티스토리 뷰

☁️ Security
Shared Responsibility Model
AWS Identity and Access Management (IAM)
AWS Compliance programs
AWS Artifact
AWS Artifact Follow Along
Amazon Inspector
AWS WAF
AWS Shield
Penetration Testing
Guard Duty
Key Management Service
Amazon Macie
Security Groups vs NACLs
AWS VPN

☁️ Migration and innovation
AWS Cloud Adoption Framework (AWS CAF)

☁️ Variation Study
Cloud* Service
Connect Service
Elastic Transcoder vs Media Convert
SNS vs SQS
Inspector vs Trusted Advisor
ALB vs NLB vs CLB
SNS vs SES
Artifact vs Inspector

☁️ Security

Shared Responsibility Model

IN: customer responsible in the cloud. OS, Firewall, Data misconfiguration, IAM
OF: AWS. H/W, Operation of Managed Services, Global Infrastructure

AWS Identity and Access Management (IAM)

  • Create users to enable people and applications to interact with AWS services and resources

An IAM user is an identity that you create in AWS.
IAM policy is a document that allows or denies permissions to AWS services and resources.
An IAM role is an identity that you can assume to gain temporary access to permissions.
In IAM, multi-factor authentication (MFA) provides an extra layer of security for your AWS account.

AWS Compliance programs

When you first create an AWS account, you begin with an identity known as the root user.
compy with laws, rules, regulations
Data security standard
PCI: when you sell something online

AWS Artifact

  • a service that provides on-demand access to AWS security and compliance reports and select online agreements.

purpose: if it's actually meeting a compliance?
access to AWS' security and compliance reports

Amazon Inspector

  • AWS Inspector runs a security assessment and provides with a list of security findings

How do we prove an EC2 Instance is harden? (act of eliminating as many security risks as possible)
can perform both network and host assessments
popular benchmark is CIS which has 699 checks (center for internet security)

AWS WAF (Web Application Firewall)

  • a web application firewall that lets you monitor network requests that come into your web applications.

protect from web exploits
can be attached to **CloudFront or Application Load Balancer**

AWS Shield

DDos (Distributed Denial of Service)
malicious attempt to disrupt normal traffic by flooding a large amount of fake traffic
all give automatic protections, at no additional charge

Route53 or CloudeFront you are using AWS Shield Standard
Protects you against Layer3(network),4(transport) and 7(app) attacks

Penetration Testing

simulated cyber attack on computer system to evaluate security, available on AWS

Guard Duty

  • a service that provides intelligent threat detection for your AWS infrastructure and resources

IDS/IPS Intrusion Detection system, Intrusion Protection System
monitor unauthorized behavior. use ML to analyze AWS logs: CloudTrail logs, VPC Flow logs, DNS logs
it will alert you findings

Key Management Service (KMS)

- applications’ data is secure while in storage(encryption at rest)and while it is transmitted, known asencryption in transit.

encryption keys to encrypt your data

  • multi-tenant HSM(hardware security module) for storing keys
  • integrated to use KMS with a simple checknbox
  • Envelope Encryption: protect your KEY by putting it in envelop

Amazon Macie

monitors S3 data access activities
Use ML to analyze your CloudTrail logs

Security Groups vs NACLs (Network Access Control Lists)

both are firewalls

instance level(Allow rules) vs subnet level(Allow and Deny rules)

AWS VPN (Virtual Private Network)

lets you establish a secure and private tunnel

☁️ Migration and innovation

AWS Cloud Adoption Framework (AWS CAF)

6 Perspectives

  1. Business
    to move from a model that separates business and IT strategies into a business model that integrates IT strategy.
  2. People
    helps Human Resources (HR) employees prepare their teams for cloud adoption by updating organizational processes and staff skills to include cloud-based competencies.
  3. Governance
    focuses on the skills and processes to align IT strategy with business strategy. This ensures that you maximize the business value and minimize risks. you understand how to update the staff skills and organizational processes that are necessary to ensure business governance in the cloud.
  4. Platform
    helps you design, implement, and optimize your AWS infrastructure based on your business goals and perspectives
    also includes principles for implementing new solutions and migrating on-premises workloads to the cloud.
  5. Security
  6. Operations
    focuses on operating and recovering IT workloads to meet the requirements of your business stakeholders.

6 strategies for migration

  1. Rehosting
    “lift-and-shift” involves moving applications without changes.
    In the scenario of a large legacy migration, in which the company is looking to implement its migration and scale quickly to meet a business case, the majority of applications are rehosted.
  2. Replatforming
    “lift, tinker, and shift,” involves making a few cloud optimizations to realize a tangible benefit. Optimization is achieved without changing the core architecture of the application.
  3. Refactoring/re-architecting
    involves changing how an application is architected and developed, typically by using cloud-native features
    (also known as re-architecting) involves reimagining how an application is architected and developed by using cloud-native features. Refactoring is driven by a strong business need to add features, scale, or performance that would otherwise be difficult to achieve in the application’s existing environment.
  4. Repurchasing: moving to a different product
    involves moving from a traditional license to a software-as-a-service model.
    For example, a business might choose to implement the repurchasing strategy by migrating from a customer relationship management (CRM) system to Salesforce.com.
  5. Retaining
    might be deprecated
    consists of keeping applications that are critical for the business in the source environment. This might include applications that require major refactoring before they can be migrated, or, work that can be postponed until a later time.
  6. Retiring
    the process of removing applications that are no longer needed.

AWS Snow Family

  1. AWS Snowcone is a small, rugged, and secure edge computing and data transfer device.
    It features 2 CPUs, 4 GB of memory, and 8 TB of usable storage.
  2. AWS SNOWBALL
  • nowball Edge Storage Optimized
    80TB HDD
  • Snowball Edge Compute Optimized
    42TB HDD
  1. AWS SNOWMOBILE
    You can transfer up to 100 petabytes of data per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi trailer truck.

Machine Learning

  • Amazon SageMaker, you can quickly and easily begin working on machine learning projects. You do not need to follow the traditional process of manually bringing together separate tools and workflows.
  • Amazon Textract is a machine learning service that automatically extracts text and data from scanned documents.
  • Amazon Lex is a service that enables you to build conversational interfaces using voice and text.
  • AWS DeepRacer is an autonomous 1/18 scale race car that you can use to test reinforcement learning models.☁️ Variation Study
  • Amazon Augmented AI (Amazon A2I) provides built-in human review workflows for common machine learning use cases, such as content moderation and text extraction from documents. With Amazon A2I, you can also create your own workflows for machine learning models built on Amazon SageMaker or any other tools.

The other response options are incorrect because:

Amazon Textract is a machine learning service that automatically extracts text and data from scanned documents.
Amazon Lex is a service that enables you to build conversational interfaces using voice and text.

Cloud* Service

Connect Service

Elastic Transcoder vs Media Convert

SNS vs SQS

tightly coupled architecture can fail when single compenents have failure. More realiable, Loosely coupled architecture, won't cause cascading failures

*Amazon Simple Notification Service (Amazon SNS): can send out end users. subscribers of topics == web servers, email addresses, Lambda functions etc *

*Amazon Simple Queue Service (Amazon SQS): msg queueing service. send store receive msgs. msgs place until they delivered * between distributed application components. Which service should you use

SNS vs SES

Inspector vs Trusted Advisor

ALB vs NLB vs CLB ( Load Balancer)

Artifact vs Inspector

댓글