- Domain 1: Monitoring, Logging, Analysis, Remediation, and Performance Optimization (22% of scored content)
- Domain 2: Reliability and Business Continuity (22% of scored content)
- Domain 3: Deployment, Provisioning, and Automation (22% of scored content)
- Domain 4: Security and Compliance (16% of scored content)
- Domain 5: Networking and Content Delivery (18% of scored content)
- General Purpose SSD (gp2, gp3): Balanced price and performance for a wide variety of workloads.
- Provisioned IOPS SSD (io1, io2): High-performance SSD for I/O-intensive applications.
- Throughput Optimized HDD (st1): Low-cost HDD for frequently accessed, throughput-intensive workloads.
- Cold HDD (sc1): Lowest-cost HDD for less frequently accessed workloads.
- Magnetic (standard): Lowest-cost HDD for infrequently accessed workloads.
- General Purpose: T2, T3, T4
- Compute Optimized: C5, C6g
- Memory Optimized: R5, R6g
- Storage Optimized: I3, I3en
- Accelerated Computing: P3, P4, G4
- sessions
- database caching
- leaderboards
- streaming data dashboards
Objects consist of the following components:
- Key: Unique identifier for the object within a bucket.
- Value: The data stored in the object.
- Metadata: Additional information about the object (e.g., content type, size).
- CloudWatch Alarms: Monitor metrics and send notifications or take actions based on thresholds
- CloudWatch Logs: Collect and store log files from AWS resources
- CloudWatch Events: Respond to state changes in AWS resources
- CloudWatch Dashboards: Create customizable dashboards to visualize metrics and logs
- Recovery Point Objective (RPO): Maximum acceptable amount of data loss measured in time, measured in seconds, minutes, or hours
- Recovery Time Objective (RTO): Maximum acceptable amount of time to restore a system measured in seconds, minutes, or hours
- Backup and Restore: Strategies to protect data and ensure availability in case of failure.
- Pilot Light: Minimal version of an environment is always running in the cloud.
- Warm Standby: A scaled-down version of a fully functional environment is always running
- Multi-site active/active: Data is accessible from multiple AWS Regions.
- Durability: 99.999999999% (11 nines) durability
- Availability: Variable based on storage class
- Lifecycle Policies: Automate the transition of objects between storage classes and the expiration of objects.
- Server-Side Encryption (SSE): Data is encrypted at rest by AWS.
- Client-Side Encryption: Data is encrypted by the client before being sent to S3.
- SSE-S3: AWS manages the encryption keys.
- SSE-KMS: AWS Key Management Service (KMS) manages the encryption keys.
- SSE-C: Customer manages the encryption keys.
- All at once
- Rolling
- Rolling with additional batch
- additional cost
- good for prod environments
- Immutable
- longest deployment
- quick rollback in case of failures
- great for prod environments
- Blue/Green
- swap URLs
- no downtime
- automated account creation and management
- automated resource provisioning
- improved security b cfreating and enforcing structure
- reduced management overhead
- simmplified auditing for compliance
- centralized biling
- simplified AWS service configuration across accounts
do not aaply to users or roles inthe management account, only to member accounts in an organization
- landing zone
- guardrails
- account factory
- dashboard
- set of controls and best practices designed to help organizations manage and secure their AWS environments more effectively
- preventive or detective
- Guardrails can be aligned with various compliance standards (e.g., HIPAA, PCI DSS, GDPR) to help organizations meet regulatory requirements
- guidance is either
- mandatory (must be followed)
- strongly recommended (should be followed)
- elective (optional, based on specific needs)
- can be used to provision, manage, and deploy SSL/TLS X.509 certificates
- can be used with many AWS services including
- Elastic Load Balancing
- CloudFormation
- CloudFront
- Elastic Beanstalk
- Nitro Enclaves
- At Rest: Data is encrypted when stored.
- In Transit: Data is encrypted when sent over the network.
- Symmetric Encryption: Same key is used for encryption and decryption.
- Asymmetric Encryption: Public key is used for encryption, private key for decryption.
- Key Management Service (KMS): Managed service for creating and controlling encryption keys.
- Customer Master Keys (CMKs): Primary resources in KMS used to encrypt and decrypt data.
- Encrypt: Encrypts plaintext into ciphertext using a specified CMK.
- Decrypt: Decrypts ciphertext back into plaintext using the same CMK.
- GenerateDataKey: Generates a data encryption key (DEK) that can be used to encrypt data locally.
- ReEncrypt: Re-encrypts ciphertext using a different CMK.
- DescribeKey: Provides metadata about a specified CMK.
- ListKeys: Lists all CMKs in the account.
- Transitioning objects using Amazon S3 Lifecycle
- CloudWatch metrics that are available for your instances
- Amazon CloudWatch metrics for Amazon EBS
- CloudWatch metrics for your Application Load Balancer
- Monitor CloudWatch metrics for your Auto Scaling groups and instances
- Using CloudWatch metrics with Lambda
- Monitoring Storage Gateway
- Amazon CloudWatch metrics for Amazon Aurora
- Types of metrics for CloudFront