0% found this document useful (0 votes)
103 views39 pages

Internship Report by Asmita Prajapati PDF

This internship report summarizes Asmita Prajapati's internship at Watchguard Technologies from February 2021 to July 2021. The report details the implementation of an asset management project for the company using various AWS services like DynamoDB, Lambda, Cognito, SNS, and CloudFormation. During the internship, Asmita learned about cybersecurity, Python, REST APIs, Postman, and cloud computing concepts. The asset management project involves building a serverless database to store asset details, creating user authentication using Cognito, implementing authorization logic with Lambda Authorizer, and deploying the system on AWS using SAM templates and CloudFormation.

Uploaded by

Vishnu Lata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views39 pages

Internship Report by Asmita Prajapati PDF

This internship report summarizes Asmita Prajapati's internship at Watchguard Technologies from February 2021 to July 2021. The report details the implementation of an asset management project for the company using various AWS services like DynamoDB, Lambda, Cognito, SNS, and CloudFormation. During the internship, Asmita learned about cybersecurity, Python, REST APIs, Postman, and cloud computing concepts. The asset management project involves building a serverless database to store asset details, creating user authentication using Cognito, implementing authorization logic with Lambda Authorizer, and deploying the system on AWS using SAM templates and CloudFormation.

Uploaded by

Vishnu Lata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

INTERNSHIP REPORT

FEB 2021 – JULY 2021

Internship report submitted in partial fulfilment of the requirement for


the degree of Bachelor of Technology
In

COMPUTER SCIENCE ENGINEERING

By:
Asmita Prajapati(171267)

To

Department of Computer Science & Engineering and Information


Technology
Jaypee University of Information Technology Waknaghat, Solan-
173234, Himachal Pradesh
TABLE OF CONTENTS

Chapter No. Topics Page No.


Student Declaration 2

Certificate from the Supervisor 3

Acknowledgement 4

Summary 5

List of Figures 6

Glossary of terms used 7

Chapter 1 Company’s Profile 8-9

Chapter 2 Introduction to the Project 10

Chapter 3 Implementation details 11-36

Chapter 4 Results & Conclusion 37

References 38

1
DECLARATION

I hereby declare that this submission is my own work carried out at Watchguard
Technologies India Pvt Ltd, Noida from Feb, 2021 to July, 2021 and that, to the best
of my knowledge and belief, it contains no material previously published or written by
another person nor material which has been accepted for the award of any other degree or
diploma from a university or other institute of higher learning, except where due
acknowledgment has been made in the text.

Signature

Name: Asmita Prajapati


Date: 22-05-2021

2
CERTIFICATE

This is to certify that Ms. Asmita Prajapati of Jaypee University of Information


Technology carried out the internship under my supervision at Watchguard
Technologies from Feb, 2021 to July, 2021. Her efforts in the development of this
internship were satisfactory.

Arsh Arafaat Date: 22 May, 2021


Engineering Manager
Watchguard Technologies

3
ACKNOWLEDGEMENT

I take this opportunity to express my sincere thanks and deep gratitude to all those
people who extended their wholehearted cooperation and have helped me in
completing this internship successfully.

First of all, I would like to thank Mr. Arsh Arafaat and Mr. Anand Dev, who mentored
me, guided me and challenged me.

I also thank my family and friends who greatly supported me during the course of
theInternship.

Last but not the least, I would like to thank our founders for considering me a part of
the organization and provide such a great Platform to learn and enhance my skills.

A very special thanks goes to all the faculties of Jaypee University of Information
Technologyunder whom guidance I have been able to excel in my career and become a part
of the Watchguard family.

Asmita Prajapati

171267

Jaypee University of Information Technology

4
SUMMARY

This report is all about what I learned as an intern and the work I carried out in Watchguard
Technologies, Noida during my internship period from Feb, 2021 to July, 2021.

Fori25iyears,iWatchGuardihasipioneeredicutting-edgeicybersecurityitechnologyiandideliverediitiasieasy-
to-deployiandieasy-to-manageisolutions.iWithiindustry leadinginetworkiandiendpointisecurity,isecureiWi-
Fi,imultifactoriauthentication,iandinetworkiintelligenceiproductsiandiservices,iWatchGuardienablesimorei
thani250,000ismalliandimidsizeienterprisesifromiarounditheiglobeitoiprotectitheirimostiimportantiassetsii
ncludingioveri10imillioniendpoints.iIniaiworldiwhereitheicybersecurityilandscapeiisiconstantlyievolving,i
andinewithreatsiemergeieachiday,iWatchGuardimakesienterprise
gradeicybersecurityitechnologyiaccessibleiforieveryicompany.iWatchGuardiisiheadquarterediiniSeattle,i
Washington,iwithiofficesithroughoutiNorthiAmerica,iEurope,iAsiaiPacific,iandiLatiniAmerica.

Working here has taught me that a project is not only a piece of code, it is a compilation of
uncountable number of modules and a process behind building these modules. Writing code is just a
small fraction of making an application. Planning, assigning, reviewing, fixing, testing, compiling and
tracking all this process are some other fractions of developing an application.

During this internship, I did various Udemy trainings on, cyber-security, python, restful APIs in flask,
postman and its testing. After that I have learning about cloud and its different services. I have also
done two courses on AWS, explored various services with hands on experience in it. Currently, I am
working on an asset-management project for the company using dynamodb, lambda, cognito, sns and
cloudformation.

Asmita Prajapati
May 22, 2021

5
LIST OF FIGURES

1. IAM Policies 15

2. Password Encryption 16

3. S3 Buckets 18

4. Cognito User Pool 19

5. API Gateway 21

6. Lambda Authorizer 22

7. Lambda Console 23

8. Dynamo DB table structure 24

9. Cloudwatch Metric 25

6
ABBREVIATIONS

1. AWS - Amazon Web Services

2. EC2 - Elastic Compute Cloud

3. ECS - Elastic Container Service

4. EFS - Elastic File System

5. API - Application Programming Interface

6. RDS - Relational Databases

7. S3 - Simple Storage Service

8. KMS - Key Management Service

9. IAM – Identity and Access Management

10. ECR – Elastic Container Registry

7
Chapter - 1
COMPANY’S PROFILE

1.1. Summary

Website:
https://www.watchguard.com

Facebook Page:
https://www.facebook.com/watchguardtechnolges

Linkedin Page:
https://www.linkedin.com/company/watchguard-technologies/

Twitter Page:

https://twitter.com/watchguard

1.2. About Us

Fori25iyears,iWatchGuardihasipioneeredicutting-
edgeicybersecurityitechnologyiandideliverediitiasieasy-to-deployiandieasy-to-
manageisolutions.iWithiindustry leadinginetworkiandiendpointisecurity,isecureiWi-
Fi,imultifactoriauthentication,iandinetworkiintelligenceiproductsiandiservices,iWatchGuardienablesimo
reithani250,000ismalliandimidsizeienterprisesifromiarounditheiglobeitoiprotectitheirimostiimportantias
setsiincludingioveri10imillioniendpoints.iIniaiworldiwhereitheicybersecurityilandscapeiisiconstantlyiev
olving,iandinewithreatsiemergeieachiday,iWatchGuardimakesienterprise
gradeicybersecurityitechnologyiaccessibleiforieveryicompany.iWatchGuardiisiheadquarterediiniSeattle,
iWashington,iwithiofficesithroughoutiNorthiAmerica,iEurope,iAsiaiPacific,iandiLatiniAmerica.

8
Intelligent Protection
Effective protection against today’s vast number of evolving threats requires multiple services
working intelligently together. Prevent, detect, and instantly respond to cyber attacks with automated
policies.

Simplified Management
Managing security across your organization has never been simpler. Use out-of-the-box tools to
quickly and easily deploy, configure, and maintain your security with the granularity of your choice.

Actionable Visibility
Monitor and report on the health of your IT infrastructure. Actionable visibility tools enable you to
proactively identify threats, while providing corrective action against known issues.

9
Chapter - 2
INTRODUCTION TO THE PROJECT

Asset Management project deals with the information of all the office related purchases of different
items/assets including laptops, mice, routers, keyboards, monitors, etc. Managing their details, model, date
of expiration and their availability is done in this project.

It uses different services of AWS for different purposes, from which the main ones are:

1) DynamoDb: For managing the serverless database of different kinds of assets


2) Cognito: For creating user pool and keep a track of different users who logs in
3) Lambda Authorizer: For authentication of various APIs and make it more secure
4) Lambda: For creating and storing our functional codes in a serverless manner
5) API Gateway/Postman: For testing our api and creating routes for different APIs
6) Cloudwatch logs: For maintaining logs for each lambda function we have created, and tracing its
events
7) S3: For the static hosting of our websites
8) Route 53: For providing us with a domain name
9) SAM template, Cloudformation: For deploying it completely serverless

10
Chapter - 3
IMPLEMENTATION DETAILS

 AWS and its services

1. EC2

AmazoniElasticiComputeiCloudi(AmazoniEC2)iisiaiwebiserviceithatiprovidesisecure,iresi
zableicomputeicapacityiinitheicloud.iItiisidesigneditoimakeiweb-
scaleicloudicomputingieasieriforidevelopers.iAmazoniEC2’sisimpleiwebiserviceiinterfacei
allowsiyouitoiobtainiandiconfigureicapacityiwithiminimalifriction.iItiprovidesiyouiwithico
mpleteicontroliofiyouricomputingiresourcesiandiletsiyouirunioniAmazon’siprovenicomputi
ngienvironment.

AmazoniEC2ioffersitheibroadestiandideepesticomputeiplatformiwithichoiceiofiprocessor,is
torage,inetworking,ioperatingisystem,iandipurchaseimodel.iWeiofferitheifastestiprocessorsi
initheicloudiandiweiareitheionlyicloudiwithi400iGbpsiethernetinetworking.iWeihaveitheim
ostipowerfuliGPUiinstancesiforimachineilearningitrainingiandigraphicsiworkloads,iasiwell
iasitheilowesticost-per-

11
inferenceiinstancesiinitheicloud.iMoreiSAP,iHPC,iMachineiLearning,iandiWindowsiworkl
oadsirunioniAWSithanianyiothericloud.iWeicaniconnectitoiouriec2iserversiusingiec2iconn
ectifromitheiconsoleiitselfioriusingisomeithirdipartyiapplicationilikeimobaxtermiandiputtyi
server.

2. ECS / Fargate / ECR

What is ECS (Elastic Container Service)?

AmazoniElasticiContaineriServicei(AmazoniECS)iisiaihighlyiscalable,ihigh-
performance container orchestrationiserviceithatisupports Docker containersiandiallowsiyo
uitoieasilyiruniandiscaleicontainerizediapplicationsioniAWS.iAmazoniECSieliminatesithei
neediforiyouitoiinstalliandioperateiyouriownicontaineriorchestrationisoftware,imanageiand
iscaleiaiclusteriofivirtualimachines,iorischeduleicontainersionithoseivirtualimachines.

WithisimpleiAPIicalls,iyouicanilaunchiandistopiDocker-
enablediapplications,iqueryitheicompleteistateiofiyouriapplication,iandiaccessimanyifamili
arifeaturesisuchiasiIAMiroles,isecurityigroups,iloadibalancers,iAmazoniCloudWatchiEvent
s,iAWSiCloudFormationitemplates,iandiAWSiCloudTraililogs.
12
What is ECR (Elastic Container Registry)?

AmazoniElasticiContaineriRegistryi(ECR)iisiaifully-
managed Docker containeriregistryithatimakesiitieasyiforidevelopersitoistore,imanage,iand
ideployiDockericontaineriimages.iAmazoniECRiisiintegratediwith AmazoniElasticiContai
neriServicei(ECS),isimplifyingiyouridevelopmentitoiproductioniworkflow.iAmazoniECRie
liminatesitheineeditoioperateiyouriownicontainerirepositoriesioriworryiaboutiscalingitheiu
nderlyingiinfrastructure.iAmazoniECRihostsiyouriimagesiiniaihighlyiavailableiandiscalabl
eiarchitecture,iallowingiyouitoireliablyideployicontainersiforiyouriapplications.iIntegration
iwithiAWSiIdentityiandiAccessiManagementi(IAM)iprovidesiresource-
levelicontroliofieachirepository.iWithiAmazoniECR,ithereiareinoiupfrontifeesioricommitm
ents.iYouipayionlyiforitheiamountiofidataiyouistoreiiniyourirepositoriesiandidataitransferr
editoitheiInternet

What is AWS Fargate?

13
AWSiFargateiisiaicomputeiengineiforiAmazoniECSithatiallowsiyouitoirun containers with
outihavingitoimanageiserversioriclusters.iWithiAWSiFargate,iyouinoilongerihaveitoiprovis
ion,iconfigure,iandiscaleiclustersiofivirtualimachinesitoirunicontainers.iThisiremovesithein
eeditoichooseiserveritypes,idecideiwhenitoiscaleiyouriclusters,iorioptimizeiclusteripacking.
iAWSiFargateiremovesitheineediforiyouitoiinteractiwithiorithinkiaboutiserversioriclusters.i
Fargateiletsiyouifocusionidesigningiandibuildingiyouriapplicationsiinsteadiofimanagingith
eiinfrastructureithatirunsithem.

3. IAM

IAMiisiaifeatureiofiyouriAWSiaccountiofferediatinoiadditionalicharge.iYouiwillibeicharge
dionlyiforiuseiofiotheriAWSiservicesibyiyouriusers.

AWSiIAMiallowsiyouito:

ManageiIAMiusersianditheiriaccessi–
iYouicanicreateiusersiiniIAM,iassignithemiindividualisecurityicredentialsi(iniotheriwords,i
accessikeys,ipasswords,iandimulti-
factoriauthenticationidevices),iorirequestitemporaryisecurityicredentialsitoiprovideiusersiac
cessitoiAWSiservicesiandiresources.iYouicanimanageipermissionsiiniorderitoicontroliwhic
hioperationsiaiusericaniperform.

14
ManageiIAMirolesianditheiripermissionsi–
iYouicanicreateirolesiiniIAMiandimanageipermissionsitoicontroliwhichioperationsicanibei
performedibyitheientity,ioriAWSiservice,ithatiassumesitheirole.iYouicanialsoidefineiwhich
ientityiisialloweditoiassumeitheirole.iIniaddition,iyouicaniuseiservice-
linkedirolesitoidelegateipermissionsitoiAWSiservicesithaticreateiandimanageiAWSiresourc
esioniyouribehalf.

Manageifederatediusersianditheiripermissionsi–
iYouicanienableiidentityifederationitoiallowiexistingiidentitiesi(users,igroups,iandiroles)iin
iyourienterpriseitoiaccessitheiAWSiManagementiConsole,icalliAWSiAPIs,iandiaccessireso
urces,iwithoutitheineeditoicreateianiIAMiuseriforieachiidentity.iUseianyiidentityimanagem
entisolutionithatisupportsiSAMLi2.0,ioriuseioneiofiourifederationisamplesi(AWSiConsolei
SSOioriAPIifederation).

15
4. KMS

AWSiKeyiManagementiServicei(AWSiKMS)iisianiencryptioniandikeyimanagementiwebis
ervice.

Encryptsiplaintextiintoiciphertextibyiusingiaicustomerimasterikeyi(CMK).iTheiEncryptiop
erationihasitwoiprimaryiuseicases:


Youicaniencryptismalliamountsiofiarbitraryidata,isuchiasiaipersonaliidentifieriorida
tabaseipassword,ioriotherisensitiveiinformation.


YouicaniuseitheiEncryptioperationitoimoveiencryptedidataifromioneiAWSiRegioni
toianother.iForiexample,iiniRegioniA,igenerateiaidataikeyiandiuseitheiplaintextikeyitoienc
ryptiyouridata.iThen,iiniRegioniA,iuseitheiEncryptioperationitoiencryptitheiplaintextidatai
keyiunderiaiCMKiiniRegioniB.iNow,iyouicanimoveitheiencryptedidataianditheiencryptedi
dataikeyitoiRegioniB.iWheninecessary,iyouicanidecryptitheiencryptedidataikeyianditheien
cryptedidataientirelyiwithiniiniRegioniB.

DecryptsiciphertextithatiwasiencryptedibyiaiAWSiKMSicustomerimasterikeyi(CMK)iusin
gianyiofitheifollowingioperations:

Encrypt

GenerateDataKey

16
GenerateDataKeyPair

GenerateDataKeyWithoutPlaintext

GenerateDataKeyPairWithoutPlaintext

Youicaniuseithisioperationitoidecrypticiphertextithatiwasiencryptediunderiaisymmetriciori
asymmetriciCMK.

5. S3

AmazoniSimpleiStorageiServicei(AmazoniS3)iisianiobjectistorageiserviceithatioffersiindus
try-

17
leadingiscalability,idataiavailability,isecurity,iandiperformance.iThisimeansicustomersiofia
llisizesiandiindustriesicaniuseiititoistoreiandiprotectianyiamountiofidataiforiairangeiofiusei
cases,isuchiasidatailakes,iwebsites,imobileiapplications,ibackupiandirestore,iarchive,ienter
priseiapplications,iIoTidevices,iandibigidataianalytics.iAmazoniS3iprovidesieasy-to-
useimanagementifeaturesisoiyouicaniorganizeiyouridataiandiconfigureifinely-
tunediaccessicontrolsitoimeetiyourispecificibusiness,iorganizational,iandicomplianceirequir
ements.i

AniAmazoniS3ibucketiisiaipublicicloudistorageiresourceiavailableiiniAmazoniWebiServic
es'i(AWS)iSimpleiStorageiServicei(S3),ianiobjectistorageioffering.iAmazoniS3ibuckets,iw
hichiareisimilaritoifileifolders,istoreiobjects,iwhichiconsistiofidataiandiitsidescriptiveimeta
data

6. Cognito

18
AmazoniCognitoiletsiyouiaddiuserisign-up,isign-
in,iandiaccessicontrolitoiyouriwebiandimobileiappsiquicklyiandieasily.iAmazoniCognitois
calesitoimillionsiofiusersiandisupportsisign-
iniwithisocialiidentityiproviders,isuchiasiApple,iFacebook,iGoogle,iandiAmazon,iandiente
rpriseiidentityiprovidersiviaiSAMLi2.0iandiOpenIDiConnect.ii

19
7. API Gateway

AmazoniAPIiGatewayiisiaifullyimanagediserviceithatimakesiitieasyiforidevelopersitoicreat
e,ipublish,imaintain,imonitor,iandisecureiAPIsiatianyiscale.iAPIsiactiasithei"frontidoor"ifo
riapplicationsitoiaccessidata,ibusinessilogic,iorifunctionalityifromiyouribackendiservices.i
UsingiAPIiGateway,iyouicanicreateiRESTfuliAPIsiandiWebSocketiAPIsithatienableireal-
timeitwo-
wayicommunicationiapplications.iAPIiGatewayisupportsicontainerizediandiserverlessiwor
kloads,iasiwelliasiwebiapplications.

APIiGatewayihandlesiallitheitasksiinvolvediiniacceptingiandiprocessingiupitoihundredsiofi
thousandsioficoncurrentiAPIicalls,iincludingitrafficimanagement,iCORSisupport,iauthoriza
tioniandiaccessicontrol,ithrottling,imonitoring,iandiAPIiversionimanagement.iAPIiGatewa
yihasinoiminimumifeesioristartupicosts.iYouipayiforitheiAPIicallsiyouireceiveianditheiam
ountiofidataitransferredioutiand,iwithitheiAPIiGatewayitieredipricingimodel,iyouicaniredu
ceiyouricostiasiyouriAPIiusageiscales.

20
21
Lambda Authorizer

AiLambdaiauthorizeri(formerlyiknowniasiaicustomiauthorizer)iisianiAPIiGatewayifeaturei
thatiusesiaiLambdaifunctionitoicontroliaccessitoiyouriAPI.

AiLambdaiauthorizeriisiusefuliifiyouiwantitoiimplementiaicustomiauthorizationischemeith
atiusesiaibeareritokeniauthenticationistrategyisuchiasiOAuthioriSAML,iorithatiusesireques
tiparametersitoidetermineitheicaller'siidentity.

WheniaiclientimakesiairequestitoioneiofiyouriAPI'simethods,iAPIiGatewayicallsiyouriLam
bdaiauthorizer,iwhichitakesitheicaller'siidentityiasiinputiandireturnsianiIAMipolicyiasioutp
ut.

22
8. Lambda

AWSiLambdaiisiaiserverlessicomputeiserviceithatirunsiyouricodeiiniresponseitoieventsian
diautomaticallyimanagesitheiunderlyingicomputeiresourcesiforiyou.iYouicaniuseiAWSiLa
mbdaitoiextendiotheriAWSiservicesiwithicustomilogic,ioricreateiyouriowniback-
endiservicesithatioperateiatiAWSiscale,iperformance,iandisecurity.

AfteriyouiuploadiyouricodeitoiAWSiLambda,iyouicaniassociateiyourifunctioniwithispecifi
ciAWSiresourcesi(e.g.iaiparticulariAmazoniS3ibucket,iAmazoniDynamoDBitable,iAmazo
niKinesisistream,ioriAmazoniSNSinotification).iThen,iwhenitheiresourceichanges,iLambd
aiwilliexecuteiyourifunctioniandimanageitheicomputeiresourcesiasineedediiniorderitoikeep
iupiwithiincomingirequests.

23
9. Dynamo DB

Amazon DynamoDB is a fully managed NoSQL database service that provides fast and
predictable performance with seamless scalability. DynamoDB lets you offload the
administrative burdens of operating and scaling a distributed database so that you don't
have to worry about hardware provisioning, setup and configuration, replication, software
patching, or cluster scaling. DynamoDB also offers encryption at rest, which eliminates the
operational burden and complexity involved in protecting sensitive data. For more
information, see DynamoDB Encryption at Rest.

With DynamoDB, you can create database tables that can store and retrieve any amount of
data and serve any level of request traffic. You can scale up or scale down your tables'
throughput capacity without downtime or performance degradation. You can use the AWS
Management Console to monitor resource utilization and performance metrics.

Core Components of Amazon DynamoDB


When you create a table, in addition to the table name, you must specify the primary key of
the table. The primary key uniquely identifies each item in the table, so that no two items
can have the same key.

DynamoDB supports two different kinds of primary keys:

Partition key – A simple primary key, composed of one attribute known as the partition
key.

24
DynamoDB uses the partition key's value as input to an internal hash function. The output
from the hash function determines the partition (physical storage internal to DynamoDB) in
which the item will be stored.

Partition key and sort key – Referred to as a composite primary key, this type of key is
composed of two attributes. The first attribute is the partition key, and the second attribute
is the sort key.

DynamoDB uses the partition key value as input to an internal hash function. The output
from the hash function determines the partition (physical storage internal to DynamoDB) in
which the item will be stored. All items with the same partition key value are stored
together, in sorted order by sort key value.

In a table that has a partition key and a sort key, it's possible for two items to have the same
partition key value. However, those two items must have different sort key values.

25
10. CloudWatch Logs

CloudWatchiLogsiletsiyouimonitorianditroubleshootiyourisystemsiandiapplicationsiusingi
youriexistingisystem,iapplicationiandicustomilogifiles.iWithiCloudWatchiLogs,iyouicanim
onitoriyourilogs,iininearirealitime,iforispecificiphrases,ivaluesioripatterns.

CloudWatchiLogsienablesiyouitoiseeialliofiyourilogs,iregardlessiofitheirisource,iasiaisingl
eiandiconsistentiflowiofieventsiorderedibyitime,iandiyouicaniqueryithemiandisortithemiba
sedioniotheridimensions,igroupithemibyispecificifields,icreateicustomicomputationsiwithia
ipowerfuliqueryilanguage,iandivisualizeilogidata.

26
 Architecture Diagram of the Project

27
28
 API Docs

1. Asset Category

o ADD

o FETCH

o UPDATE

29
2. Asset Item Type

o ADD

o FETCH

o UPDATE

30
o DELETE

3. Asset Item

o ADD

o FETCH

31
o UPDATE

o DELETE

32
4. User

o SIGN-UP

o SET-PASSWORD

o SIGN-IN

33
 UI Designs

34
35
36
Chapter - 4

RESULTS AND CONCLUSION

This internship gave me a clear picture of how working in real world looks like, it has increased my
knowledge to a great extent. In addition to the technical knowledge I gained, I also learned what are the
problems we face in day-to-day life when we work on any project and how we manage to solve those
issues, what benefits we have while working in a team and how to balance between the different
responsibilities we have.
By making this report on AWS and its services, I got to know about the need of this technology in today’s
world.
It is very important to manage such a huge amount of data that is prevailing around us and technologies
such as AWS are the ones that are exceeding in doing so.
They remove the problems of big data and also tell the efficient ways to store, compute and analyze your
client’s data.
I also got to know about the various new terms and that one can have a great future and scope in this
technology.
Working on AWS and gaining the hands-on experience on its working has been a very enriching journey
for me.

37
References

[1] https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Introduction.html
[2] https://ap-south-1.console.aws.amazon.com/lambda/home?region=ap-south-1#/functions’
[3] https://ap-south-1.console.aws.amazon.com/ec2/v2/home?region=ap-south-
1#Instances:instanceState=running
[4] https://ap-south-1.console.aws.amazon.com/cloudwatch/home?region=ap-south-1
[5] https://docs.aws.amazon.com/AmazonS3/latest/userguide/Welcome.html’
[6] https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools.html
[7] https://ap-south-1.console.aws.amazon.com/apigateway/main/apis?region=ap-south-1
[8] https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/kms.html
[9] https://medium.com/petabytz/amazon-web-services-wordpress-configuration-on-ecs-using-ecr-
images-9c1e97d05aaa

38

You might also like