Aw Stech Essentials
Aw Stech Essentials
Policy
document
AWS Organizations
Organizational
Control Policy
Organizational
Unit Dev Test Prod
OU OU OU
AWS Accounts
AWS Resources
AWS Organizations
STANDARD
SERVICE ICON
ALTERNATE
SERVICE ICON
RESOURCES
Region
AWS Region
Availability Zones
o ELB can target EC2 instances across multiple
availability zones
o EC2 Auto Scaling can scale EC2 instances
in Operation across multiple availability zones
o RDS solutions are replicated across multiple
availability zones
Edge Locations at AWS
Edge Locations
Filtering rules
Static content with
S3 and CloudFront
Web ACL Rule Web ACL Rule Web ACL Rule Web ACL Rule
Internet
AWS Global
Accelerator
Main Route
Table
Destination | Target
Router
Internet gateway
VPC
Public subnet
Internet gateway
Private subnet
NAT gateway Virtual private
Web App gateway
Virtual private
Route table gateway
Private subnet
Application
NACL NAT gateway load balancer NAT gateway
NACL
Inbound
Elastic Load Balancer Rule EC2 Security group SQL Security group
Security group
TCP 8080 TCP 2306
TCP 443
Inbound Rule Outbound Inbound Outbound Inbound
Rule Rule Rule Rule
DNS Firewall
Block DNS outbound queries that are made for known
malicious domains, while allowing DNS queries to trusted
domains
DNS Firewall consists of domain lists and rule groups
associated with a VPC
Stateless Rules have three options:
Pass – the packet is passed without further
inspection
Drop – the packet is dropped
Forward – Forward packet to stateful rule groups for
further inspection
AWS Network Firewall
1 2 3 4 5 6
Email notification
AWS Config
Amazon CloudWatch HTTP notification
AWS CloudTrail
API Calls
AWS Lambda
Authentication
Flow logs
Lambda function
EC2 Auto Scaling
o Availability – EC2 Auto Scaling helps you ensure
that you have the correct number of EC2
instances available to handle the end-user load
for your application
o Fault Tolerance – Auto scaling detects unhealthy
instances, terminates and relaunches an
instance to replace the unhealthy one
o Management of costs – Dynamically increase
and decrease capacity as required; only pay for
the computer that you need
Scaling Policy Options
• General purpose:
SSD
Boot volumes, low latency
applications
• Provisioned IOPS: Databases
with sustained IOPS
• Throughput optimized:
HDD
High-throughput sequential
workloads
• Cold: Logging and minimal
needs
AWS Key Management
Service (KMS)
Control the encryption of stored data across AWS
services
Centrally manage and store your customer
master keys (CMKs)
CMKs can be generated using KMS, in an AWS
CloudHSM cluster, or imported
Cached
volume
S3 S3 Glacier
File Gateway
Interface local storage directly into S3 storage
Store and retrieve files in S3 using either the NFS
version 3, or 4.1 protocol
Shares are accessible using NFS or SMB protocol
Volume Gateway
Cached volumes: data can be stored in S3 with a copy
of frequently accessed data cached locally
Storage volumes: data is stored locally and
asynchronously backed up using snapshots to S3
No services, instances to manage – focus on
creating functions
Full name
Encrypted RSA private Swift Source
key codes Email
code
Credit card
numbers