100% found this document useful (1 vote)
619 views658 pages

AWS SAA Student Guide

aws saa 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
619 views658 pages

AWS SAA Student Guide

aws saa 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 658
Printed by: [email protected]. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. © 2023 Amazon Web Services, Inc. or its affiliates. All rights reserved. This work may not be reproduced or redistributed, in whole or in part, without prior written permission from Amazon Web Services, Inc. Commercial copying, lending, or selling is prohibited. Corrections, feedback, or other questions? Contact us at hitps://support.aws.amazon.com/#/contacts/aws-training. All trademarks are the property of their owners. Printed by: sathwickdutt [email protected]. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. [AWS Teaning and Centicaion ‘Archtecting en ANS Contents ‘Course Introduction | 4 Module 4: Architecting Fundamentals a" 28 Module 2: Account Security or Module 3: Networking 1 114 Module 4: Compute { 160 Module §: Storage ( 218, Module 6: Database Services , 278 Module 7: Monitoring and Scaling 333 Module 6: Automation : 396 Module 8: Containers 423 Module 10: Networking 2° 459 Medule 11: Sefverless . 498 Modulet2; Edge Services 545 wd 13: Backup and Recovery 600 Course Summary ° 647 ©2002 Amazon Web Sans, eo te alae. Aight reared a Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention (Course invedueton Na rete Ne) fooled cele eel) (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ‘ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Preparing for class (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, . Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ‘ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Logistics + Breaks and lunch + Security + Cell phones + Virtual classroom features + Audio + chat + Raise hand (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 7 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Prerequisites We recommend that course attendees complete one of the following prerequisites: 1. AWS Cloud Practitioner Essentials (CPE) 2. AWS Technical Essentials 3. Bulld a working knowledge of: + Distributed systems + Networking concepts + IP addressing + Cloud computing concepts seventeen re es Oy ‘ If you have this working knowledge and have not taken AWS Cloud Practitioner Essentials, famil with AWS basic cloud services by visiting “AWS Cloud Practitior sIs" in AWS Skill Builder (ht .skillbuilderaws/learn/course/external/vi felear '134/aws-cloud- itioner-e: ° 2 » > , “) . y Ss : ins anc , Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Register for access to guides and lab environments Make sure you register for AWS Builder Labs” + Refer to your w -ome email for registration information Check your inbox for a welcome eméil from your instructor. In this email, you will fiffd. your unique student registration URL for the class. Usé this URL link to create an account or log in to your existing AWS Builder Labs account. In AWS Builder Lats, you tan access your lab environments, Lab Guide, and Student Guide. (©2023 Amazon Web Sonics, rec alas. A rights reserved ° Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Student and lab guides At this time, you should be logged into AWS Builder Labs. From here, youn cess your Lab Guide and Student Guide, which are located in eVantage Bookshelf |VitalSource). Buttons to the Lab Guide and Student Guide arelocted at the tpg corner of your as Bude? 1a yg far Te ab and batons wl bey eitvyed out until the start of the class. ) yy Once the class starts, select either button to access your guidest"You will be prompted to log in with yOUr existing eVantage Bookshelf (VitalSource) account orto create a new account. Once you log in to) eVantage Bookshelf (VitalSource), you will have access to the student and lab guides for the clas. You can access your guides online or download them, Use thas€ guides to follow along with the course and as 2 reference after the training (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 10 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Lab requirements + Computer running: + Reliable internet connection + Windows able to browse the internet + macOS, using HTTPS + Linux: Ubuntu, SUSE, or Red Hat —_* Register for AWS Builder Labs: + Recommended web browser: © Turn off ad and scrige blockers + Google Chrome + Mozilla Firefox + Microsoft Edge (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, " Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton About you Tell us the following: L) + First name + Organization and role LI * What do you expect of this course? CJ (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Course overview (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 18 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention (Course invedueton Peete) (tah) regan emer: ane eet to architect resilient, ne) aera ca b> (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, “4 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Day t agen Mose Mchtcing Fundamentals 45 mines, ab 1 spore and met withthe AWS Managenent Como and AWS romana ie ere, 35 nan ote 2 Account Sacarty oa Moe 3 Networking 1 minaes -~ Mode 4 Compete 78 minaee Lb 2 td your Amazon VPC irate 45 mina A (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 16 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Day2agen odie singe Tonnes ote nia Serce 7 mos abs ene bane ira Aso YE aire Somes Mode 7 Morarng a Sing ome Lab Configure gh avalaby nour Amazon VRC ind Mode © Aetaton ja?) (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ‘6 Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Day agend More 10 Necwoing 2 ‘Soins LS Bald» eres ene Svinais ove 12 Edge Serves 50 mires ane Ub 6 congue an Arson Clank rerButan wh an Amazon = nn ee y= (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 7 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention (Course invedueton Capstone lab + Review and analyze architectural solutions based on project data, best practices, and the AWS Well-Architected Framework. + Design the architecture in a lab, without specifié guidance: ‘The capstone lab is the final project fartfiBicourse. During the lab, you are provided,with a scenario that discusses a business need. Review the requirements and vse what you have learned in this eourse to complete the list of tasks. You learn more about the capstone lab at the end of this course. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 18 Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Capstone acinar drcin ‘This is the multi-tier architecture you build in the capstone lab. ) J During check-ins, you discuss specific services outlined here and how they interact with each other. » . “*For accessibility: A single AWS Region with one VPC and tivo, AVailability Zones, Each Availability Zone contains a public subnet, an app subnet, and a database subnet. An arrow from outside the VPC péints to an ‘Application Load Balancer, not in a subnet or Availability Zone. The arrow continues to the Auto Scaling group that has app servers in the app subnets of both Availability Zones. Each app server communicates with an EFS ‘mount target in its own subnet to reach the Amazorv EFS file system, which is not inside an'Availability Zone. All app servers communicate with an Aurora primary DB instance in one of the database Subfets. The other database subnet holds the Aurore replica A led arrow points between the Aurora primary and Aurora replica. Arrows point away from the app servers and travel through each Availability Zone’s NAT gateway. The NAT gateways are located in the publiésubnet of each Availability Zone. The arfows travel through each NAT tnteway and through the interne gateway to ext the VPC and Region End Bescrpton. (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 16 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Module format Pollsand knomedge chedfs + Questions forthe instructor Each module starts with a check-in poll question ‘Then you are introduced to a stakeholdéPat the beginning of each module. They have brought business requests to you. Their questions havé informed you of what you should research to Support Example Corp. in their cloud journey. Your instruct6r prepares you to present solutions to the stakehélder by teaching you about services and best practices for building on AWS. ‘Atthe end of each module, your instructor asks 2-5 questions to help you review the topics and services covered in the module. In some sections, you also check in on the capstone architecture to see what you have leamed that relafes to the final capstone lab. If you aresattending virtually, use the live group chat to raise your hand and ask questions. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention (Course invedueton ES recta? The chief technology offices has hired you as a solutions architect toW6rk on a number of projects for Example:Gorp. Pay attention 16 what’your stakeholder needs to knoWiailt is your job to help them in eae their journéy in the AWS Cloud. Officer ‘The business request page at the beginning of the module is structured like this. Atthe end of the module, you review the questions asked by the stakeholder and provide solutions to fit their use case. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, a Printed by: sathwickdutt [email protected]., Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Supplemental learning (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton Online Course Supplement (OCS) Architecting on AWS Online Course Supplement (OCS) sien cag a ‘You can use the Online Course Supplement (OCS) to continue your journey after you complete this course. You ‘can also use it to dive deeper on topics not covered in detail in this course, (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, n Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention (Course invedueton AWS documentation resources Rene eet] Peet AWS Documentation ‘As part of their ole, solutions architects research topics and find adgitional information about features and services to make decisions. AWS services are constantly improving’and evolving. Use AWS documentation to find user guides, developer guides, API references, tutorials, and more. Documentation is provided in HTML, PDF, and GitHub. Tofind user guides, developer guides, API referenges, tutorials, and more, see “AWS Documentation” (https://docs.aws.amazon.com/). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Traning and Cention (Course invedueton WE Comers dl) (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 8 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arcitecting Fundamentals Na leh ey Module 1: Architecting Fundamentals C.) (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 28 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Traning and Cention Module 1: Arcitecting Fundamentals PCT CRC BaEe How faris your organization in its journey to the AWS Cloud? A. We're just getting started. We already have prototypes running, We have production workloads running. ene We run 100 percent of our operations in the AWS Cloud. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 1: Arcitecting Fundamentals Module overview + Business request + AWS services + AWS infrastructure + AWS Well-Architected Framework + Present solutions ¥ + Knowledge check + Lab 1: Explore and interact with the AWS Managemént Console and AWS Command Line Interface 2 (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arcitecting Fundamentals Cente The chief technology officer (CTO) wants cold you to explore the following questions: + What are the benefits of using AWS services? + How is the AWS global infrdstiticture organized? + How can we build ouf€loud infrastructure according to bestpractices? Teer) Cre Imagine you are meeting with your CTO as YOu prepare to build in AWS. As you familiarize yourself with AWS, here are some questions to consider 2s younavigate this module. During this module, yo learn about topics that answer these questions. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2» Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. AWS Traning and Cention Module 1: Arctecting Fundamentals PEE ate Ae ey ‘The CTO asks during the project meeting, “What are the benefits of using AWS services?” ‘The company is interested in learning about AWS services and tools that would best fit their needs. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2% Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 1: Arcitecting Fundamentals Amazon Web Services + Global data centers + More than 200 services + Secure androbust + Payas yougo + Built for business needs s somo wn son i AWS the world’s most comprehensive anda cloud solution. AWS offers servicés such as compute, database, and storage. The AWS model, and its security practices, have made AWS the preferred ‘loud solution for businesses and put izations. ‘AWS has been delivering cloud sérvices'to customers around the world running’2 wide variety of use cases. AWS has the most operational experience of any cloud provider, and at a greater scale. AWS has unmatched experience, reliability, and performance, and an unmatched security record. AWSis continuall Hating its pace of innovation to inventinéw technologies you can use to transform your Millions of customers, small and large, are using AWS to lower costs, become more agile, and innovate faster. business. x . (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, a Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Why customers move to AWS sity ‘Accelerate ere to market. 3 opumie eos Customers move to AWS to increase agility. ? * Accelerate time to market —8y spending ess time acquiring and managing ifrastiyettre, you can focus on developing features that deliver valuleto your customers. * Increase innovation - You can speed Rar digital transformation using AWSpwhich provides tools to more: easily access the latest technologleBand best practices. For example, youcaa use AWS to develop automations, adopt containérization, and use machine learning. + Scale seamlessly — You can préVision additional resources to support niéw features and scale existing resources up or down tp match demand. y Customers algo movto’AWS to reduce complexity and risky. ° ” + Optimize costs ~ You can reduce costs by paying for only what you use. Instead of paying for on-premises hardwate, wich you might not be using at full capa, you can pay or compute resources only while you are using tKem. + Minimize security vulnerabilities ~ Moving te AWS puts your applications and data behind the advanced physical security of the AWS data centers, With AWS, you have many tools to manage access to your resources. + Reduce management complexity =Using AWS services can reduce the need to maintain physical data centers, perform hardware mainténance, and manage physical infrastructure. For more information about tBe advantages of migrating your business to the cloud, see “The future of business is here” (httos://aws.amazon,com/campaigns/migrating to-the-cloud/). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS service categories Seve Nawerim Orbe Seary Sinemet ed comet _ “ddneny iicomplin govern 100 ins An fr AWS offers a broad set of global cloud-based products, including compute, storage, database analytics, networking, mobile, developer tools, managemenittools, Internet of Things (loT), security, and enterprise applications. These services help organizations movesster, scale, andlower IT costs. AWS covers infrastructure, foundation, and application services. ~ ‘This course focuses on the AWS services highlighted on this slide. For more information, see “Cloud Products” (httos://aws.emazon.com/prodkts/). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arctecting Fundamentals PE adic Ee enue ate eet | ~~ ‘The CTO asks during the project meeting, “How is AWS global infrastructure organized?” In this section, you explore the AWS Infrastructure. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, “ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS infrastructure topics (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 6 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS data centers + AWS services ‘operate within AWS data centers, + Data centers host ‘thousandsof + Fach location uses AWS proprietary network equipment. + Data centers re organized into ‘Availability Zones. SE 55 ‘AWS pioneered cloud computing in 2006 to provide rapid and secure infrastusture. AWS continuously innovates on the design and systems of data centers to protect them from man-made and natural risks, Today, ‘AWS provides data centers ata large, global scale. , y AWS implements controls, builds automated systems, and condycts third-party audits to confirm security and compliance. As a result, the most highly regulated organizations jf the world trust AWS every day. To learn how AWS secures the data centers, see “Our Data Centers” (pitps://aws amazon.com/compliance/d a-centers/}. - (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Availability Zones (AZs) Bi awstecon Availability Zones are @Q. + Data centre in a Region + Designed for foutt isolation 4 + interconnected oe Using high speed prvatetinks| ‘siaiity Zone + Used to achieve Ak sett | TT enceve| [04a cee [ons te a eee ; ‘A group of one or more data centers is called an Availability Zon, ‘An Availability Zone is one or more discrete data centers with fedundant power, networking, and connectivity in an AWS Region. When you launch an instance, you can sef€ct an Availability Zone or let AWS choose one for you. If you distribute your instances across multiple Availability Zones and one instance fails, you cam design ‘your application so that an instance in another Availability Zone can handle requests. To review Availability Zone information, see “Global Infrastructure” (https://aws.amazon.com/about- aws/global infrastructure) (a A a (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS Regions Each Region: + Iscompletely independent Uses AWS network Infrastructure + Has muttiple ‘Avallallty| Zones oe ene ee , oy Each AWS Region consists of multiple isolated and physical Availability Zones within a olga ‘area. This achieves the greatest possible fault tolerance and stability. In your account, you co \ Regions you need. ‘When you view your resources, you see onl Meer reine rg singe console. This is because Regions are isolated from each other and AWS mone ily replicate. resources across Regions. ‘You can run applications and wor! from a Region to reduce latency to @ndiusers. You can do this while avoiding the upfront expenses, lang-term commitments, and scaling '$ associated with maintaining and operating a global ir oY For more information about AWS Regions, see “Regions and Availability Zones” f6m/about-aws/elobal-infrastruct iors a2/). (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Factors impacting Region selection Cost Choosing the right Region is important. You must determine the right Region'i6r your services, applications, and data, based on the following factor + Governance and legal requirements ~ Consider any legal requiréiénts based on data governance, sovereignty, or privacy laws. ) + Latency — Close proximity to customers means better performance. + Service availability ~ Not all AWS services are available ivéll Regions. *+ Cost - Different Regions have different costs. Research the pricing for the services you plan'to/use and compare costs to make the best decision for your workloads. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS Local Zones Usecases: + Media and snterainment content creation g + Real-time gaming + Machine learning + Live video AWS infrastructure Local come. Connecting to. Delivering new streaming attheedge storage, dat services mn AWS low-latency. + Augmented reality sedotjenservies Regions applications (AR) and virtual reality (VR) sis lamas ‘You ean use AWS Local Zones for highly defend applications that require single it ilsecond latency to end users, for example: + Media and entertainment content éreation Includes live production, video editing, and graphics-intensive virtual workstations for artists Ih,geographic proximity + Real-time multiplayer gadifigy= includes real-time multiplayer game sessions, to maintain a reliable gameplay experience + Machine learning hosting and training - For high-performance, low latency inferencing, + Augmented (AR) and virtual reality (VR) ~ Includes immersive entertainment, data driven insights, and engaging virtual training experiences Customers€aN innovate faster because chip designers and Verification engineers solve complex, compute- intensivé;and latency-sensitive problems using applieation and desktop streaming services in AWS Local Zones. For more information, see “AWS Local anes! (hktps://aws.amozon.com/about-ows/alobl- infrastructure/localzones/). (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 4 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals CvaFront |e csgetoctom eM atge treo ginal ee coe d J ‘te amp ti whine Y “ ‘An edge location is the nearest point toa requester of an AWS service. seilggton: are located in major cities ‘around the world, They receive requests and cache copies of your: ster delivery, ‘To deliver content to end users with lower latency, you use a gl of edge locations that: suport services. CloudFront delivers customer content through 2 worldw of point of renee eeQyY locations, which consists of edge locations and Regional edge cache servers. Regional edge caches, used by default with CloudFront, are used when you have content that is or. accessed frequently enough to remain in an edge location, Regional edge caches absorb this content and provide an alternative to needing to retrieve that content tong origin server. For more information, see eq” Features” (hits: fcont/fe (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, “4 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals ‘One common use for edge locations is to serve content Goser to your customers. This diagram shows art" example of a video file stored in Amazon Simple Storage Service (Amazon $3) in South America. The file is ‘ached to an edge location near the customer serve the video file faster toa customer in Asia an x c (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS Local Zone and edge location features AWS Local Zones Edge Locations + Low latency + Cachingot data A + Local data processing + Fast delivery oftontint + Consistent AWS experience + etter user sie amin monn on in ll ‘ ‘When should you use AWS Local Zones? ‘You should use AWS Local Zones to deploy AWS computé, storage, database, and other services closer to your end users for low-latency requirements. With AWS Local Zones, you can use the same AWS infrastructure, services, APIs, and toolsets that you are familiag With in the cloud. When should you use edge locations? You should use edge locations for cacKing the data (content) to provide fast delivery of content for users. Using edge locations allows for a better usenexperience, providing faster delivery to users at any location. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be « reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arctecting Fundamentals AWS Well-Architected beta tetas ‘The CTO asks during the project meeting, “How can we build ouréloud infrastructure according to best practices?” ‘The AWS Well-Architected Framework provides cofisistent guidance for AWS architecting bestpractices. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, “ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS architect responsibilities + Settechnical doud strategy + Investigate cloud services ~ Design the transformation with businessteads. specs and workload roadmap with milestones, (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, “s Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS Well-Architected Framework pillars ‘Security EE Performance Efficiency = Redc ateney Operational Exalence | a | i Winlep, 29 {Rakes torent Reliability | —| Sustainability anne [Paka eS Creating technology solutions isa lot like constructing a physical building. If the foundation is not Solid, it can ‘cause structural problems that undermine the integrity and function of the building, The AWSWell-Architected Framework helps cloud architects build secure, high-performing, resilient, and efficient application infrastructures. It isa consistent approach for customers and partners to evaluate architectures and implement ‘designs that can scale over time. J > ‘The AWS Well-Architected Framework started as a whitepaper. It has: enoand ago include domain-specific lenses, hands-on labs, and the AWS Well-Architected Tool (AWS WA Tool). ‘The architectural reviews focus ofthe following: y + Security — Use AWS secbrrity best practices to build policies andiprocesses to protect data and assets. Allow auditing and traceability, Monitor, alert, and audit actions and thanges to your environment in real time. * Cost optimization’ Achieve cost efficiency while considering fluctuating resource needs. + Reliability - Méet well-defined operational thresholds for applications. This includes support to recover from failures, handlingincreased demand, and mitigating gisruption, + Performange’effciency ~ Deliver efficient performance for a set of resource lke instances, storage, databases; space, and time. + Operational excellence — Run and monitoF'ystems that deliver business value. Continually improve supporting processes and procedures...» + Sustainability - Minimize and understond your environmental impact when running cloud workicads. With the tool, you can gather data hid get recommendations to: + Minimize system failures and operational costs. * Dive deep into business and infrastructure processes. *+ Provide best practice guidance, * Deliver on the cloud computing value proposition. For more informs ntts:/ /www.wellarchi bout related labs, see “AWS Well-Architected Labs” (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, “ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modu 1: Archtecting Fundamentals For more information about the AWS WA Tool, see “AWS Well-Architected Too!” (bitosi//aws.amazon.com/wel- architected tool). For more information about the console, see AWS Well-Architected Tool in thé AWS Management Console For more information about the console, see AWS Well-Architected Tool in the AWS ‘Management Console (https://console.aws.amazon.com/wellarchitectedly (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals AWS Well-Architected Tool + Based on the AWS well-Architected Framework + Can review your applcatonsand warkicads + Cetra place for | ws wat Achiected best practices and Toot bee 7 Define ardoeerat” | Apply best + Usedin tens ot “2 _ thousandsof workicadreviews them to the latest AWS architectural best practices. Itis designed to help architects and their managers ‘The AWS WA Too! isa self-service tool you can use to review the tego workloads and compare ‘AWS workloads without the need for an AWS SA. This service is ba! the AWS Well-Architected Freméwork. y ‘To complete a Well-Architected review, use the tool in theconsle. All details are stored securely in your account. You can share results with your SA or partner resource for collaboration on the review or temediation steps. / For more information about AWS WA Tool best practites, see “New — AWS Well-Architecte Tool - Review Workloads Against Best Practices” in the AWS News Blog (https://aws.amazon.conv/bldgs/aws/new-aws-well- i review . ‘ For more information about the AWS\Well-Architected Framework (https://aws.amazon.com/architecturé/well-architected/). Y Y ) 15, se "AWS Well-Architected” (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, “ Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arctecting Fundamentals (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 0 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Traning and Cention Module 1: Arcitecting Fundamentals Pa Consider how you would answer the solutions following questions: + What are the bene services? + How is the AWS global infrastructure organized? + How can we build our cloud irifrastructure according to best practices? of using AWS Imagine you are now ready to talk to the Chief Technology Officer, discuss what you have learned, and-present solutions. ‘Think about how you would answer the questions froit’the beginning of the lesson. Your answers should include the following solutions: + Use AWS services to increase agility while decreasing complexity and risk + AWS global infrastructure is organized into AWS Regions. These Regions contain Availability Zones. You can also use AWS Local Zones and edge locations. . * Use the Well-Architected Framework, which helps cloud architects bulld Secure, high-performing, resilient, and efficient application infrastructures. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, so Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 1: Arcitecting Fundamentals Module review v AWS services Y AWS infrastructure Next, you will review: Knowledge check ‘&) Lab introduction In this module you learned about: v AWS Well-Architected Framework (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, st Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Knowledge check (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, es Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias OC et Monitoralarms for disaster response. Maintain applicaton-leve code in the AWS Cloud. Manage access toa group of AWS accounts ‘Analyze solutions for business needs and requirement (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, s Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias Knowledge check question 1 and answer Monitoralarms for disaster response. Maintain applicaton-leve code in the AWS Cloud. Manage access toa group of AWS accounts eens ‘The correct answer is D. AWS architects analyzegolutions for business needs and requirements. To learn more about being a successful Solutions Architect on AWS, see “Successful solution’ architects do these five things” on the AWS Training @ad Certification Blog (https: site amazon. senbes uta and. certification/successful-solutions-ardhitects-do-these-five-things) yw a < (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, sa Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias oe ee ted ‘Avaliabilty Zone Region Edge location Outposts (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ss Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias Knowledge check question 2 and answer ‘The correct answer is A, Availability Zone, ‘An Availability Zone is one or more discrete data centefS with redundant power, networking, and connectivity in an AWS Region. For more information, see “Regions and Availability Zones” (httpsi//aws.amazon,com/about aws/elobal-infrastructure/regions_az/). A (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, se Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arcitecting Fundamentals Poe oe ed Loca data regulations Operating system requirements Latency to end users Support for hybrid networking Programming languageof your application (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 7 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias Knowledge check question 3 and answer Support for hybrid networking Programming languageot your application ’ y ‘The correct answers are A, local data regulations, and 8, ~ 2 Choosing the right AWS Region is important. You must determine the right Region for your service’, applications, and data, based on the following factor” - 4. Governance and legal requirements ~ Consider any legal requirements based on data governance, sovereignty, or privacy laws. » ‘ 2. Latency ~ Close proximity tocustomers means better performance. = 3. Service availability — Not all AWS sétvices are available in all Regions, 3 4. Cost Different Regions have, different costs. Research the pricing forthe services you plan to use and compare costs to make the best decision for your workloads. ©2002 Amazon Web Sans, eo te alae. Aight reared o Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias oe eee te) Stronger security policies for resources Decreased latency to resources High availability for resources ‘There s no bene!it to this design (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, *0 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Modus 1: Arctecting Fundamenias Knowledge check question 4 and answer Stronger security polktes for resources Decreased latency to resources fi to this desig ‘The correct answer is C, high availability for resources. . Availability Zones are multiple isolated areas within 2 particulargeographic location. When you launch an instance, you can select an Availability Zone or let AWS choose one for you. if you distribute your instances across multiple Availability Zones and one instance fails, you can design your application so that an instance in another Availability Zone can handle requests. y »), (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 6 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arcitecting Fundamentals Poe oe eed Operational excalence Security Resilience Performance efficiency (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ot Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. AWS Traning and Cention Modus 1: Arctecting Fundamenias Knowledge check question 5 and answer Performance efficiency ‘The correct answer is B, security. 2 » y ‘The principle of least privilege (POLP) is @ concept in computer sedi that limits users' access rights tony what is strictly required to do their jobs. =e ~ y . (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, «2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Modus 1: Arctecting Fundamenias Lab 1: Explore and interact with the AWS Management Console and AWS Command Line interface & (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, r Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Connecting to an AWS service ‘AW Management Corie "hia "RN Caren Ue ce ws ch ‘Do ‘Setar aevepen GORD ‘You can use the following tools to interact with(AWS: + AWS Management Console — This is the €asiest piace to start interacting with AWS serviées. It is a graphical user interface (GU!) to manage your AWS account and take actions. + AWS Command Line interface (AWS CLI) — This is a tool to manage AWS servicesusing the command line. ‘AWS CI version 1 is preinstalled @n,Amazon Linux and Amazon Linux 2 distribut¥ons. + Software development kits (SDKs) ~ AWS provides AWS SDKs and the Cloud Development kit (AWS CDK) in ‘many common programming languages. You use these software development frameworks for defining and provisioning your cloud infrastructure using code. All of these tools 6fINEEt to the same underlying AWS API to create resources and manage your AWS services. Tolearn about installing, updating, and uninstalling the AWS CLI, see “Installing or updating the latest version of the AWSCU" ifthe AWS Command Line Interface User Guide for Version 2 (oi 1ws.amazon.com/cli/latest/userguide/clihap- install htm)). ‘To learn how to get started using the AWS CDK))sée “Getting started with the AWS CDK" in the AWS Cloud Development Kit (CDK) v2 Developer Guide (nttos://docs.aws.amazon.com/cdk/latest/fuide/retting started.html). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, oe Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 1: Arcitecting Fundamentals Lab tasks (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 6s Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 1: Arcitecting Fundamentals WE End of Module 1 (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ee Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Traning and Cention Module 2: Account Secuty Na tatty DLP et caro (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ° Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, Module 2: Account Secuty {ANS Tang and Catcason PUREST TEE How many AWS accounts does your organization use? Al 8B. 2-10 C More than 10 D. I don’t know (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 6 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Module overview + Business requests + Principals and identities + Security policies + Managing multiple accounts + Module review + Knowledge check (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, Co Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 2: Account Secuty Business The security specialist needs to know: recta} + What are the best practices to manage access to AWS accounts and resources? + How can we give users access t6 only the resources they need? * What is the best way to ffanage multiple accounts? Imagine your security specialist meets with’you to discuss how to start building accounts.mith least privilege in AWS. Here are some questions they are askingabout account security. At the end of this module, you meet withithe’security specialist and present Somie solutions, (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 70 Printed by: [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. Printed by: [email protected]. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty AWS account root user Aroot user: + Has full access to all AWS services + Camot be rectricted ina single account modet + Shouldnot beused | saepeamiecom aws count for day-to-day Poems Interactions with AWS so ee ee el ‘ ‘When you fist create an AWS account, you begif with a root user. This user has complete access‘to all AWS. services and resources in the account. Access'the root user identity by signing in with the email address and password provided when you created the actount. AWS strongly recommends that you not use root account Credential for day-to-day interactions Vth AWS. Create users for everyday tasks. You éan manage and aust users with relative ease. A Create your additional users and assign permissions to these users following the principle of least privilege. Grant users only the level Of access they require and nothing more. You can'start by creating an administrator user. Manage the account with the administrator user instead of the root user. A ‘Asa best-practicé, require multi-factor authentication (MFA) for youl root user. It provides you with an extra layer of security for your AWS accounts. Use your root user only for tasks that require it. For ier Maton ‘about the root user, see “AWS accduint roct user” in the AWS Identity ond Access ‘Management User Guide (httes://docs.aws.amazoficém/IAM/latest/UserGuide/id_root-user.html). For information about least privilege and IAM Best practices, see “Grant least privilege” inthe AWS identity ond ‘Access Management User Guide (https://4acs.aws.amazon.com/IAM/latest/UserGuide/best. f ractices.htmiigrant least privilege] (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty AWS Identity and Access Management (IAM) saci ae Te cass BE | swscsonne users Groups, and B&B Credentials + Manage access to. = AWS services and Aaithonaation a on ~ ease or o (63192 anaoon Leen oe enn ron IAM is a web service that helps you securely control access to AWS resources. Use IAM to control who is, ‘authenticated (signed in) and authorized (has permissions) tousé resources. ‘Think of IAM as the tool to centrally manage access to lauinching, Configuring, managing, and terminating your resources. You have granular control over access permissions. This control is based on resources and helps you define who has permissions to which API calls, You manage access in AWS by creating and using security policies. You learn about IAM (iérs, IAM user groups, and roles in this section. / For more information about |AM) see “What is IAM?" in the AWS identity ond Actess Management User Guide (nttis://docs.aws.amazon.cam/AM/latest/UserGuide/introduction htm!). For more information about policy types and their uses, see “Policies and permissions in 1AM" (https://docssatiia.amazon.com/IAM/latest/UserGuide/access Bolicies.htm!). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Principals A principal: lo + Can make a request tor an ston oF operation onan AW resource + canbea person Splation. federated ust of ssumedrale aws E > E ome Ideney power am on. f aie federated user ) =o 62122 seam ili «mtb rpm com ‘A principal is an entity that can request an actign or operation on an AWS resource. (AM uses and IAM roles are Se ries comenon princtone voaiecaat gry fea about ther hte lege) The principal can also be an AWSSer¥ice, as Amazon Elastic Compute Cloud (Amazon EC2), a Security ‘Assertion Markup Language 2:0 (SAML 2.0) provider, or an identity provider {ldP). With an 1dP, you manage identities outside of AWS IAM, foprexample, Login with Amazon, Facebook, or Google. You can give these external identities permissions to use AWS resources in your account» ) - Federated users artextefnal identities that are not managed directly by AWS IAM. For more information about federated users, see “identity federation in AWS” ( (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty AWS account tat user: WAM users are users within an AWS. + Each user has their own credentats. + They are authorized 10 perform specific AWS actions based ‘on permissions 2 By default, a new IAM user has no permission$ t9.do anything. The user is not authorized to perform any AWS, ‘operations or access any AWS resources, Art advantage of having individual IAM users is that you can assign permissions individually to each user. For example, in this diagram yowhotetthree IAM users—an administrator, develope and auditor—and their permissions within an AWS accouit, The administrator has permissions to access an $3 bucket, an EC2 instance, anda list of (AM users in yUPaétount, The auditor has read-only permissions to $3 and AWS IAM, but not EC2. ‘The developer only has permissions to the EC2 instance. ‘Asa best practice/requife multi-factor authentication (MFA) for yoUr IAM users and set up an IAM user password policy. “ For moré information about IAM users, see “IAM users” ih the AWS Identity and Access Management User Guidé (Https://docs.aws.amazon.com/IAM/latest/WserGuide/id_users.html). (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, % Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty 1AM users and AWS API calls a AWS Command Une AWS SDKs: Interface (AWS CLI) ‘AWS Management Console Provide the type of credentials required for the type of access that a user will need. / Ways to access AWS services: f » 1. AWS Management Console access Create/a password for a user. 2. Programmatic access ~ The IAM useremight need to make API calls, use the AWS CLI, or use the AWS Tools for Windows PowerShell or AWSIAPI tools for Linux. In that case, you will ¢réate an access key (access key ID and a secret access key) for that user. ae ‘As 2 best practice, appl the printiple of leat privilege. This means that you create only the credentials that the user needs. For example, do not create access keys for a user who tequires access only through the console, AWS requires differettfypes ‘of security credentials, depending on how you access AWS, For more iniforpration, see “Understanding and getting Your AWS credentials” in the AWS General Reference (nttosy amazon.com /general r i). For information about password creation, sée "Managing passwords for 1AM users” in the AWS Identity Access ‘and Management User Guide (nitos://docs.aws.amazon.com/lAM/fitest/UserGuide/id credentials passwords admin-change-usechtml)- (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 1 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Secuty Programmatic access Access Key 10: AKIAIDSFOONNTEXAWPLE Secret Access Key: wlal rAURNFENT/X7MDENG/DPxRFICYEXAMPLEKEY wis cu Aws sok G8 sree Python Wer Programmatic access gives your IAM user the credentials to makeAPI calls in the AWS CLI or AWS SDKs. AWS provides an SDK for programming languages such as Java, Python and .NET. When programmatic access is granted to your |AM user, if will create a unique key pair made up of an access key ID and secret access key. Use your key pair to configure the AWS CL! or make API calls through an AWS SDK. ‘Tosset up AWS CLI in your client, enter the aws€onfigure command. The example code shows thé-four elements required to configure your IAM user in AWSCU: ‘AWS Access Key ID + AWS Secret Access Key + Default region name * Default output format {jsBiiiyam|, yami-stream, text, table) For more information about configuring your key pair in AWS CLl, see “Configuration basics” in the AWS Command Line interface User Guide (https://docs.aws.amazon.com/dli/iatest/userguide/cli-configure- quickstart html} (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ” Printed by: sathwickdutt [email protected]. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty Setting permissions with IAM policies erences ["Trnazonecaneadonivaccess | ———» 7 AmazorSSFulacces games [AmazonSSRescOniyAcess “ernstator ol sr x vast ‘auditor 7 [AmazoniSSReedOniyacce ‘Toallow IAM users to create or modify resources and perform tasks, do the following: 1. Create or choose IAM policies that grant AM,users permission to access the specific resources and API actions they will need 2. Attach the policies to the 1AM users or groups that require those permissions. Users only have the permissions you spéCifyiin the policy. Most users have multiple'policies. Together, they represent the permissions for that uger. Inthe diagram, you choose to givé'the Amazon $3 administrator full access t0 $3, but you do not grant full access to all services in youeAWSlaccount. You attach the AmazonEC2ReadOnlyAccess and ‘AmazonS3ReadOnlyAccess policies to an auditor who needs to know what resources exist in your account. The auditor should not be able to modify or delete anything, ‘As a best practicd attach only the policies needed to complete the work required by that user. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, * Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty 1AM user groups B mu oe = ince Ea Em El] ies teers win the group, 6 ‘An IAM user group is a collection of [AM users. Witfl user groups, you can specify permissions for multiple Users, which makes it easier to manage the permissions. ‘A.usercan be a member of more thane User group. In the diagram, Richard is a member of the Analysts ‘group and the Billing group. Richard gets permissions from both IAM user groups. ." For more information aboutuser groups, $€e "IAM user groups” (httos://docs.aws.amazorf‘cam/lAM/istest/UserGuide/id groups.html). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, *” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty 1AM roles + Delegateset permisionsto specific users oF ca foe a oe A = cee| ~~ Comms a assumedrole JAM roles deliver temporary AWS credentials. They're easy to manage because multiple employees and applications can use the same role, There are no charges for using roles. For example, in this diagram the IAM users Richard, Ana, afidShirley are members of the Analysts user group. ‘As members of the Analysts group, these users inherit permissions assigned to the group. There islso an |AM role called DevApp1 that is being used for testing purposes. DevApp1 hasiits own set of permiséions. Ana and Shirley can assume the role and temporarily use the petmissions specific to the DevApp1 role. ‘While they assume this role, Ana and Shirley oftly have the permissions granted by the Fole and do not follow their group's inherited permissions. J ‘The following are examples of how Yolumight use 1AM roles: . + Cross-account access — Developer Diego requires access to an $3 butket in the Prod account. + Temporary account access ~ Contractor Carlos requires temporary access to an $3 bucket in the Prod account. + Least privilege — Require Diego to use IAM roles to delete a DytamoDB table. + Audit — AdministratorAna wants to track who used an|AMfole. + Access for AWS services — Amazon Lex needs to use Amst#on Polly to synthesize speech responses for your bot. y + 1AM rolesiforEc2 —An application running on Amfiazon EC2 requires access to an $3 bucket and a DynamoDB table. + SAMI federation - Administrator Ana want3t6 use IAM with identities stored in an external IdP. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, wo Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Assuming a role Trusted entities SQ Use on APHealito oe Return temporory security coders, tn eo —P e snl ATC rpm i ‘You assume a role using a trusted entity, such as aly JAM user, an AWS service, or a federated user. IAM users assume roles in the AWS Mnagetient Console or AWS Command Line Irterface (AWS CUI). This action uses the AssumeRole API. AWS services can use the same API cal to assumé roles in your AWS accounts. Your federated users use eitherthe AssuumefoleWithSAML or AssumeRoleWithWebidentity API cals. ‘The API call is made to AWS Security Token Service (AWS STS). AWS STS is 2 web service that provides ‘temporary, limited: privilege credentials for IAM or federated users. It returns a set of temporary security credentials consistingjof.an access key ID, a secret access key, and a'security token. These credentials are then used to access AWS resources. The AssumeRole API is typically.used for cross-account access or federation. For more jnfétmation about AWS STS, see the AWS Security Token Service API Reference (1 s.aw8.amazon.co jatest/APIRefer Icome.htm), For more information about using IAM roles, sée “Using IAM roles” in the AWS Identity and Access ‘Management User Guide (httns://docs.a\ ‘on.com/IAM/latest/UserGuide/id roles use.htmi). (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, a Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty IAM policy assignments , E we ose El = fa ; a, wast oser AWS resources 1AM provides you with the tools to cffate and manage all types of IAM policies (managed policies and inline policies). To add permissions to an IAM identity (IAM user, group, or role), you create a policy, validate the policy, and then attach the policy to the identity. You can attach multiple policies to an identity, and each policy «an contain multiple perroisSions ‘You learn more about JAM policies in the next section. Use roles to delegate access to users, appli resources ions, or services that don't normally have access to your AWS (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, e Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 2: Account Secuty Security policies to only the resafrees they ne | = ‘The security specialist asks, “How can we give users aéCess to only the resources they need?” ‘The security team has users and roles set up. The company wants your advice aboutsetting up permissions in security policies. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty Security policy categories A policy is attached to an identity or resource to define its permissions, AWS/evaluates these policies when @ principal, such as a user, makes a request. J Inthe diagram, the policy types are responsible for either setting maximum permissions or granting ¥ permissions. IAM permissions boundaries and AWS Organizations service control policies (SCPs) help set, \»” maximum permissions on actions in your account. |AM identity-bgsed and resource-based policies grant permissions to allow or deny actions in your account. / The following policy types, listed in order of frequency, are available for use in AWS. You leaen abbut each of these policy types in more detail later in this module, » Policy types ~ + Identity-based policies — Attach managed and inline policies to 1AM identitiés This includes users, groups to which users belong, and roles: hy . + Resource-based policies — Attach inline policies to resources. The most cémmon examples of resource-based policies are Amiazon $3 bucket policies and VAM role trust policies, + AWS Organizations service control policies (SCPs) — Use Organizations SCPs to define the maximum ‘permissions for account members of an organization or organizational unit (OU). + IAM permissions boundaries - AWS supports permissions boundaries for |AM entities (users or roles). Use IAM permissions bollndaries to set the maximum permissions that an IAM entity can receive. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, a Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Granting permissions + Wdentity-based policies are assigned to users, ‘groups. and roles. + Resource-based policies are assigned to + Resource-based policies ae checked When someone tries toaccess the 6 stint mite — x Identity-based policies are JSON permissions policy documents thatigortrol: + What actions an IAM identity (users, groups of users, and roles) can perform + On which resources + Under what conditions Resource-based policies are ISON policy documerits that you attach to a resource such as an/Amazon $3 bucket. ‘These policies grant the principal permission to perf@imh specific actions on that resource and define under ‘what conditions this applies. Resource-based policies are inline policies. There are no managed resource-based policies. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, as Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Types of identity-based policies LW AWS managed (emmorver managed ee » You can choose to use existing AWS policies. Some are managed by AWS, You also have the option to create ‘your own policies. Identity-based policies can be categorized by the'Tollowing types: + Managed policies ~ Standalone identity-based policies that you can attach to multiple.users, groups, and ‘oles in your AWS account. There are tw6 types of managed policies: © AWS managed policies - Managed policies that are created and managed by AWS. They are built to provide specific service accéss or permissions for job functions. © Customer managed policies - Managed policies that you create and mahnage in your AWS account. ‘Customer managed pflicies provide more precise control over your policies than AWS managed olicies. 4 + Inline polices Policies MORYBU ade directly toa single user, group, rele. nine policies maintaina strict ‘one-to-one relationship between a policy and an identity. They are deleted when you delete the identity. Regarding inline of customer managed policies: ‘An inline policy is One that you create and embed directly to'én 1AM group, user, or role. Inline policies can't be reused on other identities or managed outside of the identity where they exist. As a best practice, use customer managed folicies instead of inline polices. 2 For more information, see “Use customer managed policies instead of inline policies" (oi .2Ws.amazon.com/AM/I actices.htmiltb rn inline). (©2023 Amazon Web Sonics, rec alas. A rights reserved 6 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Secuty Identity-based policy example Oresee e017, “Sat Oo erec: sw, ae fe smn, estonia 1 osenras mrmmectrtien Tbe Qe rchrommer tomar 7 AISON identity-based policy document includes these elementsy + Version ~The Version policy element specifies the language syntax rules that are to be used to process a policy. To use all of the available policy features, include the vale “2012-10-17” for the version in your policies. * Effect — Use Allow or Deny to indicate whether the policy allows or denies access. *+ Action (or NotAction) ~ Include a list of actionsthat the policy allows or denies. *+ Resource (or NotResource) ~ You must specify a list of resources to which the actions apply, + Condition (or NotCondition) ~ Specify thetirelmstances under which the policy grants permission. ‘The NotAction, NotResource, and NotC6ndition policy elements are not mentionedia this course, When you attach the example policy statement to your JAM user, for example, that user is allowed to stop and start EC2 instances in your account as long as the condition is met. Here, the EC2 instances your IAM user can control must have a tag with Key “Owner” and value equal to the IAM user fame. In the Resource element, the policy lists an AWS Resource Name (ARN) with a wildcard (star) character. Wildcards are use to apply a policy element to more than one resource or action. This policy applies for resources in any account number and Region with any resource ID. It can be reused in multiple accounts without having to rewrite the policy with your AWS account!iD. For méré information, see “Policies and permission@iin \AM” in the AWS Identity and Access Management User Guide (httpsi//docs.aws.amazon,com/1AM/i iserGuide/access_policies.html). (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, ” Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Explicit allow and explicit deny ‘Thissectlon from a policy allows access ‘This section from a poliey denies access Ths is called an explicit alow. Thisis called an expliat deny. I aiterAtow vesont ‘An IAM policy is made up of explicit allow stategfens, explicit deny statements, or both. ‘An explicit allow, shown in the first policy, hihoties ‘your IAM user, group, or role to take the listed actions against a set of your resources. The poligyallows list and get actions on all objects in an $3 bucket called DOC- EXAMPLE-BUCKET, When you use 2 wildcard character after the bucket name and Slash, it covers all objects in that bucket. 4 A ‘An explicit deny, shown in the secofid policy, stops your IAM user, group, of Fole when trying to take an action listed for a set of your resolrces. In the second policy example, all actions in Amazon EC2 or Amazon $3 on any resource are denied. Use allow and deg in yourstatement to guide what actions yaUr principals can take in your account. f 4 A (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ry Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty How IAM policies are evaluated soa EE Eze se It isimportant to know the AWS evaluation logic when builditig!AM policies for your account. This wayyou can sive your users and applications only the access they need. , ‘AWS evaluates al policies that are applicable tothe fquest context. The following is a surimafy ofthe AWS evaluation logic for policies within a single account. + By default, al requests are implicitly denied with the exception of the AWS account yeOt user, which has ull access. This is called an implicit deny” + An explicit allow in an identity-based of resource-based policy overrides this eéfaul. + An explicit deny in any policy overrides any allows. . Explicit deny is useful aS'a safety’measure because it overrides explicitallow. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, « Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Using a resource-based policy arnt Ls coc Sanne ‘aie | y ee ee » “Venson?)“2012-10-17% Resource-based policies are attached to a single resource, like an Sucre ‘or AWS Lambda function. You let ‘more about $3 buckets and Lambda functions later in this course, . \With resource-based policies, you choose who has access Withe'fesource and what actions they ca perform on it. Ifyou create a resource-based policy, you must ist the-principal account, user, role, or federated user to which You want to alow or deny acess. you ef tingn ta permssons poly to ateh 4 user or role, you cannot include this element. The principalis implied as that user or role. In your resource-based policies, the resource element is optional. If you do not include this element, the resource to which the action applies iithe resource to which the policy is attached. In the example, the principal is anVAWS account ID. The set of resourcesis: all objects in the bucket DOC- EXAMPLE BUCKET that are within the folder called folder123. The butket policy allows. specific AWS account to upload objects to your buckets folder — ‘AWS identity based policies and resource-based polices afevaluated together. Recall how IAM policies are evaluated. If any explicit deny statement is found in anyAM policy, the action is denied. fat least one allow statement exigts with no explicit deny, the action(s allowed. For more information about identity-based polities, see “Identity-based policies and resource-based policies” in the AWS Identity and Access Management User Guide (httos://docs.aws.amazon.com/IAM/test/UserGuide/access policies identity vs-resource.html). (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, %0 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Defense in depth #-2 8-8-2 fate Ammon SSVPC edpont SSbucet wiipalcy —YPCendpcee Schley — Identity-based Resourcaibaced A "heed poles ad Note Catute erety ] ‘oaether Defense in depths a strategy focused on creating multiple layers of security. ‘Apply a defense-in-depth approach with mujtiplé security controls to all layers. For example, apply t to the edge of the network, virtual private cloud (VPC), load balancing, and every instance, compute service, operating system, application, and code. Applicat Security is as critical as instance security, Inthe diagram, different users try to aecess a document in your $3 bucket. Each User needs an identity-based policy assigned to either their uSeror a role they assume to access AWS, They then navigate through layers of resource-based policies—first VPC endpoint policy, then a bucket policy for the $3 bucket. Your users are able to access the documents they need for their task. You will learn more about VPC endpoints and $3 buckets later inthis course. 7 4 For more information, see *Policy evaluation logic” in the AWS identity and Access Management User Guide ( jw3.aimazon.com/IAMY/latest efesBnce policies evaluation-logic htm) (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, ot Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty 1AM permissions boundaries 1AM permissions boundaries: + Limit the user's permissions + Donot provide permissions.on their ‘AWS supports permissions boundaries for \AM entities—ySers or roles. A permissions boundary is an advanced feature for using a managed policy to set the maximum permissions that an identity-besed policy can grant to an 1AM entity Permissions boundaries act as ite. ‘An entity's permissions boundary allows it tofetform only the actions that are allowed by both its identity- based policies and its permissions boundaries. For more information about permissfjes bounares, see “Permissions boundarleseIAM entities” nthe AWS Identity and Access Management User-Guide (ttps://docs.aws.amazon.com/IAM/latest/UserGuide/access policies boundariés.htm)), S **For Accessibilty: Diagram showing the two policy categories, set maxifnum permissions and grant permissions. Connected to set maximum peri IAM permission boundaries. Partially overlapping JAM permission boundaries and connected to grant permissions is |AM identity based policies. The areas of overlap is labeled “limit$ actions allowed.” End Description. “ (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, °2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 2: Account Secuty Managing multiple accounts eA EE eer be. ‘The security specialist asks, “What is the best way to manage multiple accounts?” ‘The company wants your ad about ways to mangé more than one account. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, 2 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Securty Reasons to use multiple accounts + Develop a malti- account strategy Many teams | Security f\ siting Isolation Business and process controls cree 6 ‘As you expand your use of AWS, you ha¥é Several reasons that you might want to create a multi-account structure in your organization: + To group resources for categorization and discovery + To improve your security posture with 2 logical boundary + Tolimit potential impactlin €88€ of unauthorized access + To simplify management of user access to different environments (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Without AWS Organizations + IAM polices onty apply to individual principals na single + Policies to enforce restrictions must be ‘managed within each account. + The generation of multiple bills ic required, 6 00 amin te wnt armed ‘Managing multiple accounts is more challenging without AWS Organizations. FOr example, because IAM policies ‘only apply toa specific AWS account, you must duplicate and manage IAM polices in each account to deploy standardized permissions across all accounts. S/S (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, os Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty With AWS Organizations + ceamearearcy: | oom & um emerge aceon ‘organizational units 2 (0us). 13} Apply service control policies (SCP) to controt a} ‘maximum cal permissionsinevery | acme ecountundee an ou. j + Take advantage of aus AW consolidated billing, 6 10 amine te wit troll “ ‘AWS Orgenizations provides these key features: *+ Centralized management of all your AWS accounts f + Consolidated billing for all member accounts + Hierarchical grouping of your accounts to meet your budgetary, security, or compliance needs + Policies to centralize control over the AWS services afid AP! actions thet each account can access * Policies to standardize tags across the resources in your organization's accounts * Policies to control how AWS artifical intelligence (Al) and machine learning (ML) services carcollect and store data * Policies that configure automatic ondupsre resources in your organization's accouits * Integration and support for AM + Integration with other AWS services." *+ Global access 4 + Data replication that i eventually consistent + No cost foruse For more information abot ahetance for SCPs, see “inheritance fr séhvce control policies” inthe AWS Organizations User Guide idocs.aw: .com/organizations/latest/user manage policies inheritance auth.htm ‘For accessibility;\An AWS organization containing 2 management account which has two OUs. Each of these (Us has oneeehild AWS account and child OU. Each of these child OUs has multiple child AWS accounts. A policy is appliedifo a top OU and is active on all child AWS a€cbunts and child OUs. End description, (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, oe Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty How IAM policies interact with SCPs + $€Ps allow only whatis at the Intersection of JAM permissionsand SOPs. + SCPs do not grant permissions; they 3et ae a filter. 6 110 amen te wn anol “ ‘An SCP is a type of organization policy that you can use to manage pertfissiansin your organization. CPs: * Offer central control over the maximum available permissions forall Agcounts in your organization + Help your accounts stay within your organization's access control guidelines + Are available only in an organization that has all features turned on ) ) / 'SCPs aren't available if your organization turns on only thegestlidated billing features. 5 ‘Attaching an SCP to an Organizations entity (root, OU, or account) defines a guardrail. SPs Set limits upon the actions that the IAM users and roles in the affectedlaccounts can perform. To grant permissions, you need to attach identity-based or resource-based policies to IAM users, or to the resources in youeorganization's accounts. When an IAM user or role belongs to,an account that is a member of an organization, the SCPs limit the user's or role's effective permissions, oY In the example, an SCP allows alllEC2land $3 actions. A collection of IAM jdesitty-based permissions allow all EC2 and IAM actions. The effective allowed permissions for the IAM identity are all EC2 actions. It excludes both ‘S3 and IAM actions because theyre not explicitly allowed in both poligy types. For more information about SCPs, see “How to Use Service Conte Policies in AWS Organizations” in the AWS Security Blog (httpsil,aws,gmszon.com/blogs/security/how toxilbe-service-control-policies-in-aws- ‘Srganizations). ~ ’ y (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, 7 Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Trang and Cention Module 2: Account Securty Using policies for a layered defense 4 te fee, + ScPs and permissions Doundariesact asa filter to limit permissions, When a principal tries to use the consdle, the AWS API, or the AWS CLI, that princiial Sends a request to AWS. \With AWS you can configure severalfesourcesto determine whether to grantor deny the request. In this example you observe the following layers of defense: * First, the action must be‘élfoWed by any SCPs configured for the organization. + Next, the action must be included within any applied permissions boundaries. * Finally, the identity-based policy must allow and not explicitly deny the action, In.an 1AM entity (User or role), a permissions boundary allows it to perform only the actions that are allowed by both its identity-based policies and its permissions boundaties. This adds an additional layer to protect against ‘i)|AM identity-based policy that allows overly permissive actions for that entity. For more infotmation, see “Policy evaluation logie” (https://docs.aws.amazon.com/IAM/latest/UserGuide/reference policies evaluation-logic. html) (©2023 Amazon Wb Sones, reo” ts alas. Alright reserved, oe Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted, AWS Traning and Cention Module 2: Account Secuty (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, °° Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Traning and Cention Module 2: Account Secuty Ped Consider how you would answer the Pes teents following questions: + What are the best practices to manage access to AWS accounts and resources? + How can we give users access to only the resources they need? + What is the best way to manage multiple accounts? eae Imagine you are now ready to talk to the security specialist and pfésentsolutions that meet their architectural needs. ‘Think about how you would answer the questions from the beginning of the lesson about account security. Your answers should include the following solutions: + Create IAM users, user groups, and roles to mariage access to AWS accounts and resources, + Build security policies with allow and denyStatements. Use permissions boundariesas alprotective layer. *+ Use SCPs in AWS Organizations to manage multiple accounts. (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, co Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. AWS Trang and Cention Module 2: Account Secuty Module review In this module you learned about: ¥ Principals and identities ¥ Security policies ¥ Managing multiple accounts Next, you review: Knowledge check (© 2028 Amazon Web Sences, rc. or te alates. Alright reserved, Printed by: sathwickdutt [email protected], Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted,

You might also like