CLOUD COMPUTING(NEW-BATCH)
CLOUD COMPUTING(NEW-BATCH)
WHAT IS A SERVER
Types of Servers:
Challenges:
1. On-Premises:
AWS REGION
An AWS Region is a specific geographic area where Amazon
Web Services (AWS) has data centers and provides cloud
services. Each AWS Region consists of multiple Availability Zones
(AZs), isolated locations within a region. These regions are
strategically distributed globally to support high availability,
reliability, and low latency for AWS customers.
1. Regions:
- AWS has multiple regions worldwide, each named after its
geographic location (e.g., `us-east-1` for Northern Virginia in
the U.S., `eu-west-1` for Ireland in Europe).
- Each region operates independently, allowing customers to
deploy applications close to their end-users for better
performance and compliance with local regulations.
2. Availability Zones (AZs):
Groups:
Group: Operations:
Permissions:
Roles:
CREATING USERS
To create a new user in AWS, you can follow these steps in the
AWS Management Console. This guide outlines how to create an
IAM user and assign permissions to allow them access to
resources.
4. Add User:
- Access Type:
- Choose Programmatic access if the user needs API access
with Access Key ID and Secret Access Key.
- You can choose both if the user needs access to both the
console and programmatic access.
6. Set Permissions:
- You can add tags (key-value pairs) to the user. Tags can
help organize and track IAM users for billing or management
purposes.
Important Tips
Key Differences
Account-level Day-to-day
Purpose management and rare operations and
critical operations. resource access.
Default No permissions by
Full access by default.
Permissions default.
Created automatically
Created manually
Creation when the AWS account
within IAM.
is registered.
Permissions can be
Permissions cannot be
Restrictable? customized and
restricted.
restricted.
o Examples:
▪ Recovering an account.
o Examples:
• Enable MFA for both the root account and IAM users.
• IAM Users
• IAM Groups
• IAM Roles
o Fred:
Policy Combination
Permissions are additive:
o Overlapping Memberships
Key Takeaways
• Group Policy Inheritance:
• Inline Policies:
1.1 Version
Example:
"Version": "2012-10-17"
1.2 Statement
"Statement": [
2. Statement Elements
Example:
"Sid": "AllowS3ReadAccess"
2.2 Effect
Example:
"Effect": "Allow"
2.3 Action
Example:
"Action": [
"s3:GetObject",
"s3:PutObject"
2.4 Resource
Example:
"Resource": "arn:aws:s3:::example-bucket/*"
Example:
"Condition": {
"IpAddress": {
"aws:SourceIp": "192.168.0.1/32"
"Version": "2012-10-17",
"Statement": [
"Sid": "AllowS3AccessFromSpecificIP",
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:PutObject"
],
"Resource": "arn:aws:s3:::example-bucket/*",
"Condition": {
"IpAddress": {
"aws:SourceIp": "192.168.1.0/24"
• ROOTS ACCOUNT
• IAM USER ACCOUNT
Example:
Get*, says that anything that starts with Get and then has
something after is authorized.
CREATING A POLICY
Create and Attach the Policy
You can create and apply the policy using the AWS
Management Console, AWS CLI, or AWS SDK.
3. Choose between: