#coursera/AWScloudessentials/regions
Regions!
- AWS region considerations:
- Compliance
- Enterprise companies often need to comply with regulations that require customer data to be stored in a specific geo territory.
- latency
- Simply put, choose the region that offers the least amount of latency.
- pricing
- some regions are more expensive than others, so be aware of that
- service availability
- Not all services are available everywhere so be conscious to verify what services you require.
- Compliance
- The first real bit of information this week discusses is the physical layout of their infrastructure. A data center exists inside of a zone, a zone is a group of redundant data centers. A region is a group of redundant zones. Each zone is labeled by the physical area the inhabit... more or less.
- AWS regions are independent of each other. So your data doesn't leave a region without your explicit consent.
- Services within AWS are deployed either within an AZ, a region or globally so look it ip.
#coursera/AWScloudessentials/api
Interacting with AWS
- How to interact with the AWS API:
- AWS Management console
- AWS command line interface
- AWS software development kits (SDK)
AWS Identity and Access Management
IAM
How it works
![[Pasted image 20211105123552.png]]
This is what a section of a policy looks like. This is much like many other places that have this. Its a role based method of allowing people access to perform actions on AWS. Obviously this has no bearing on your application that you build.
-
The Version element defines the version of the policy language. It specifies the language syntax rules that are needed by AWS to process a policy. To use all the available policy features, include "Version": "2012-10-17" before the "Statement" element in all your policies.
-
The Effect element specifies whether the statement will allow or deny access. In this policy, the Effect is "Allow", which means you’re providing access to a particular resource.
-
The Action element describes the type of action that should be allowed or denied. In the above policy, the action is "*". This is called a wildcard, and it is used to symbolize every action inside your AWS account.
-
The Resource element specifies the object or objects that the policy statement covers. In the policy example above, the resource is also the wildcard "*". This represents all resources inside your AWS console.=
and here is yet a more granular policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [ "iam: ChangePassword",
"iam: GetUser"
]
"Resource": "arn:aws:iam::123456789012:user/${aws:username}"
}]
IAM Roles
Roles can be assumed by many different identities and are temporary in nature. This really is focused on setting a sort of RBA for users without explicitly creating each user in IAM. For a hybrid deployment for example you can assign roles to internal groups so as users within your pre-established enterprise require access, they will be automatically assign resources based on their group association. IAM best practices also tries to follow general user account best practices such as:
- Lock down the Root user account
- Least privilege
- appropriate use only
- and use when possible
- consider using an identity provider
- there is also AWS SSO
#coursera/AWScloudessentials/security
Application Diagram
![[Pasted image 20211105133311.png]]