practice: IAM roles are ideal for situations in which access to services or resources needs to be granted temporarily, instead of long-term. Example: IAM roles To review an example of how IAM roles could be used in the coffee shop, select Start. START Step 1 First, the owner grants the employee permissions to switch to a role for each workstation in the coffee shop. Example: IAM roles To review an example of how IAM roles could be used in the coffee shop, select Start. START Step 1 First, the owner grants the employee permissions to switch to a role for each workstation in the coffee shop. 1 2 Step 2 The employee begins their day by assuming the "Cashier" role. This grants them access to the cash register system. Later in the day, the employee needs to update the inventory system. They assume the "Inventory" role. This grants the employee access to the inventory system and also revokes their access to the cash register system. Multi-factor authentication Have you ever signed in to a website that required you to provide multiple pieces of information to verify your identity? You might have needed to provide your password and then a second form of authentication, such as a random code sent to your phone. This is an example of multi-factor authentication. In IAM, multi-factor authentication (MFA) provides an extra layer of security for your AWS account. How multi-factor authentication works To review the steps involved with multi-factor authentication, select Start. START Step 1 First, when a user signs in to an AWS website, they enter their IAM user ID and password. How multi-factor authentication works To review the steps involved with multi-factor authentication, select Start. Step 1 First, when a user signs in to an AWS website, they enter their IAM user ID and password. Step 2 Next, the user is prompted for an authentication response from their AWS MFA device. This device could be a hardware security key, a hardware device, or an MFA application on a device such as a smartphone. When the user has been successfully authenticated, they are able to access the requested AWS services or resources. You can enable MFA for the root user and IAM users. As a best practice, enable MFA for the root user and all IAM users in your account. By doing this, you can keep your AWS account safe from unauthorized access. AWS Organizations AWS Organizations Suppose that your company has multiple AWS accounts. You can use AWS Organizations to consolidate and manage multiple AWS accounts within a central location. When you create an organization, AWS Organizations automatically creates a root, which is the parent container for all the accounts in your organization. In AWS Organizations, you can centrally control permissions for the accounts in your organization by using service control policies (SCPs). SCPs enable you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access. Consolidated billing is another feature of AWS Organizations. You will learn about consolidated billing in a later module. Organizational units In AWS Organizations, you can group accounts into organizational units (OUs) to make it easier to manage accounts with similar business or security requirements. When you apply a policy to an OU, all the accounts in the OU automatically inherit the permissions specified in the policy. By organizing separate accounts into OUs, you can more easily isolate workloads or applications that have specific security requirements. For instance, if your company has accounts that can access only the AWS services that meet certain regulatory requirements, you can put these accounts into one OU. Then, you can attach a policy to the OU that blocks access to all other AWS services that do not meet the regulatory requirements. Example: AWS Organizations To review an example of how a company might use AWS Organizations, select Start. START Step 1 Imagine that your company has separate AWS accounts for the finance, information technology (IT), human resources (HR), and legal departments. You decide to consolidate these accounts into a single organization so that you can administer them from a central location. When you create the organization, this establishes the root. In designing your organization, you consider the business, security, and regulatory needs of each department. You use this information to decide which departments group together in OUs. Step 2 The finance and IT departments have requirements that do not overlap with those of any other department. You bring these accounts into your organization to take advantage of benefits such as consolidated billing, but you do not place them into any OUs. Example: AWS Organizations To review an example of how a company might use AWS Organizations, select Start. Step 1 Imagine that your company has separate AWS accounts for the finance, information technology (IT), human resources (HR), and legal departments. You decide to consolidate these accounts into a single organization so that you can administer them from a central location. When you create the organization, this establishes the root. In designing your organization, you consider the business, security, and regulatory needs of each department. You use this information to decide which departments group together in OUs. Step 2 The finance and IT departments have requirements that do not overlap with those of any other department. You bring these accounts into your organization to take advantage of benefits such as consolidated billing, but you do not place them into any OUs. Step 3 The HR and legal departments need to access the same AWS services and resources, so you place them into an OU together. Placing them into an OU enables you to attach policies that apply to both the HR and legal departments' AWS accounts. Knowledge check You are configuring service control policies (SCPs) in AWS Organizations. Which identities and resources can SCPs be applied to? (Select TWO.) IAM usersCorrectly unchecked IAM groupsCorrectly unchecked An individual member accountCorrectly checked IAM rolesCorrectly unchecked An organizational unit (OU)Correctly checked SUBMIT Correct The correct two response options are: An individual member account An organizational unit (OU) In AWS Organizations, you can apply service control policies (SCPs) to the organization root, an individual member account, or an OU. An SCP affects all IAM users, groups, and roles within an account, including the AWS account root user. You can apply IAM policies to IAM users, groups, or roles. You cannot apply an IAM policy to the AWS account root user. Compliance AWS Artifact Depending on your company's industry, you may need to uphold specific standards. An audit or inspection will ensure that the company has met those standards. AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and select online agreements. AWS Artifact consists of two main sections: AWS Artifact Agreements and AWS Artifact Reports. To learn more, select the + symbol next to each section. AWS Artifact Agreements - Suppose that your company needs to sign an agreement with AWS regarding your use of certain types of information throughout AWS services. You can do this through AWS Artifact Agreements. In AWS Artifact Agreements, you can review, accept, and manage agreements for an individual account and for all your accounts in AWS Organizations. Different types of agreements are offered to address the needs of customers who are subject to specific regulations, such as the Health Insurance Portability and Accountability Act (HIPAA). AWS Artifact Reports - Next, suppose that a member of your company's development team is building an application and needs more information about their responsibility for complying with certain regulatory standards. You can advise them to access this information in AWS Artifact Reports. AWS Artifact Reports provide compliance reports from third-party auditors. These auditors have tested and verified that AWS is compliant with a variety of global, regional, and industry-specific security standards and regulations. AWS Artifact Reports remains up to date with the latest reports released. You can provide the AWS audit artifacts to your auditors or regulators as evidence of AWS security controls. The following are some of the compliance reports and regulations that you can find within AWS Artifact. Each report includes a description of its contents and the reporting period for which the document is valid. Customer Compliance Center The Customer Compliance Center contains resources to help you learn more about AWS compliance. In the Customer Compliance Center, you can read customer compliance stories to discover how companies in regulated industries have solved various compliance, governance, and audit challenges. You can also access compliance whitepapers and documentation on topics such as: AWS answers to key compliance questions An overview of AWS risk and compliance An auditing security checklist Additionally, the Customer Compliance Center includes an auditor learning path. This learning path is designed for individuals in auditing, compliance, and legal roles who want to learn more about how their internal operations can demonstrate compliance using the AWS Cloud. Knowledge check Which tasks can you complete in AWS Artifact? (Select TWO.) Access AWS compliance reports on-demand.Correctly checked Consolidate and manage multiple AWS accounts within a central location.Correctly unchecked Create users to enable people and applications to interact with AWS services and resources.Correctly unchecked Set permissions for accounts by configuring service control policies (SCPs).Correctly unchecked Review, accept, and manage agreements with AWS.Correctly checked SUBMIT Correct The correct two response options are: Access AWS compliance reports on-demand. Review, accept, and manage agreements with AWS. The other response options are incorrect because: Consolidate and manage multiple AWS accounts within a central location- This task can be completed in AWS Organizations. Create users to enable people and applications to interact with AWS services and resources- This task can be completed in AWS Identity and Access Management (IAM). Set permissions for accounts by configuring service control policies (SCPs)- This task can be completed in AWS Organizations. Denial-of-service attacks Customers can call the coffee shop to place their orders. After answering each call, a cashier takes the order and gives it to the barista. However, suppose that a prankster is calling in multiple times to place orders but is never picking up their drinks. This causes the cashier to be unavailable to take other customers' calls. The coffee shop can attempt to stop the false requests by blocking the phone number that the prankster is using. In this scenario, the prankster's actions are similar to a denial-of-service attack. Denial-of-service attacks A denial-of-service (DoS) attack is a deliberate attempt to make a website or application unavailable to users. For example, an attacker might flood a website or application with excessive network traffic until the targeted website or application becomes overloaded and is no longer able to respond. If the website or application becomes unavailable, this denies service to users who are trying to make legitimate requests. Distributed denial-of-service attacks Now, suppose that the prankster has enlisted the help of friends. The prankster and their friends repeatedly call the coffee shop with requests to place orders, even though they do not intend to pick them up. These requests are coming in from different phone numbers, and it's impossible for the coffee shop to block them all. Additionally, the influx of calls has made it increasingly difficult for customers to be able to get their calls through. This is similar to a distributed denial-of-service attack. In a distributed denial-of-service (DDoS) attack, multiple sources are used to start an attack that aims to make a website or application unavailable. This can come from a group of attackers, or even a single attacker. The single attacker can use multiple infected computers (also known as "bots") to send excessive traffic to a website or application. To help minimize the effect of DoS and DDoS attacks on your applications, you can use AWS Shield. AWS Shield AWS Shield is a service that protects applications against DDoS attacks. AWS Shield provides two levels of protection: Standard and Advanced. AWS Shield Standard - AWS Shield Standard automatically protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks. As network traffic comes into your applications, AWS Shield Standard uses a variety of analysis techniques to detect malicious traffic in real time and automatically mitigates it. AWS Shield Advanced - AWS Shield Advanced is a paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks. It also integrates with other services such as Amazon CloudFront, Amazon Route 53, and Elastic Load Balancing. Additionally, you can integrate AWS Shield with AWS WAF by writing custom rules to mitigate complex DDoS attacks. Additional security services AWS Key Management Service (AWS KMS) The coffee shop has many items, such as coffee machines, pastries, money in the cash registers, and so on. You can think of these items as data. The coffee shop owners want to ensure that all of these items are secure, whether they're sitting in the storage room or being transported between shop locations. In the same way, you must ensure that your applications' data is secure while in storage (encryption at rest) and while it is transmitted, known as encryption in transit. AWS Key Management Service (AWS KMS) enables you to perform encryption operations through the use of cryptographic keys. A cryptographic key is a random string of digits used for locking (encrypting) and unlocking (decrypting) data. You can use AWS KMS to create, manage, and use cryptographic keys. You can also control the use of keys across a wide range of services and in your applications. With AWS KMS, you can choose the specific levels of access control that you need for your keys. For example, you can specify which IAM users and roles are able to manage keys. Alternatively, you can temporarily disable keys so that they are no longer in use by anyone. Your keys never leave AWS KMS, and you are always in control of them. AWS WAF AWS WAF is a web application firewall that lets you monitor network requests that come into your web applications. AWS WAF works together with Amazon CloudFront and an Application Load Balancer. Recall the network access control lists that you learned about in an earlier module. AWS WAF works in a similar way to block or allow traffic. However, it does this by using a web access control list (ACL) to protect your AWS resources. Here's an example of how you can use AWS WAF to allow and block specific requests. Suppose that your application has been receiving malicious network requests from several IP addresses. You want to prevent these requests from continuing to access your application, but you also want to ensure that legitimate users can still access it. You configure the web ACL to allow all requests except those from the IP addresses that you have specified. When a request comes into AWS WAF, it checks against the list of rules that you have configured in the web ACL. If a request did not come from one of the blocked IP addresses, it allows access to the application. However, if a request came from one of the blocked IP addresses that you have specified in the web ACL, it is denied access. Amazon Inspector Suppose that the developers at the coffee shop are developing and testing a new ordering application. They want to make sure that they are designing the application in accordance with security best practices. However, they have several other applications to develop, so they cannot spend much time conducting manual assessments. To perform automated security assessments, they decide to use Amazon Inspector. Amazon Inspector helps to improve the security and compliance of applications by running automated security assessments. It checks applications for security vulnerabilities and deviations from security best practices, such as open access to Amazon EC2 instances and installations of vulnerable software versions. After Amazon Inspector has performed an assessment, it provides you with a list of security findings. The list prioritizes by severity level, including a detailed description of each security issue and a recommendation for how to fix it. However, AWS does not guarantee that following the provided recommendations resolves every potential security issue. Under the shared responsibility model, customers are responsible for the security of their applications, processes, and tools that run on AWS services. Amazon GuardDuty Amazon GuardDuty is a service that provides intelligent threat detection for your AWS infrastructure and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment. After you have enabled GuardDuty for your AWS account, GuardDuty begins monitoring your network and account activity. You do not have to deploy or manage any additional security software. GuardDuty then continuously analyzes data from multiple AWS sources, including VPC Flow Logs and DNS logs. If GuardDuty detects any threats, you can review detailed findings about them from the AWS Management Console. Findings include recommended steps for remediation. You can also configure AWS Lambda functions to take remediation steps automatically in response to GuardDuty's security findings. Module 6 summary In Module 6, you learned about the following concepts: The shared responsibility model Features of AWS Identity and Access Management Methods of managing multiple accounts in AWS Organizations AWS compliance resources AWS services for application security and encryption Module 6 Quiz Which statement best describes an IAM policy? An authentication process that provides an extra layer of protection for your AWS account Correctly unselected A document that grants or denies permissions to AWS services and resources Correctly selected An identity that you can assume to gain temporary access to permissions Correctly unselected The identity that is established when you first create an AWS account Correctly unselected SUBMIT Correct The correct response option is: A document that grants or denies permissions to AWS services and resources. IAM policies provide you with the flexibility to customize users' levels of access to resources. For instance, you can allow users to access all the Amazon S3 buckets in your AWS account or only a specific bucket. The other response options are incorrect because: Multi-factor authentication (MFA) is an authentication process that provides an extra layer of protection for your AWS account. An IAM role is an identity that you can assume to gain temporary access to permissions. The root user identity is the identity that is established when you first create an AWS account. An employee requires temporary access to create several Amazon S3 buckets. Which option would be the best choice for this task? AWS account root user Correctly unselected IAM group Correctly unselected IAM role Correctly selected Service control policy (SCP) Correctly unselected SUBMIT Correct The correct answer is IAM role. An IAM role is an identity that you can assume to gain temporary access to permissions. When someone assumes an IAM role, they abandon all permissions that they had under a previous role and assume the permissions of the new role. IAM roles are ideal for situations in which access to services or resources needs to be granted temporarily instead of long-term. The other response options are incorrect because: The AWS account root user is established when you first create an AWS account. As a best practice, do not use the root user for everyday tasks. Although you can attach IAM policies to an IAM group, this would not be the best choice for this scenario because the employee only needs to be granted temporary permissions. Service control policies (SCPs) enable you to centrally control permissions for the accounts in your organization. An SCP is not the best choice for granting temporary permissions to an individual employee. Which statement best describes the principle of least privilege? Adding an IAM user into at least one IAM group Correctly unselected Checking a packet's permissions against an access control list Correctly unselected Granting only the permissions that are needed to perform specific tasks Correctly selected Performing a denial of service attack that originates from at least one device Correctly unselected SUBMIT Correct The correct response option is: Granting only the permissions that are needed to perform specific job tasks. When you grant permissions by following the principle of least privilege, you prevent users or roles from having more permissions than needed to perform specific job tasks. For example, cashiers in the coffee shop should be given access to the cash register system. As a best practice, grant IAM users and roles a minimum set of permissions and then grant additional permissions as needed. Which service helps protect your applications against distributed denial-of-service (DDoS) attacks? Amazon GuardDuty Correctly unselected Amazon Inspector Correctly unselected AWS Artifact Correctly unselected AWS Shield Correctly selected SUBMIT Correct The correct response option is AWS Shield. As network traffic comes into your applications, AWS Shield uses a variety of analysis techniques to detect potential DDoS attacks in real time and automatically mitigates them. The other response options are incorrect because: Amazon GuardDuty is a service that provides intelligent threat detection for your AWS infrastructure and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment. Amazon Inspector checks applications for security vulnerabilities and deviations from security best practices, such as open access to Amazon EC2 instances and installations of vulnerable software versions. AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and select online agreements. Which task can AWS Key Management Service (AWS KMS) perform? Configure multi-factor authentication (MFA). Correctly unselected Update the AWS account root user password. Correctly unselected Create cryptographic keys. Correctly selected Assign permissions to users and groups. Correctly unselected SUBMIT Correct The correct response option is: Create cryptographic keys. AWS Key Management Service (AWS KMS) enables you to perform encryption operations through the use of cryptographic keys. A cryptographic key is a random string of digits used for locking (encrypting) and unlocking (decrypting) data. You can use AWS KMS to create, manage, and use cryptographic keys. You can also control the use of keys across a wide range of services and in your applications. The other response options are incorrect because: You can configure multi-factor authentication (MFA) in AWS Identity and Access Management (IAM). You can update the AWS account root user password in the AWS Management Console. You can assign permissions to users and groups in AWS Identity and Access Management (IAM).


संबंधित स्टडी सेट्स

Ch 47: Assessment of Endocrine System

View Set

Comparing Poetry: Poetic Devices 100%

View Set

BUS498- Strategic Management Exam 1

View Set

Chapter 45: Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set

GENERAL INSURANCE PRINCIPLES class3 INSURANCE PRODUCERS

View Set

aPHR test study guide - Compensation and Benefits (14%)

View Set