Exam-01
Categories:
- Security – weak section.
- Infrastructure – weak section
- General and development – Strength
- Q3- All About Lambda –
- Q-All About Amazon ElastiCache
- All About S3
- ENCRYPTION:
- https://tutorialsdojo.com/amazon-s3/?src=udemy
- S3 Object Lock provides two retention modes:
- -Governance mode
- -Compliance mode
- An AWS Network Firewall is commonly integrated to your Amazon VPC and not to an S3 bucket.
- All About EC2
- Q-Amazon API Gateway
- FX
- Self – it provides Muti-AZ (Single-AZ) option to store files using variety of protocols iSCSI(cloud as internal storage), SMB (Block/File level access) etc.
- Q-glue
- Amazon VPC
- AWS WAF
- Q- CPU UTILISATION ON RDS M/C: Cloud watch sources the CPU utilisation (bandwidth + memory) from hypervisors and (there can be multiple VMs managed by same hypervisor) may result in minute accuracy – For RDS deployed on system – RDS provides enhanced monitoring for CPU monitoring directly using agent instead of hypervisor view giving clearer picture.
- Note on cloud watch vs RDS enhanced monitoring : Although you can use this to monitor the CPU Utilization of your database instance, it does not provide the percentage of the CPU bandwidth and total memory consumed by each database process in your RDS instance
- Security of secrets on EKS
- Enable KMS encryption from EKS config – by default disabled
- Note : AWS Secrets Manager is a powerful tool for managing secrets but it doesn’t directly address encrypting data within the etcd key-value store of an EKS cluster. Secrets Manager is more about managing and retrieving secrets rather than encrypting data within etcd.
- KMS VS Secret Manager
- AWS KMS (Key Management Service): Use this when your goal is data encryption. For example, if you want to encrypt an S3 bucket, an EBS volume, or specific fields in your database, KMS provides the “master key” that performs the mathematical encryption/decryption. It does not “know” your database password; it only knows how to encrypt the data you give it.
- AWS Secrets Manager: Use this when your goal is credential management. Its primary value is solving the “hardcoded password” problem. Unlike KMS, it can actively talk to other services (like Amazon RDS) to change passwords on a schedule (rotation) without you having to manually update your application code. It actually uses KMS behind the scenes to encrypt the secret values it stores
- KMS
- All about EKS:
- Storage gateways:
- https://docs.aws.amazon.com/storagegateway/
- FSx file gateway – provides local cache and cloud storage view as local
- https://docs.aws.amazon.com/storagegateway/
| Gateway | TypeProtocol | AWS Backend | Primary Use Case |
|---|---|---|---|
| S3 File Gateway | NFS, SMB | Amazon S3 | Migrating on-premises data to S3 or using S3 as a file share. |
| FSx File Gateway | SMB | FSx for Windows File Server | Migrating on-premises data to S3 or using S3 as a file share. |
| FSx File Gateway | iSCSI | Amazon S3 | Scaling local block storage by keeping only active data locally and the rest in the cloud |
| Volume Gateway (Stored) | iSCSI | Amazon S3 | Maintaining primary data locally for ultra-low latency while backing up to AWS. |
| Tape Gateway | iSCSI (VTL) | Amazon S3 & Glacier | Replacing physical tape libraries with virtual tapes in the cloud. |
- Note : Cost effective way to access services : S3/DynamoDB Accessing in cost effective way over private n/w use VPC gateway for all other services use priatre endpoint.
- [Thought Process] –
- Events Generation & integration:
- RDS event subscription: RDS event subscriptions typically notify about operational changes (infrastructure-level events and lifecycle status updates of the database resource itself—such as instance creation, maintenance patching, failovers, or storage scaling—rather than the data stored inside its tables.) rather than data modifications. This method does not capture database modifications like
INSERT, DELETE,orUPDATE- TO generate event on RDS CDC – Create a native function or a stored procedure that invokes an AWS Lambda function.
- RDS event subscription: RDS event subscriptions typically notify about operational changes (infrastructure-level events and lifecycle status updates of the database resource itself—such as instance creation, maintenance patching, failovers, or storage scaling—rather than the data stored inside its tables.) rather than data modifications. This method does not capture database modifications like
- Events Generation & integration:
- [Thought Process] –
- Q-All on RDS/AURORA
- Q-Securing MySQL AND Postgres :
- IAM database authentication works with MySQL and PostgreSQL. With this authentication method, you don’t need to use a password when you connect to a DB instance. Instead, you use an authentication token.
- IAM database authentication provides the following benefits:
- Network traffic to and from the database is encrypted using Secure Sockets Layer (SSL).
- You can use IAM to centrally manage access to your database resources, instead of managing access individually on each DB instance.
- For applications running on Amazon EC2, you can use profile credentials specific to your EC2 instance to access your database instead of a password, for greater security
- IAM database authentication provides the following benefits:
- IAM database authentication works with MySQL and PostgreSQL. With this authentication method, you don’t need to use a password when you connect to a DB instance. Instead, you use an authentication token.
- All about RDS
- Q-EFS VS EBS VS S3
- Q-AWS Lake Formation is integrated with AWS Glue which you can use to create a data catalog that describes available datasets and their appropriate business applications. Lake Formation lets you define policies and control data access with simple “grant and revoke permissions to data” sets at granular levels. You can assign permissions to IAM users, roles, groups, and Active Directory users using federation. You specify permissions on catalog objects (like tables and columns) rather than on buckets and objects.
- Q-All ABout AWS Lake :
- Q-All ABout IAM
- AWS Shield Advanced also gives you 24×7 access to the AWS DDoS Response Team (DRT) and protection against DDoS related spikes in your Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing(ELB), Amazon CloudFront, and Amazon Route 53 charges.
- AWS Firewall Manager is mainly used to simplify your AWS WAF administration and maintenance tasks across multiple accounts and resources. It does not protect your VPC against DDoS attacks.
- Q-DDos White paper
- DMS :
- BeanStalk –
- Cloudwatch –
