S. No.
|
Important Point(s)
|
1.
|
AWS stands for Amazon Web Services.
|
2.
|
Six advantages of cloud computing:
o Global in minutes
o Variable vs capital expense
o Stop guessing capacity
o Economies of Scale
o Focus on business differentiators
o Increase speed and agility
|
3.
|
You can achieve high availability by deploying your application across multiple Availability Zones. Redundant instances for each tier (for example, web, application, and database) of an application should be placed in distinct Availability Zones, thereby creating a multi site solution. At a minimum, the goal is to have an independent copy of each application stack in two or more Availability Zones.
|
4.
|

|
5.
|
NAT instances are EC2 instances running in public subnet that allows EC2 instances running in the private subnet to connect to internet.
NAT instances requires a security group to be configured to allow the ingress and egress traffic from and to the internet.
NAT gateway doesn’t need to be behind a security group as opposed to NAT instances which are always behind a security group.
NAT gateway are highly available and created with redundancy in the availability zone. NAT gateway supports the bandwidth bursts of up to 10 Gbps.
|
6.
|
An Elastic Network Interface (ENI) is a virtual network interface that you can attach to an instance in an Amazon VPC. An Amazon VPC endpoint enables you to create a private connection between your Amazon VPC and another AWS service without requiring access over the Internet or through a NAT instance, VPN connection, or AWS Direct Connect. You can create multiple endpoints for a single service, and you can use different route tables to enforce different access policies from different subnets to the same service.
|
7.
|
Amazon VPC endpoints currently support communication with Amazon Simple Storage Service (Amazon S3), and other services are expected to be added in the future.
|
8.
|
Amazon VPC peering connection is a networking connection between two Amazon VPCs that enables instances in either Amazon VPC to communicate with each other as if they are within the same network.
|
9.
|
A peering connection is neither a gateway nor an Amazon VPN connection and does not introduce a single point of failure for communication.
|
10.
|
A security group is a virtual stateful firewall that controls inbound and outbound network traffic to AWS resources and Amazon EC2 instances.
|
11.
|
All Amazon EC2 instances must be launched into a security group. If a security group is not specified at launch, then the instance will be launched into the default security group for the Amazon VPC. The default security group allows communication between all resources within the security group, allows all outbound traffic, and denies all other traffic.
|
12.
|
-
You can create up to 500 security groups for each Amazon VPC.
-
You can add up to 50 inbound and 50 outbound rules to each security group. If you need to apply more than 100 rules to an instance, you can associate up to five security groups with each network interface.
-
You can specify allow rules, but not deny rules. This is an important difference between security groups and ACLs.
-
You can specify separate rules for inbound and outbound traffic.
|
13.
|
A network access control list (ACL) is another layer of security that acts as a stateless firewall on a subnet level.Overall, every subnet must be associated with a network ACL.
|
14.
|
By default, any instance that you launch into a private subnet in an Amazon VPC is not able to communicate with the Internet through the IGW. This is problematic if the instances
within private subnets need direct access to the Internet from the Amazon VPC in order to apply security updates, download patches, or update application software. AWS provides NAT
instances and NAT gateways to allow instances deployed in private subnets to gain Internet access.
|
15.
|
For common use cases, we recommend that you use a NAT gateway instead of a NAT instance. The NAT gateway provides better availability and higher bandwidth, and requires less administrative effort than NAT instances.
|
16.
|
To create an Availability Zone-independent architecture, create a NAT gateway in
each Availability Zone and configure your routing to ensure that resources use the NAT
gateway in the same Availability Zone.
|
17.
|
A VPC consists of the following components:
-
Subnets
-
Route tables
-
DHCP option sets
-
Security groups
-
Network ACLs
|
18.
|
A VPC has the following optional components:
-
IGWs
-
EIP addresses
-
Endpoints
-
Peering
-
NAT instance and NAT gateway
-
VPG, CGW, and VPN
|
19.
|
Elastic Load Balancing is a highly available service itself and can be used to help
build highly available architectures.
|
20.
|
An AWS recommended best practice is always to reference a load balancer by its
DNS name, instead of by the IP address of the load balancer, in order to provide a single,
stable entry point.
|
21.
|
To ensure that the load balance is responsible for closing the connections to your
back-end instance, make sure that the value you set for the keep-alive time is greater
than the idle timeout setting on your load balance.
|
22.
|
Long-running applications will eventually need to be maintained and updated with a
newer version of the application. When using Amazon EC2 instances running behind an
Elastic Load Balancing load balancer, you may deregister these long-running Amazon
EC2 instances associated with a load balancer manually and then register newly
launched Amazon EC2 instances that you have started with the new updates installed.
|
23.
|
Manual scaling out can be very useful to increase resources for an infrequent
event, such as the release of a new game version that will be available for download and
require a user registration. For extremely large-scale events, even the Elastic Load
Balancing load balancers can be pre-warmed by working with your local solutions
architect or AWS Support.
|
24.
|
Recurring events such as end-of-month, quarter, or year processing, or scheduled
and recurring automated load and performance testing, can be anticipated and Auto
Scaling can be ramped up appropriately at the time of the scheduled event.
|
25.
|
Auto Scaling has several components that need to be configured to work properly: a launch
configuration, an Auto Scaling group, and an optional scaling policy.
|
26.
|
Scale out quickly;
scale in slowly.
|
27.
|
Using IAM roles for Amazon EC2 removes the need to store AWS credentials in a configuration file.
|
28.
|
Using predefined managed policies ensures that when new permissions are added
for new features, your users will still have the correct access.
|
29.
|
A good first step is to use the root user to create a new IAM group called “IAM Administrators” and assign the managed policy, “IAMFullAccess.” Then create a new IAM user called “Administrator,” assign a password, and add it to the IAM
Administrators group. At this point, you can log off as the root user and perform all further administration with the IAM user account.
|
30.
|
MFA requires you to verify your identity with both something you know and something you have.
|
31.
|
Access keys should be rotated on a regular schedule.
|
32.
|
All the appropriate policies are evaluated; if there is an explicit “deny” found in any policy, the request is denied and evaluation stops.
|
33.
|
If there are no explicit “allow” or “deny” permissions found, then the default “deny” is maintained and the request is denied.
|
34.
|
The policy cannot override any permission that is denied by default in the role
|
35.
|
The three principals that can authenticate and
interact with AWS resources are the root user, IAM users, and roles. The root user is associated with the actual AWS account and cannot be restricted in any way. IAM users are persistent identities that can be controlled through IAM. Roles allow people or processes the ability to operate temporarily with a different identity. People or processes assume a role by being granted a temporary security token that will expire after a specified period of time.
|
36.
|
A policy is a JSON document that defines one or more
permissions to interact with AWS resources. Each permission includes the effect, service,
action, and resource. It may also include one or more conditions. AWS makes many
predefined policies available as managed policies.
|
37.
|
An authenticated principal is
associated with zero to many policies. For an IAM user, these policies may be attached
directly to the user account or attached to an IAM group of which the user account is a
member. A temporary security token is associated with policies by assuming an IAM role.
|
38.
|
MFA increases the security of an AWS account by augmenting the
password (something you know) with a rotating OTP from a small device (something you
have), ensuring that anyone authenticating the account has both knowledge of the password
and possession of the device. AWS supports both Gemalto hardware MFA devices and a
number of virtual MFA apps.
|
39.
|
To protect your AWS infrastructure, access keys should be
rotated regularly. AWS allows two access keys to be valid simultaneously to make the
rotation process straightforward: Generate a new access key, configure your application to
use the new access key, test, disable the original access key, test, delete the original access
key, and test again.
|
40.
|
Roles are the basis for federating external IdPs with AWS. You configure an IAM IdP to
interact with the external IdP, the authenticated identity from the IdP is mapped to a role,
and a temporary security token is returned that has assumed that role. AWS supports both
SAML and OIDC IdPs.
|
41.
|
Resolving multiple permissions is
relatively straightforward. If an action on a resource has not been explicitly allowed by a
policy, it is denied. If two policies contradict each other; that is, if one policy allows an action
on a resource and another policy denies that action, the action is denied. While this sounds
improbable, it may occur due to scope differences in a policy. One policy may expose an
entire fleet of Amazon EC2 instances, and a second policy may explicitly lock down one
particular instance.
|
42.
|
Existing databases can be migrated to Amazon RDS using native tools and
techniques that vary depending on the engine. For example with MySQL, you can export
a backup using mysqldump and import the file into Amazon RDS MySQL. You can also
use the AWS Database Migration Service, which gives you a graphical interface that
simplifies the migration of both schema and data between databases. AWS Database
Migration Service also helps convert databases from one database engine to another.
|
43.
|
For most applications, General Purpose (SSD) is the best option and provides a
good mix of lower-cost and higher-performance characteristics.
|
44.
|
You can create one or more replicas of a database within a single AWS Region or
across multiple AWS Regions. To enhance your disaster recovery capabilities or reduce
global latencies, you can use cross-region read replicas to serve read traffic from a region
closest to your global users or migrate your databases across AWS Regions.
|
45.
|
A COPY command can load data into a table in the most efficient manner, and it
supports multiple types of input data sources. The fastest way to load data into Amazon
Redshift is doing bulk data loads from flat files stored in an Amazon Simple Storage
Service (Amazon S3) bucket or from an Amazon DynamoDB table.
|
46.
|
For mobile applications, a best practice is to use a combination of web identity
federation with the AWS Security Token Service (AWS STS) to issue temporary keys that
expire after a short period.
|
47.
|
Amazon RDS currently
supports six relational database engines:
Microsoft SQL Server
MySQL Server
Oracle
PostgreSQL
MariaDB
Amazon Aurora
|
48.
|
NoSQL databases are non-relational databases,
meaning that you do not have to have an existing table created in which to store your data.
NoSQL databases come in the following formats:
Document databases
Graph stores
Key/value stores
Wide-column stores
|
49.
|
Routing Policies
• Simple
• Weighted
• Latency
• Failover
• Geolocation
• Multi Value
|
50.
|
Amazon SQS is a fast, reliable, scalable, and fully managed message queuing service. Amazon
SQS makes it simple and cost effective to decouple the components of a cloud application.
You can use Amazon SQS to transmit any volume of data, at any level of throughput, without
losing messages or requiring other services to be continuously available.
|
51.
|
 |