CPF QB
CPF QB
3. List out the Cloud Service Providers. Explain any two service
providers in detail.
Major Cloud Service Providers include:
1. Amazon Web Services (AWS)
2. Microsoft Azure
3. Google Cloud Platform (GCP)
4. IBM Cloud
5. Oracle Cloud
6. Alibaba Cloud
Detailed Explanation:
• Amazon Web Services (AWS): AWS is one of the largest cloud
platforms providing a wide range of services including
computing power (EC2), storage (S3), databases (RDS), machine
learning, and AI. It offers flexible pricing models such as pay-as-
you-go, reserved instances, and spot instances. AWS has global
availability zones ensuring high availability and low-latency
access.
• Microsoft Azure: Microsoft Azure provides solutions in various
domains such as virtual machines, databases, AI services, and
developer tools. It integrates seamlessly with other Microsoft
products, making it highly attractive to organizations using
Microsoft technologies like Windows Server, SQL Server, and
Active Directory. Azure also supports both Windows and Linux
environments.
4.Explain the role of the AWS Management Console and the AWS
CLI in managing cloud services.
The AWS Management Console and AWS Command Line Interface
(CLI) are two key tools for managing AWS services.
o AWS Management Console:
The console is a web-based graphical user interface that
allows users to interact with AWS services. Users can
navigate through different services, monitor resources,
and configure settings visually without needing any
command-line skills. It provides access to most AWS
services and offers various dashboards to monitor usage,
billing, and security.
Key Features:
▪ Simple and intuitive interface for accessing AWS
services.
▪ Visual monitoring of resources through services like
CloudWatch.
▪ Easy creation and management of EC2 instances, S3
buckets, and more.
o AWS CLI (Command Line Interface):
The CLI is a command-line tool that allows users to
interact with AWS services using text-based commands. It
is ideal for automating repetitive tasks, integrating AWS
services into scripts, and managing large-scale AWS
environments efficiently.
Key Features:
▪ Enables automation of AWS tasks through scripting.
▪ Offers full control over AWS services using
commands.
▪ Allows execution of operations across different AWS
accounts and regions.
Both the AWS Management Console and the CLI provide
complementary ways of managing cloud resources, catering to users
who prefer graphical interfaces or command-line-based automation.
6.What is Amazon EC2? How would you launch an EC2 instance for a
web server on AWS?
Amazon EC2 (Elastic Compute Cloud) provides scalable compute
capacity in the cloud. It allows businesses and developers to run
applications on virtual servers with varying configurations of CPU,
memory, and storage, depending on workload requirements.
Steps to Launch an EC2 Instance for a Web Server:
1. Login to AWS Management Console:
Go to the EC2 dashboard in the AWS Management
Console.
2. Choose an Amazon Machine Image (AMI):
Select an AMI, which contains the operating system and
software configuration for the instance. For a web server,
you might choose an AMI with pre-installed Apache or
Nginx (e.g., an Ubuntu or Amazon Linux AMI).
3. Choose an Instance Type:
Select the instance type based on the CPU and memory
requirements of your web server. For simple web hosting,
a t2.micro instance may be sufficient.
4. Configure Instance Details:
Configure networking settings, such as selecting the
correct VPC and subnet, enabling auto-scaling, or adding
an IAM role.
5. Add Storage:
Specify the storage type (e.g., EBS) and size of the disk.
6. Configure Security Groups:
Set up a security group to allow HTTP (port 80) or HTTPS
(port 443) traffic to your instance, as well as SSH (port 22)
for management access.
7. Launch the Instance:
Review your settings and launch the instance. You'll need
to select or create a key pair for SSH access.
8. Access the Instance:
Once the instance is running, use SSH to connect to the
instance and configure the web server (e.g., installing
Apache or Nginx, configuring virtual hosts).
________________________________________________________
Unit 4 :
1. Explain how you would ensure data security, network security,
and compliance.
Ensuring security in AWS involves implementing several layers of
protection and adhering to best practices for data, network, and
compliance management.
• Data Security:
o Encryption: Use AWS Key Management Service (KMS) to
manage encryption keys and ensure all sensitive data is
encrypted both at rest and in transit. Services like Amazon
S3, RDS, and DynamoDB support server-side encryption
(SSE).
o Access Control: Implement AWS Identity and Access
Management (IAM) to enforce the principle of least
privilege. Define roles and permissions for users and
services, ensuring they have only the access they need.
o Data Backup and Recovery: Use Amazon S3 versioning,
AWS Backup, and RDS snapshots for automated backups
and disaster recovery to avoid data loss.
• Network Security:
o VPC Security: Create isolated environments using Virtual
Private Cloud (VPC) and leverage security groups and
network access control lists (NACLs) to control inbound
and outbound traffic.
o Encryption in Transit: Use SSL/TLS for encrypting data in
transit between client and server applications. Enable
HTTPS endpoints and VPN or Direct Connect for secure
network connections.
o Firewalls and DDoS Protection: Use AWS Shield and AWS
WAF (Web Application Firewall) to mitigate Distributed
Denial of Service (DDoS) attacks and protect web
applications from common vulnerabilities.
• Compliance:
o Auditing and Monitoring: Use AWS CloudTrail for tracking
and logging all API activity, and AWS Config for monitoring
configuration changes across services. These can be set to
trigger alarms for any non-compliant changes.
o Governance Frameworks: Leverage AWS Artifact for
compliance reports, and configure AWS services to meet
industry-specific compliance standards such as HIPAA,
GDPR, or SOC 2.
o Automated Compliance Checks: Use AWS services like
AWS Config Rules to automatically check whether your
AWS resources comply with best practices and
regulations.
6. How does AWS ensure security best practices across its services?
AWS ensures security best practices through various mechanisms:
• AWS Well-Architected Framework: This framework includes a
Security Pillar that outlines best practices and principles for
securing workloads in the cloud.
• Identity and Access Management (IAM): AWS uses IAM to
manage user identities and permissions, ensuring secure access
control and fine-grained permission policies.
• Encryption: AWS provides multiple services for encrypting data
both at rest and in transit, including AWS KMS (Key
Management Service), S3 server-side encryption, and SSL/TLS
for data transmission.
• Logging and Auditing: Services like AWS CloudTrail and AWS
Config ensure continuous monitoring and logging of all API
activity, resource configurations, and compliance.
• DDoS Protection: AWS Shield and AWS WAF (Web Application
Firewall) protect applications from DDoS attacks and other web
exploits.
• Network Isolation: AWS VPCs and security groups allow users
to create isolated network environments and control traffic
flow, ensuring that resources are only accessible to authorized
users.
7. Set up an AWS CloudTrail to log all API calls made in your AWS
account.
To set up AWS CloudTrail for logging all API calls:
1. Go to CloudTrail Console: Sign in to the AWS Management
Console and navigate to the CloudTrail service.
2. Create a New Trail:
o Click on Create trail.
o Provide a name for the trail.
3. Configure Storage:
o Specify an existing S3 bucket or create a new one where
CloudTrail logs will be stored.
o Optionally, enable S3 bucket log file encryption for
security.
4. Enable Multi-Region Logging:
o Select Yes to enable logging of events across all AWS
regions.
5. Enable Log Delivery to CloudWatch:
o Optionally, integrate CloudTrail with CloudWatch Logs to
set up real-time monitoring and alerts.
6. Apply: Review your configuration and click on Create trail.
CloudTrail will now begin logging API calls for all AWS services in the
account.