AWS CC Seminar
AWS CC Seminar
AMAZON WEB
SERVICES
Presented by :
Akshara K M
Bhavadharani S
Laxmi Priyya K S
Supriya R
Varsha K
OVERVIEW
WHAT IS CLOUD COMPUTING?
WHAT IS AWS ?
AWS CLOUD INFRASTRUCTURE
AWS CORE SERVICES
IDENTITY AND ACCESS MANAGEMENT
REAL LIFE APPLICATIONS OF AWS
CLOUD COMPUTING
Cloud computing means using the internet to access
computing resources like servers, storage, databases, and
software — instead of buying and managing them on your
own computer or data center.
KEY FEATURES
aws.amazon.com
Public AMI
What it is: Shared by AWS or third parties; available for anyone to use.
Private AMI
It is created by you or your organization and only visible in your AWS account.
Paid (Marketplace) AMI
It is created by third-party vendors and sold through the AWS Marketplace. It often
includes licensed software
To meet these requirements within a tight deadline, Accenture adopted HashiCorp Terraform
as the Infrastructure as Code (IaC) tool, enabling consistent and repeatable provisioning of AWS
resources.
AWS delivers seamless access to mission-critical data with SAP Datasphere, SAP Analytics
Cloud, and SAP AI Launchpad.
Benefits:
Scalability: AWS's infrastructure allows businesses to scale their SAP workloads up or down
based on demand.
Cost Efficiency: The pay-as-you-go model ensures that companies only pay for the
resources they use, leading to potential cost savings.
COMPONENTS
1. Region
A Region is a physical geographic location where AWS has
clusters of data centers.
Regions are independent to ensure data sovereignty,
compliance, and resilience.
Example Regions:
us-east-1 (N. Virginia, USA)
eu-west-1 (Ireland)
ap-southeast-2 (Sydney)
2. Availability Zone (AZ)
An AZ is one or more data centers within a region with independent
power, cooling, and networking.
Each AZ is physically separated but connected with low-latency
links.
Regions always have at least two AZs for redundancy.
Example:
us-east-1 has AZs like us-east-1a, us-east-1b, us-east-1c.
3.Edge locations
Global data centers for fast content delivery.
Part of CloudFront CDN.
Reduce latency by caching data near users.
Found in major cities worldwide.
3. Local Zones
Local Zones extend AWS services closer to end-users or edge locations,
minimizing latency.
Linked to a parent region but physically closer to customers.
Example:
Los Angeles Local Zone attached to us-west-2 (Oregon).
4. Global Network
All AWS regions are connected via a high-bandwidth, fully redundant
network.
This backbone provides secure, low-latency communication between
regions.
AWS CORE SERVIVES
AWS core services include essential
building blocks for cloud computing,
such as compute, storage, databases,
and networking, enabling users to
build and run applications on the
cloud. Here, we’ll look about some of
the most important services provided
by AWS.
AMAZON EC2
EC2 stands for Elastic Compute Cloud a
service from Amazon Web Services (AWS).
EC2 is an on-demand computing service on
the AWS cloud platform. It lets you rent
virtual computers to run your applications.
You pay only for what you use.
Instead of buying and managing your own
servers, EC2 gives you a virtual machine,
where you can run websites, apps, or even
big data tasks. You can choose how much
memory, storage, and processing power you
need- and stop it when you’re done.
Think of EC2 like renting a room in a hotel
(the cloud). You get your own space (CPU,
RAM, OS), and you can use it for as long as
you want. You don’t have to buy the whole
hotel — just rent the room when needed.
EC2 INSTANCE TYPES
5 Major Instance Types
Example : You can create a user Anna, assign her to a group Developers,
and give that group permissions to use EC2 and S3. We can also require
MFA when Anna accesses the AWS console.
Why Security Is Important in AWS:
Data Protection : Ensures your sensitive and confidential data (e.g., customer
information, financial data) is not exposed or stolen.
Compliance Requirements : Helps meet regulatory standards (like GDPR, HIPAA,
PCI-DSS) by implementing secure configurations and access controls.
Business Continuity : Prevents disruptions or losses due to cyberattacks or
misconfigurations.
User and Access Control : Prevents unauthorized access through IAM policies,
roles, and MFA.
Cost Control : Avoids security breaches that could lead to data loss, legal
penalties, and financial damage.
Reputation Management : Maintains trust with customers and stakeholders by
securing systems against breaches.
AWS Security Services like:
AWS CloudTrail (activity logs)
AWS Config (compliance monitoring)
Amazon GuardDuty (threat detection)
AWS WAF (Web Application Firewall)
Monitor and audit regularly.
AWS Shared Responsibility Model:
Security of the cloud:AWS (e.g.,physicalservers, network
infrastructure).
Security in the cloud:User (e.g., data, IAM, configurations, apps)
THANK YOU!
TIME FOR QUIZ