INTERNSHIP REPORT
FEB 2021 – JULY 2021
Internship report submitted in partial fulfilment of the requirement for
the degree of Bachelor of Technology
In
COMPUTER SCIENCE ENGINEERING
By:
Asmita Prajapati(171267)
To
Department of Computer Science & Engineering and Information
Technology
Jaypee University of Information Technology Waknaghat, Solan-
173234, Himachal Pradesh
TABLE OF CONTENTS
Chapter No. Topics Page No.
Student Declaration 2
Certificate from the Supervisor 3
Acknowledgement 4
Summary 5
List of Figures 6
Glossary of terms used 7
Chapter 1 Company’s Profile 8-9
Chapter 2 Introduction to the Project 10
Chapter 3 Implementation details 11-36
Chapter 4 Results & Conclusion 37
References 38
1
DECLARATION
I hereby declare that this submission is my own work carried out at Watchguard
Technologies India Pvt Ltd, Noida from Feb, 2021 to July, 2021 and that, to the best
of my knowledge and belief, it contains no material previously published or written by
another person nor material which has been accepted for the award of any other degree or
diploma from a university or other institute of higher learning, except where due
acknowledgment has been made in the text.
Signature
Name: Asmita Prajapati
Date: 22-05-2021
2
CERTIFICATE
This is to certify that Ms. Asmita Prajapati of Jaypee University of Information
Technology carried out the internship under my supervision at Watchguard
Technologies from Feb, 2021 to July, 2021. Her efforts in the development of this
internship were satisfactory.
Arsh Arafaat Date: 22 May, 2021
Engineering Manager
Watchguard Technologies
3
ACKNOWLEDGEMENT
I take this opportunity to express my sincere thanks and deep gratitude to all those
people who extended their wholehearted cooperation and have helped me in
completing this internship successfully.
First of all, I would like to thank Mr. Arsh Arafaat and Mr. Anand Dev, who mentored
me, guided me and challenged me.
I also thank my family and friends who greatly supported me during the course of
theInternship.
Last but not the least, I would like to thank our founders for considering me a part of
the organization and provide such a great Platform to learn and enhance my skills.
A very special thanks goes to all the faculties of Jaypee University of Information
Technologyunder whom guidance I have been able to excel in my career and become a part
of the Watchguard family.
Asmita Prajapati
171267
Jaypee University of Information Technology
4
SUMMARY
This report is all about what I learned as an intern and the work I carried out in Watchguard
Technologies, Noida during my internship period from Feb, 2021 to July, 2021.
Fori25iyears,iWatchGuardihasipioneeredicutting-edgeicybersecurityitechnologyiandideliverediitiasieasy-
to-deployiandieasy-to-manageisolutions.iWithiindustry leadinginetworkiandiendpointisecurity,isecureiWi-
Fi,imultifactoriauthentication,iandinetworkiintelligenceiproductsiandiservices,iWatchGuardienablesimorei
thani250,000ismalliandimidsizeienterprisesifromiarounditheiglobeitoiprotectitheirimostiimportantiassetsii
ncludingioveri10imillioniendpoints.iIniaiworldiwhereitheicybersecurityilandscapeiisiconstantlyievolving,i
andinewithreatsiemergeieachiday,iWatchGuardimakesienterprise
gradeicybersecurityitechnologyiaccessibleiforieveryicompany.iWatchGuardiisiheadquarterediiniSeattle,i
Washington,iwithiofficesithroughoutiNorthiAmerica,iEurope,iAsiaiPacific,iandiLatiniAmerica.
Working here has taught me that a project is not only a piece of code, it is a compilation of
uncountable number of modules and a process behind building these modules. Writing code is just a
small fraction of making an application. Planning, assigning, reviewing, fixing, testing, compiling and
tracking all this process are some other fractions of developing an application.
During this internship, I did various Udemy trainings on, cyber-security, python, restful APIs in flask,
postman and its testing. After that I have learning about cloud and its different services. I have also
done two courses on AWS, explored various services with hands on experience in it. Currently, I am
working on an asset-management project for the company using dynamodb, lambda, cognito, sns and
cloudformation.
Asmita Prajapati
May 22, 2021
5
LIST OF FIGURES
1. IAM Policies 15
2. Password Encryption 16
3. S3 Buckets 18
4. Cognito User Pool 19
5. API Gateway 21
6. Lambda Authorizer 22
7. Lambda Console 23
8. Dynamo DB table structure 24
9. Cloudwatch Metric 25
6
ABBREVIATIONS
1. AWS - Amazon Web Services
2. EC2 - Elastic Compute Cloud
3. ECS - Elastic Container Service
4. EFS - Elastic File System
5. API - Application Programming Interface
6. RDS - Relational Databases
7. S3 - Simple Storage Service
8. KMS - Key Management Service
9. IAM – Identity and Access Management
10. ECR – Elastic Container Registry
7
Chapter - 1
COMPANY’S PROFILE
1.1. Summary
Website:
https://www.watchguard.com
Facebook Page:
https://www.facebook.com/watchguardtechnolges
Linkedin Page:
https://www.linkedin.com/company/watchguard-technologies/
Twitter Page:
https://twitter.com/watchguard
1.2. About Us
Fori25iyears,iWatchGuardihasipioneeredicutting-
edgeicybersecurityitechnologyiandideliverediitiasieasy-to-deployiandieasy-to-
manageisolutions.iWithiindustry leadinginetworkiandiendpointisecurity,isecureiWi-
Fi,imultifactoriauthentication,iandinetworkiintelligenceiproductsiandiservices,iWatchGuardienablesimo
reithani250,000ismalliandimidsizeienterprisesifromiarounditheiglobeitoiprotectitheirimostiimportantias
setsiincludingioveri10imillioniendpoints.iIniaiworldiwhereitheicybersecurityilandscapeiisiconstantlyiev
olving,iandinewithreatsiemergeieachiday,iWatchGuardimakesienterprise
gradeicybersecurityitechnologyiaccessibleiforieveryicompany.iWatchGuardiisiheadquarterediiniSeattle,
iWashington,iwithiofficesithroughoutiNorthiAmerica,iEurope,iAsiaiPacific,iandiLatiniAmerica.
8
Intelligent Protection
Effective protection against today’s vast number of evolving threats requires multiple services
working intelligently together. Prevent, detect, and instantly respond to cyber attacks with automated
policies.
Simplified Management
Managing security across your organization has never been simpler. Use out-of-the-box tools to
quickly and easily deploy, configure, and maintain your security with the granularity of your choice.
Actionable Visibility
Monitor and report on the health of your IT infrastructure. Actionable visibility tools enable you to
proactively identify threats, while providing corrective action against known issues.
9
Chapter - 2
INTRODUCTION TO THE PROJECT
Asset Management project deals with the information of all the office related purchases of different
items/assets including laptops, mice, routers, keyboards, monitors, etc. Managing their details, model, date
of expiration and their availability is done in this project.
It uses different services of AWS for different purposes, from which the main ones are:
1) DynamoDb: For managing the serverless database of different kinds of assets
2) Cognito: For creating user pool and keep a track of different users who logs in
3) Lambda Authorizer: For authentication of various APIs and make it more secure
4) Lambda: For creating and storing our functional codes in a serverless manner
5) API Gateway/Postman: For testing our api and creating routes for different APIs
6) Cloudwatch logs: For maintaining logs for each lambda function we have created, and tracing its
events
7) S3: For the static hosting of our websites
8) Route 53: For providing us with a domain name
9) SAM template, Cloudformation: For deploying it completely serverless
10
Chapter - 3
IMPLEMENTATION DETAILS
AWS and its services
1. EC2
AmazoniElasticiComputeiCloudi(AmazoniEC2)iisiaiwebiserviceithatiprovidesisecure,iresi
zableicomputeicapacityiinitheicloud.iItiisidesigneditoimakeiweb-
scaleicloudicomputingieasieriforidevelopers.iAmazoniEC2’sisimpleiwebiserviceiinterfacei
allowsiyouitoiobtainiandiconfigureicapacityiwithiminimalifriction.iItiprovidesiyouiwithico
mpleteicontroliofiyouricomputingiresourcesiandiletsiyouirunioniAmazon’siprovenicomputi
ngienvironment.
AmazoniEC2ioffersitheibroadestiandideepesticomputeiplatformiwithichoiceiofiprocessor,is
torage,inetworking,ioperatingisystem,iandipurchaseimodel.iWeiofferitheifastestiprocessorsi
initheicloudiandiweiareitheionlyicloudiwithi400iGbpsiethernetinetworking.iWeihaveitheim
ostipowerfuliGPUiinstancesiforimachineilearningitrainingiandigraphicsiworkloads,iasiwell
iasitheilowesticost-per-
11
inferenceiinstancesiinitheicloud.iMoreiSAP,iHPC,iMachineiLearning,iandiWindowsiworkl
oadsirunioniAWSithanianyiothericloud.iWeicaniconnectitoiouriec2iserversiusingiec2iconn
ectifromitheiconsoleiitselfioriusingisomeithirdipartyiapplicationilikeimobaxtermiandiputtyi
server.
2. ECS / Fargate / ECR
What is ECS (Elastic Container Service)?
AmazoniElasticiContaineriServicei(AmazoniECS)iisiaihighlyiscalable,ihigh-
performance container orchestrationiserviceithatisupports Docker containersiandiallowsiyo
uitoieasilyiruniandiscaleicontainerizediapplicationsioniAWS.iAmazoniECSieliminatesithei
neediforiyouitoiinstalliandioperateiyouriownicontaineriorchestrationisoftware,imanageiand
iscaleiaiclusteriofivirtualimachines,iorischeduleicontainersionithoseivirtualimachines.
WithisimpleiAPIicalls,iyouicanilaunchiandistopiDocker-
enablediapplications,iqueryitheicompleteistateiofiyouriapplication,iandiaccessimanyifamili
arifeaturesisuchiasiIAMiroles,isecurityigroups,iloadibalancers,iAmazoniCloudWatchiEvent
s,iAWSiCloudFormationitemplates,iandiAWSiCloudTraililogs.
12
What is ECR (Elastic Container Registry)?
AmazoniElasticiContaineriRegistryi(ECR)iisiaifully-
managed Docker containeriregistryithatimakesiitieasyiforidevelopersitoistore,imanage,iand
ideployiDockericontaineriimages.iAmazoniECRiisiintegratediwith AmazoniElasticiContai
neriServicei(ECS),isimplifyingiyouridevelopmentitoiproductioniworkflow.iAmazoniECRie
liminatesitheineeditoioperateiyouriownicontainerirepositoriesioriworryiaboutiscalingitheiu
nderlyingiinfrastructure.iAmazoniECRihostsiyouriimagesiiniaihighlyiavailableiandiscalabl
eiarchitecture,iallowingiyouitoireliablyideployicontainersiforiyouriapplications.iIntegration
iwithiAWSiIdentityiandiAccessiManagementi(IAM)iprovidesiresource-
levelicontroliofieachirepository.iWithiAmazoniECR,ithereiareinoiupfrontifeesioricommitm
ents.iYouipayionlyiforitheiamountiofidataiyouistoreiiniyourirepositoriesiandidataitransferr
editoitheiInternet
What is AWS Fargate?
13
AWSiFargateiisiaicomputeiengineiforiAmazoniECSithatiallowsiyouitoirun containers with
outihavingitoimanageiserversioriclusters.iWithiAWSiFargate,iyouinoilongerihaveitoiprovis
ion,iconfigure,iandiscaleiclustersiofivirtualimachinesitoirunicontainers.iThisiremovesithein
eeditoichooseiserveritypes,idecideiwhenitoiscaleiyouriclusters,iorioptimizeiclusteripacking.
iAWSiFargateiremovesitheineediforiyouitoiinteractiwithiorithinkiaboutiserversioriclusters.i
Fargateiletsiyouifocusionidesigningiandibuildingiyouriapplicationsiinsteadiofimanagingith
eiinfrastructureithatirunsithem.
3. IAM
IAMiisiaifeatureiofiyouriAWSiaccountiofferediatinoiadditionalicharge.iYouiwillibeicharge
dionlyiforiuseiofiotheriAWSiservicesibyiyouriusers.
AWSiIAMiallowsiyouito:
ManageiIAMiusersianditheiriaccessi–
iYouicanicreateiusersiiniIAM,iassignithemiindividualisecurityicredentialsi(iniotheriwords,i
accessikeys,ipasswords,iandimulti-
factoriauthenticationidevices),iorirequestitemporaryisecurityicredentialsitoiprovideiusersiac
cessitoiAWSiservicesiandiresources.iYouicanimanageipermissionsiiniorderitoicontroliwhic
hioperationsiaiusericaniperform.
14
ManageiIAMirolesianditheiripermissionsi–
iYouicanicreateirolesiiniIAMiandimanageipermissionsitoicontroliwhichioperationsicanibei
performedibyitheientity,ioriAWSiservice,ithatiassumesitheirole.iYouicanialsoidefineiwhich
ientityiisialloweditoiassumeitheirole.iIniaddition,iyouicaniuseiservice-
linkedirolesitoidelegateipermissionsitoiAWSiservicesithaticreateiandimanageiAWSiresourc
esioniyouribehalf.
Manageifederatediusersianditheiripermissionsi–
iYouicanienableiidentityifederationitoiallowiexistingiidentitiesi(users,igroups,iandiroles)iin
iyourienterpriseitoiaccessitheiAWSiManagementiConsole,icalliAWSiAPIs,iandiaccessireso
urces,iwithoutitheineeditoicreateianiIAMiuseriforieachiidentity.iUseianyiidentityimanagem
entisolutionithatisupportsiSAMLi2.0,ioriuseioneiofiourifederationisamplesi(AWSiConsolei
SSOioriAPIifederation).
15
4. KMS
AWSiKeyiManagementiServicei(AWSiKMS)iisianiencryptioniandikeyimanagementiwebis
ervice.
Encryptsiplaintextiintoiciphertextibyiusingiaicustomerimasterikeyi(CMK).iTheiEncryptiop
erationihasitwoiprimaryiuseicases:
•
Youicaniencryptismalliamountsiofiarbitraryidata,isuchiasiaipersonaliidentifieriorida
tabaseipassword,ioriotherisensitiveiinformation.
•
YouicaniuseitheiEncryptioperationitoimoveiencryptedidataifromioneiAWSiRegioni
toianother.iForiexample,iiniRegioniA,igenerateiaidataikeyiandiuseitheiplaintextikeyitoienc
ryptiyouridata.iThen,iiniRegioniA,iuseitheiEncryptioperationitoiencryptitheiplaintextidatai
keyiunderiaiCMKiiniRegioniB.iNow,iyouicanimoveitheiencryptedidataianditheiencryptedi
dataikeyitoiRegioniB.iWheninecessary,iyouicanidecryptitheiencryptedidataikeyianditheien
cryptedidataientirelyiwithiniiniRegioniB.
DecryptsiciphertextithatiwasiencryptedibyiaiAWSiKMSicustomerimasterikeyi(CMK)iusin
gianyiofitheifollowingioperations:
Encrypt
GenerateDataKey
16
GenerateDataKeyPair
GenerateDataKeyWithoutPlaintext
GenerateDataKeyPairWithoutPlaintext
Youicaniuseithisioperationitoidecrypticiphertextithatiwasiencryptediunderiaisymmetriciori
asymmetriciCMK.
5. S3
AmazoniSimpleiStorageiServicei(AmazoniS3)iisianiobjectistorageiserviceithatioffersiindus
try-
17
leadingiscalability,idataiavailability,isecurity,iandiperformance.iThisimeansicustomersiofia
llisizesiandiindustriesicaniuseiititoistoreiandiprotectianyiamountiofidataiforiairangeiofiusei
cases,isuchiasidatailakes,iwebsites,imobileiapplications,ibackupiandirestore,iarchive,ienter
priseiapplications,iIoTidevices,iandibigidataianalytics.iAmazoniS3iprovidesieasy-to-
useimanagementifeaturesisoiyouicaniorganizeiyouridataiandiconfigureifinely-
tunediaccessicontrolsitoimeetiyourispecificibusiness,iorganizational,iandicomplianceirequir
ements.i
AniAmazoniS3ibucketiisiaipublicicloudistorageiresourceiavailableiiniAmazoniWebiServic
es'i(AWS)iSimpleiStorageiServicei(S3),ianiobjectistorageioffering.iAmazoniS3ibuckets,iw
hichiareisimilaritoifileifolders,istoreiobjects,iwhichiconsistiofidataiandiitsidescriptiveimeta
data
6. Cognito
18
AmazoniCognitoiletsiyouiaddiuserisign-up,isign-
in,iandiaccessicontrolitoiyouriwebiandimobileiappsiquicklyiandieasily.iAmazoniCognitois
calesitoimillionsiofiusersiandisupportsisign-
iniwithisocialiidentityiproviders,isuchiasiApple,iFacebook,iGoogle,iandiAmazon,iandiente
rpriseiidentityiprovidersiviaiSAMLi2.0iandiOpenIDiConnect.ii
19
7. API Gateway
AmazoniAPIiGatewayiisiaifullyimanagediserviceithatimakesiitieasyiforidevelopersitoicreat
e,ipublish,imaintain,imonitor,iandisecureiAPIsiatianyiscale.iAPIsiactiasithei"frontidoor"ifo
riapplicationsitoiaccessidata,ibusinessilogic,iorifunctionalityifromiyouribackendiservices.i
UsingiAPIiGateway,iyouicanicreateiRESTfuliAPIsiandiWebSocketiAPIsithatienableireal-
timeitwo-
wayicommunicationiapplications.iAPIiGatewayisupportsicontainerizediandiserverlessiwor
kloads,iasiwelliasiwebiapplications.
APIiGatewayihandlesiallitheitasksiinvolvediiniacceptingiandiprocessingiupitoihundredsiofi
thousandsioficoncurrentiAPIicalls,iincludingitrafficimanagement,iCORSisupport,iauthoriza
tioniandiaccessicontrol,ithrottling,imonitoring,iandiAPIiversionimanagement.iAPIiGatewa
yihasinoiminimumifeesioristartupicosts.iYouipayiforitheiAPIicallsiyouireceiveianditheiam
ountiofidataitransferredioutiand,iwithitheiAPIiGatewayitieredipricingimodel,iyouicaniredu
ceiyouricostiasiyouriAPIiusageiscales.
20
21
Lambda Authorizer
AiLambdaiauthorizeri(formerlyiknowniasiaicustomiauthorizer)iisianiAPIiGatewayifeaturei
thatiusesiaiLambdaifunctionitoicontroliaccessitoiyouriAPI.
AiLambdaiauthorizeriisiusefuliifiyouiwantitoiimplementiaicustomiauthorizationischemeith
atiusesiaibeareritokeniauthenticationistrategyisuchiasiOAuthioriSAML,iorithatiusesireques
tiparametersitoidetermineitheicaller'siidentity.
WheniaiclientimakesiairequestitoioneiofiyouriAPI'simethods,iAPIiGatewayicallsiyouriLam
bdaiauthorizer,iwhichitakesitheicaller'siidentityiasiinputiandireturnsianiIAMipolicyiasioutp
ut.
22
8. Lambda
AWSiLambdaiisiaiserverlessicomputeiserviceithatirunsiyouricodeiiniresponseitoieventsian
diautomaticallyimanagesitheiunderlyingicomputeiresourcesiforiyou.iYouicaniuseiAWSiLa
mbdaitoiextendiotheriAWSiservicesiwithicustomilogic,ioricreateiyouriowniback-
endiservicesithatioperateiatiAWSiscale,iperformance,iandisecurity.
AfteriyouiuploadiyouricodeitoiAWSiLambda,iyouicaniassociateiyourifunctioniwithispecifi
ciAWSiresourcesi(e.g.iaiparticulariAmazoniS3ibucket,iAmazoniDynamoDBitable,iAmazo
niKinesisistream,ioriAmazoniSNSinotification).iThen,iwhenitheiresourceichanges,iLambd
aiwilliexecuteiyourifunctioniandimanageitheicomputeiresourcesiasineedediiniorderitoikeep
iupiwithiincomingirequests.
23
9. Dynamo DB
Amazon DynamoDB is a fully managed NoSQL database service that provides fast and
predictable performance with seamless scalability. DynamoDB lets you offload the
administrative burdens of operating and scaling a distributed database so that you don't
have to worry about hardware provisioning, setup and configuration, replication, software
patching, or cluster scaling. DynamoDB also offers encryption at rest, which eliminates the
operational burden and complexity involved in protecting sensitive data. For more
information, see DynamoDB Encryption at Rest.
With DynamoDB, you can create database tables that can store and retrieve any amount of
data and serve any level of request traffic. You can scale up or scale down your tables'
throughput capacity without downtime or performance degradation. You can use the AWS
Management Console to monitor resource utilization and performance metrics.
Core Components of Amazon DynamoDB
When you create a table, in addition to the table name, you must specify the primary key of
the table. The primary key uniquely identifies each item in the table, so that no two items
can have the same key.
DynamoDB supports two different kinds of primary keys:
Partition key – A simple primary key, composed of one attribute known as the partition
key.
24
DynamoDB uses the partition key's value as input to an internal hash function. The output
from the hash function determines the partition (physical storage internal to DynamoDB) in
which the item will be stored.
Partition key and sort key – Referred to as a composite primary key, this type of key is
composed of two attributes. The first attribute is the partition key, and the second attribute
is the sort key.
DynamoDB uses the partition key value as input to an internal hash function. The output
from the hash function determines the partition (physical storage internal to DynamoDB) in
which the item will be stored. All items with the same partition key value are stored
together, in sorted order by sort key value.
In a table that has a partition key and a sort key, it's possible for two items to have the same
partition key value. However, those two items must have different sort key values.
25
10. CloudWatch Logs
CloudWatchiLogsiletsiyouimonitorianditroubleshootiyourisystemsiandiapplicationsiusingi
youriexistingisystem,iapplicationiandicustomilogifiles.iWithiCloudWatchiLogs,iyouicanim
onitoriyourilogs,iininearirealitime,iforispecificiphrases,ivaluesioripatterns.
CloudWatchiLogsienablesiyouitoiseeialliofiyourilogs,iregardlessiofitheirisource,iasiaisingl
eiandiconsistentiflowiofieventsiorderedibyitime,iandiyouicaniqueryithemiandisortithemiba
sedioniotheridimensions,igroupithemibyispecificifields,icreateicustomicomputationsiwithia
ipowerfuliqueryilanguage,iandivisualizeilogidata.
26
Architecture Diagram of the Project
27
28
API Docs
1. Asset Category
o ADD
o FETCH
o UPDATE
29
2. Asset Item Type
o ADD
o FETCH
o UPDATE
30
o DELETE
3. Asset Item
o ADD
o FETCH
31
o UPDATE
o DELETE
32
4. User
o SIGN-UP
o SET-PASSWORD
o SIGN-IN
33
UI Designs
34
35
36
Chapter - 4
RESULTS AND CONCLUSION
This internship gave me a clear picture of how working in real world looks like, it has increased my
knowledge to a great extent. In addition to the technical knowledge I gained, I also learned what are the
problems we face in day-to-day life when we work on any project and how we manage to solve those
issues, what benefits we have while working in a team and how to balance between the different
responsibilities we have.
By making this report on AWS and its services, I got to know about the need of this technology in today’s
world.
It is very important to manage such a huge amount of data that is prevailing around us and technologies
such as AWS are the ones that are exceeding in doing so.
They remove the problems of big data and also tell the efficient ways to store, compute and analyze your
client’s data.
I also got to know about the various new terms and that one can have a great future and scope in this
technology.
Working on AWS and gaining the hands-on experience on its working has been a very enriching journey
for me.
37
References
[1] https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Introduction.html
[2] https://ap-south-1.console.aws.amazon.com/lambda/home?region=ap-south-1#/functions’
[3] https://ap-south-1.console.aws.amazon.com/ec2/v2/home?region=ap-south-
1#Instances:instanceState=running
[4] https://ap-south-1.console.aws.amazon.com/cloudwatch/home?region=ap-south-1
[5] https://docs.aws.amazon.com/AmazonS3/latest/userguide/Welcome.html’
[6] https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools.html
[7] https://ap-south-1.console.aws.amazon.com/apigateway/main/apis?region=ap-south-1
[8] https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/kms.html
[9] https://medium.com/petabytz/amazon-web-services-wordpress-configuration-on-ecs-using-ecr-
images-9c1e97d05aaa
38