cc
cc
• Traditional Model:
AWS Overview
Overview
Compute
De nition:
1. Pay-as-you-go: Pay only for the resources you use without upfront
investments.
2. On-demand provisioning: Resources can be provisioned or
decommissioned almost instantly.
3. Scalability: Adjust resources dynamically to meet changing
demands.
4. Global Access: Resources are accessible anywhere, anytime, via
the internet.
5. No infrastructure management: The cloud provider manages
underlying hardware and software.
Cloud service models describe how cloud services are structured and
offered. They provide varying levels of control and management.
2.1 Infrastructure as a Service (IaaS):
fi
• De nition: Provides access to basic computing resources like
virtual machines, storage, and networking.
• Key Characteristics:
◦ High exibility and control.
◦ Users are responsible for managing operating systems,
middleware, and applications.
• Example: Amazon Elastic Compute Cloud (EC2).
2.2 Platform as a Service (PaaS):
•
Resources are exclusively used by one organization and hosted
either on-premises or by a third-party provider.
• Example: AWS Outposts.
3.3 Hybrid Cloud:
•
Providers like AWS aggregate usage from numerous customers,
reducing costs through bulk purchasing and operational ef ciency.
4.3 Elasticity:
•
Scale resources up or down based on demand without over
provisioning.
4.4 Agility and Speed:
•
Resources can be provisioned in minutes, allowing businesses to
experiment and innovate rapidly.
4.5 Focus on Core Business:
De nition:
• TCO evaluates the total costs (direct and indirect) associated with
operating IT resources, comparing on-premises and cloud
solutions.
Components of TCO:
1. On-premises Costs:
◦ Server hardware and software.
◦ Power, cooling, and maintenance.
◦ IT staff for management.
2. Cloud Costs:
◦ Usage-based charges for compute, storage, and network.
◦ No upfront infrastructure investment.
Bene ts of AWS TCO:
Background:
• Comparison:
◦ On-premises Infrastructure:
▪ High upfront capital expenditure (hardware, facilities).
▪ Fixed costs, even if utilization decreases.
▪ Limited scalability.
◦ AWS Cloud:
▪ Pay only for used resources.
▪ Easy scalability (up or down).
▪ Lower total costs with no long-term commitments.
• Components of TCO:
• Billing Dashboard:
• Purpose:
• Support Plans:
Core Components
1. AWS Regions:
◦ A Region is a physical geographic location with multiple
Availability Zones (AZs).
◦ Key characteristics:
▪ Isolated for fault tolerance and stability.
▪ Data is not replicated across Regions unless explicitly
con gured by the customer.
◦ Example: US East (N. Virginia), Asia Paci c (Tokyo).
2. Availability Zones (AZs):
◦ Separate data centers within a Region.
◦ Fully isolated but connected by low-latency, high-bandwidth
links.
◦ Enable high availability and fault tolerance for applications.
◦ Example: A Region may have 3 AZs, such as "us-east-1a",
"us-east-1b", "us-east-1c".
3. Edge Locations and Regional Edge Caches:
◦ Edge Locations: Deliver content closer to end users to
reduce latency (e.g., for Amazon CloudFront).
fi
fi
fi
◦ Regional Edge Caches: Serve less frequently accessed
content for improved performance.
Choosing a Region
• Key Considerations:
1. Data Governance: Legal or regulatory requirements.
2. Proximity to Users: Reduces latency.
3. Services Availability: Some services may not be offered in
all Regions.
4. Cost: Pricing may vary by Region.
Key Features
1. Elasticity and Scalability:
◦ Adjust resources dynamically to match demand.
2. Fault Tolerance:
◦ Built-in redundancy ensures continuous operation during
failures.
3. High Availability:
◦ Minimized downtime through multiple AZs and automated
failover.
Overview
AWS provides services grouped into categories. Here are the most
critical ones for exam preparation:
1. Compute Services
• Amazon S3:
◦ Scalable object storage for a wide variety of use cases.
◦ Offers S3 Glacier for long-term, low-cost archival storage.
• Amazon EBS:
◦ Block storage for EC2 instances; suitable for databases.
• Amazon EFS:
◦ Fully managed Network File System (NFS) for scalable
storage.
3. Database Services
• Amazon RDS:
◦ Managed relational databases (e.g., MySQL, PostgreSQL).
• Amazon DynamoDB:
◦ NoSQL database for high-speed and scalable operations.
• Amazon Redshift:
◦ Data warehousing for analytics.
4. Networking and Content Delivery
• Amazon VPC:
◦ Virtual private cloud for isolated networking environments.
• Amazon CloudFront:
◦ Content Delivery Network (CDN) for low-latency data
delivery.
• Amazon Route 53:
◦ DNS web service for domain routing.
5. Security, Identity, and Compliance
• IAM:
fi
◦ Manage user access and permissions securely.
• AWS Shield:
◦ Protects applications from DDoS attacks.
• AWS Key Management Service (KMS):
◦ Centralized key management for encryption.
6. Cost Management
• AWS Budgets:
◦ Set custom spending limits and alerts.
• AWS Cost Explorer:
◦ Visualize and analyze cost trends.
7. Management and Governance
Final Summary
Key Components
1. AWS Regions
◦ A Region is a physical location worldwide where AWS has
clusters of data centers.
◦ Each Region contains multiple Availability Zones (AZs).
◦ Examples:
▪ US East (N. Virginia)
▪ Asia Paci c (Singapore)
◦ Characteristics of Regions:
▪ Regions are isolated from one another to ensure fault
tolerance.
▪ Customers choose Regions based on compliance,
proximity, and pricing.
2. Availability Zones (AZs)
◦ AZs consist of one or more data centers located in a Region.
◦ They are independent to minimize risks (e.g., natural
disasters).
◦ Interconnected with low-latency, high-bandwidth
networking.
◦ Enable high availability by distributing resources across
multiple AZs.
3. Edge Locations
◦ These are smaller data centers used to deliver content to users
with low latency.
◦ Used by services like Amazon CloudFront and Route 53.
◦ Positioned in major cities worldwide.
Region Selection Considerations
Compute Services
Introduction
Overview
•
Security of the global infrastructure:
◦ Physical Security:
▪ Controlled, need-based access to data centers.
▪ 24/7 security guards, video surveillance.
▪ Access logging and review.
◦ Hardware: Servers, storage devices.
◦ Network: Routers, switches, rewalls, load balancers.
Customer Responsibilities
•
Data encryption (at rest and in transit).
•
Security con gurations (e.g., rewalls, operating system patches).
•
Content management:
◦ Storage, masking, anonymization, and encryption of data.
◦ Access rights and permissions management.
Key Takeaways
Core Components
1. IAM Users:
◦ Individual users with unique credentials.
◦ Different access types: programmatic or console.
2. IAM Groups:
◦ Simplify management of user permissions.
◦ Users inherit group permissions.
3. IAM Roles:
fi
fi
fi
◦ Temporary access with de ned policies.
◦ Ideal for delegation and cross-account access.
4. IAM Policies:
◦ JSON documents specifying permissions.
◦ Types:
▪ Identity-based Policies: Attached to users, groups, or
roles.
▪ Resource-based Policies: Attached to AWS resources.
Best Practices
Data Encryption
• At Rest:
◦ Use AES-256 encryption.
◦ Automate encryption with AWS Key Management Service
(KMS).
• In Transit:
fi
fi
◦ Secure with Transport Layer Security (TLS).
◦ Use AWS Certi cate Manager for managing certi cates.
Amazon S3 Security
Compliance Programs
• AWS aligns with global standards like ISO 27001, HIPAA, and
GDPR.
• Tools to ensure compliance:
◦ AWS Con g: Monitors resource con gurations.
◦ AWS Artifact: Provides compliance reports and security
documents.
Service Control Policies (SCPs)
AWS Shield
Lab Activities
Division of Responsibilities
Components
1. IAM Users:
◦ Represent individuals or applications with unique credentials.
2. IAM Groups:
◦ Collections of users sharing the same set of permissions.
◦ Simpli es permissions management.
3. IAM Roles:
◦ Assign temporary permissions to users or services.
◦ Example: An EC2 instance assumes a role to access S3
buckets.
4. IAM Policies:
◦ JSON documents that de ne access permissions for
resources.
◦ Types of policies:
fi
fi
fi
fi
fi
fi
▪ Identity-based: Attached to users, groups, or roles.
▪ Resource-based: Attached to AWS resources (e.g., S3
bucket policies).
Best Practices
Encryption
• Data at Rest:
• AWS Shield:
Key Takeaways
Introduction
Key Concepts
Overview
• Subnets:
◦ Public: Internet accessible.
◦ Private: No direct internet access.
• IP Addressing:
◦ Assign CIDR blocks during VPC creation.
◦ Ensure non-overlapping blocks between subnets.
Networking Features
Security Groups
• Instance-level Firewalls:
◦ Allow inbound and outbound traf c based on rules.
◦ Default Rules: Allow all outbound traf c, block inbound
traf c.
◦ Stateful: Automatically allows return traf c.
Network ACLs
• Subnet-level Firewalls:
◦ Separate inbound and outbound rules.
◦ Stateless: Requires explicit rules for return traf c.
Comparison
Security
Feature Network ACLs
Groups
Scope Instance Level Subnet Level
Allow and
Rules Allow only
Deny
Stateful/
Stateful Stateless
Stateless
fi
fi
fi
fi
fi
fi
Section 5: Amazon Route 53
Core Features
Overview
Practical Exercises
1. Network Diagram:
◦ Label components like subnets, route tables, and gateways.
2. VPC Architecture:
fi
fi
fi
fi
fi
◦ Design a VPC with public/private subnets and a NAT
Gateway.
3. Hands-on Lab:
◦ Create a VPC.
◦ Add subnets and launch a web server instance.