ITA Session 13 Cloud Computing Diff Aspects 1
ITA Session 13 Cloud Computing Diff Aspects 1
Aspects I
IT Applications– Session 13
Contents adapted from Jill West, CompTIA Cloud+ Guide to Cloud Computing, 2nd Edition. 2023 Cengage.
Contents
• Cloud Migration
• When the capacity of RAM cards is exceeded, data is stored as fixed-sized files called
pages in a section of the hard disk called virtual memory
− Virtual memory is significantly slower than physical memory
• Overcommitment Ratio
− Most type 1 hypervisor allow you to configure RAM settings for each VM, including:
▪ Minimum memory (memory reservation) required to boot up
▪ Maximum memory (memory limit) of physical memory available to a VM
▪ Startup memory is made available to a VM for a short time only when it first
boots
− Dynamic memory allows for an overcommitment of the host’s physical memory
− Memory bursting is a technique where a VM has the ability to temporarily
increase physical memory consumption to a maximum limit
Memory Management (3 of 4)
• Memory Reclamation
− Ballooning is a way to trick the guest OS into releasing some of its RAM so the
hypervisor can allocate it elsewhere
− Ballooning allows the hypervisor to reclaim overallocated memory on one VM to
other running VMs
− The hypervisor installs a small balloon driver inside each guest OS where
ballooning is enabled
▪ When a high-priority VM needs more memory, the hypervisor identifies a
lower-priority VM that is currently allocated more than its minimum RAM, and
it begins a memory reclamation process
Memory Management (4 of 4)
Knowledge Check Activity 2-2
Which memory management technique borrows memory from one VM for another?
a. Ballooning
b. Oversubscription
c. Bursting
d. Allocation
Knowledge Check Activity 2-2: Answer
• In the cloud, you can create VM instances using one or more cloud services
• As you create each instance, you’ll have the opportunity to choose its features, such
as number of vCPUs, amount of memory, disk storage type and size, connectivity
options, network placement, and more
• When deploying VM instances in the cloud, CSPs such as AWS, Azure, and GCP offer
preconfigured instance types in which CPU and memory capacity are automatically
allocated in a fixed ratio
Instance Templates (1 of 2)
• When launching instances of the same configuration, you can use a template to
ensure every instance is configured the same way
• When creating these clustered hosts you can choose whether certain VMs reside on
the same host or different hosts
− Guest VMs residing on the same host are part of an affinity group
− You accomplish this by setting an affinity rule on the VM instances
− If you prefer VMs not share the same physical host you can set an anti-affinity
rule
• Public cloud platforms offer multiple methods to control the affinity of cloud
instances
− One of the easiest methods is to set a desired geographical location of an
instance
Affinity (2 of 3)
• Security
− Cloud environments can complicate security concerns
• Energy savings
− On-prem virtualization and cloud provide significant energy savings
• Cost considerations
− Rates charged for VM instances are often determine by number and type of vCPUs
Knowledge Check Activity 2-3
a. Instance type
b. Image
c. Storage volume
d. Network bandwidth
Knowledge Check Activity 2-3: Answer
• This section covers alternatives to VMs for hosting applications and other services
Serverless Computing
• When running a serverless application, the CSP offers short-term use of a server only
when application needs to run
− This reduces overall costs to consumer and transfers server management
responsibility to the CSP
− This is sometimes called FaaS (Function as a Service)
• Serverless computing is ideal for many databases, backup or data transfer tasks, and
apps that do not need to run continuously
Knowledge Check Activity 2-4
b. The CSP
d. The ISP
Knowledge Check Activity 2-4: Answer
• This section explores the actual process of migrating into the cloud as well as the
following skills:
− How to validate the outcomes
− How to prepare for problems
− How to adapt to changing needs
Cloud Migration Phases
Transition Assessment
• A company should first assess whether the cloud is a good fit for the company
− Thorough research and testing are required before migration to avoid costly
mistakes
• Revise or replatform – this approach makes some relatively minor changes to the
application or data before moving it to the cloud
• Repurchase or replace – this strategy refers to replacing the product with an existing
cloud-native product
• Refactor, rearchitect, or rebuild – in this approach, the changes are more significant,
such as recoding portions of an application
• Retain – the organization keeps using an application or data as it is, without any
changes
• Once your overall mitigation plan is ready, you will need to consider the timing of the
actual workload migration
a. Retain
b. Revise
c. Refactor
d. Rehost
Knowledge Check Activity 3-1: Answer
• You can set up cloud user accounts using the IAM (identity and access management)
services built into most major cloud platforms
• Once these user accounts are established, the root account should not be used again
except when absolutely necessary
Identity (1 of 2)
• Logical access control contrasts with physical access control, such as door locks, and
often refers to remote access
• Users and resources can have an identity, which is a digital entity to which you can
attach roles and permissions
• Accounts assigned to resources (server) are sometimes called service accounts, while
a human user is given a user account
• You can create accounts through the IAM dashboard in your cloud platform
• These identities and their credentials are stored in a repository called an identity
vault
Identity (2 of 2)
Account Management
• Effective account management policies can help ensure that the following tasks
occur:
− Accounts are set up, or provisioned, in a timely manner for new users
− Compromised accounts are locked out for protection
− Privilege creep, the gradual increase of disorganized and unmonitored privileges, is
limited
− Unused accounts are closed to further activity, or deprovisioned
• PAM (privileged access management) is a subset of IAM that applies stricter rules
and safety precautions specifically to users who are given elevated permissions to do
their jobs
• Security precautions that might be taken for these accounts include the following:
− Limited use
− Limited location
− Limited duration
− Limited access
− Limited privacy
Knowledge Check Activity 7-1
• Password policies can require that passwords meet certain requirements, such as the
following:
− Complexity
− Length
− Expiration
− Lockout
Password Policies (2 of 2)
Multifactor Authentication (MFA)
• The use of certificate authorities to associate public keys with certain users is known
as PKI (public key infrastructure)
• Digital certificates are primarily used to certify and secure websites where financial
and other sensitive information is exchanged
Single Sign-On (SSO)
• SSO (single sign-on) is a form of authentication in which a client signs in one time to
access multiple systems or resources
− Users do not have to remember several passwords and might not need to
complete the authentication process multiple times for every new resource they
need to access
• Many applications are designed to support SSO functionality through the use of
standards such as SAML (Security Assertion Markup Language) or OpenID Connect
• SSO offers the simplicity of using a single source of truth so user data isn’t
duplicated through multiple systems
a. LDAP
b. OCSP
c. HTTPS
d. MFA
Knowledge Check Activity 7-2: Answer