随笔分类 - AWS
摘要:AWS Control Tower allow you to create, configure and manage multiple AWS accounts securly through automating ongooing policy management and guardrails
阅读全文
摘要:ASW Inspector Security, mainly use for EC2 An AWS Service which provides automataed security assessments on your EC2 application. Common Vnlnerabiliti
阅读全文
摘要:Error might happen: Reason:
阅读全文
摘要:We are going to create a A private host zone and test this private host zone with VPC1 and VPC2... for VPC3, you can follow the VPC2 as example. Creat
阅读全文
摘要:Instance Profile contains Temporary credentials Role IP will help to rotate the temporary credentials on your behalf. in short, IP works as "Who am I"
阅读全文
摘要:You can auto assign a public IP address when you launch a new EC2 instance. But if you didn't and you want to assign one after launched, you can use E
阅读全文
摘要:S3 Usage Patterns S3 doesn't suit for following usecases: POSIX-compliant file system: should use EFS. POSIX -- refer to Linux or Unix files Structure
阅读全文
摘要:Minimum RTO for a single region outage For the minimum RTO in a single region we will follow up the same thing. We will have a monitoring team 24/7 av
阅读全文
摘要:Overview In this lesson, we will explore methodologies to incorporate defensive security when designing a cloud architecture. We will identify tools a
阅读全文
摘要:Our goal was to minimize the risk of a malicious actor being able to access our networks and servers, invoke the AWS API, and, ultimately, perform des
阅读全文
摘要:File Gateway File gateway appliance is a virtual machine to bridge between your NFS and S3 Metadata and directory structure are preserved Configured S
阅读全文
摘要:Overview In this lesson, we will go ahead and discuss network and server access design methods to ensure network level access to your cloud resources.
阅读全文
摘要:Overview of Access to Cloud Services In this lesson we will focus on: AWS Control Plane and Access Model The Importance of Identity and Access Managem
阅读全文
摘要:Intro to IaC Key Points The old way of managing hardware in the server room often led to miscommunication due to a lack of centralized logs and the ga
阅读全文
摘要:Cloud Migration Key Points Lift and Shift is the simple process of moving your application from an on-premises environment to the cloud without making
阅读全文