SlideShare a Scribd company logo
1 of 70
CONFIDENTIAL AND PROPRIETARY
© Encora 2023. Any use of this material without specific permission is strictly prohibited
AWS Basic Cloud Practitioner
Heena Talreja
Internal Use Only
Engineering Manager
2
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Agenda for Today
Client Server Model
Section 1
Introduction to AWS
Section 2
AWS Global Infrastructure
Section 3
AWS Identity & Access Management (IAM)
Section 4
Q & A
Section 9
AWS Service Management
Section 5
Migration Services
Section 7
Architectural Best Practices
Section 8
Core Technologies
Section 6
3
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Client Server Model
Section 1
4
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Defining the Key Terms
Client-Server Model
What Is It?
 In computing,
a client can be a web
browser or desktop
application that a
person interacts with
to make requests to
computer servers
 A server can be
services such as
Amazon Elastic
Compute Cloud
(Amazon EC2), a type
of virtual server
Internet
Clients
Server
5
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Introduction to AWS
Section 2
6
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Coffee Shop Example
Introduction to AWS
https://www.wallpaperflare.com/people-sitting-inside-coffee-room-
coffee-shop-cafe-business-wallpaper-ulbbt
Image Source: https://www.wallpaperflare.com/people-sitting-inside-coffee-room-coffee-
shop-cafe-business-wallpaper-ulbbt
7
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Exploring the Devices, Platforms & More
Cloud Computing
Cloud computing is the on-
demand delivery of IT
resources over the internet
with pay-as-you-go pricing
Image Source: https://devopedia.org/cloud-computing
8
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Comparing Cloud-Based, On-Premises & Hybrid
Deployment Models for Cloud Computing
Cloud-Based Deployment On-Premises Deployment Hybrid Deployment
 Run all part of application in
the cloud
 Migrate existing applications
to the cloud
 Design & build new
applications in the cloud
 Deploy resources by using
virtualization & resource
management tools
 Increase resource utilization
by using application
management &
virtualization technologies
 Connect cloud-based
resources to on-premises
infrastructure
 Integrate cloud-based
resources with legacy IT
applications
9
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
A Faster & More Global Presence
Advantages of Cloud Computing
What Are the Advantages?
 Trade upfront expense
for variable expense
 Stop spending money to
run & maintain data
centers
 Stop guessing capacity
 Benefit from massive
economies of sales
 Increase speed & agility
 Go global in minutes
10
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
AWS Global Infrastructure
Section 3
11
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Exploring the Regions
AWS Global Infrastructure
Source: https://www.researchgate.net/figure/Map-of-AWS-global-
infrastructure_fig1_350101944
Source: https://cloudacademy.com/blog/aws-global-infrastructure/
 Each AZ is fully isolated from other AZs
within the Region
 High Speed, low latency connection
between AZs within a region
 Completely isolated from each other
 Certain resources tied to regions
L o c a l Z o n e s
W a v e l e n g t h Z o n e s
D i r e c t C o n n e c t Z o n e s
E d g e L o c a t i o n s
R e g i o n a l E d g e C a c h e s
12
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Factors to Consider
AWS Global Infrastructure Region Selection
Source: [please input source here]
13
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
AWS Identity & Access Management
(IAM)
Section 4
14
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Exploring the Platform
AWS IAM
Image Source: https://aws.amazon.com/iam/
(please refer to the AWS site for the original image & content)
15
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
A Global & Secure Service
AWS IAM Features
Source: https://www.10duke.com/blog/federated-identity/
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
16
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Creating a User
AWS Root User
Image Source: https://www.w3schools.com/aws/aws_cloudessentials_sec_userpermissionsandaccess.php
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
17
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
A Multi-Step Authentication System
AWS IAM Multi-Factor Authentication
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
Image Source: https://fentonsit.com.au/2019/09/secure-your-business-with-multi-factor-authentication/
18
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Created Without Permissions by Default
AWS IAM Users
Key Takeaways
 User: Identity that
represents a person
or application that
interacts with AWS
services &
resources
 Best Practice:
Require Multi-
Factor
Authentication
(MFA)
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
19
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Policies Are Documents
AWS IAM Policies
Key Takeaways
 Policy: Document
that grants or
denies permissions
to AWS services &
resources
 Best Practice:
Follow the security
principle of least
privilege
Image Source:
https://www.w3schools.com/aws/aws
_cloudessentials_sec_userpermissions
andaccess.php
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
20
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Collection of IAM Users
AWS IAM Groups
Key Takeaways
 Group: Collection of
IAM users that
inherit the policies
assigned to the
group
 Best Practice:
Attach IAM Policies
to IAM groups,
rather than to
individual IAM users
Image Source:
https://www.w3schools.com/aws/a
ws_cloudessentials_sec_userpermis
sionsandaccess.php
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
21
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Temporary Access to Services or Resources
AWS IAM Roles
Roles
Identity that can be assumed by a person or service to gain temporary access to other AWS resources or
services
Image Source: https://aws.amazon.com/blogs/security/how-to-audit-cross-account-roles-using-aws-cloudtrail-and-amazon-cloudwatch-events/
(please refer to the AWS site for the original image & content)
@2023, Amazon Web Services, Inc. Or its affiliates. All rights reserved.
22
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 1
What are the four main factors to consider when choosing a Region?
1. Latency, price, service availability, & compliance
2. Latency, high availability, taxes & compliance
3. Latency, taxes, speed & compliances
4. Latency, security, high availability & resiliency
Knowledge Check
23
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 2
Which of the following accurately describes the relationship among Regions, Availability
Zones & data centers?
1. Availability Zones consists of one or more Regions - Regions are cluster of data
centers
2. Data centers are clusters of Availability Zones - Regions are clusters of Availability
Zones
3. Regions are clusters of Availability Zones - Availability Zones consist of one or more
data centers
4. Data centers are clusters of Regions. Regions are clusters of Availability Zones
Knowledge Check
24
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 3
Which of the following is a benefit of Cloud
Computing
1. Run & maintain your own data centers
2. Increase time to market
3. Overprovision for scale
4. Go Global in minutes
Knowledge Check
25
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 4
Users in a company are authenticated in their corporate network and want to use AWS without
signing in again
Which is the best option along with user federation or single sign-on to grant permissions?
1. IAM root user
2. IAM user
3. IAM role
4. IAM group
Knowledge Check
26
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 5
IAM user represents an ___________ that interacts with AWS resources & services
1. Person
2. Application
3. Entity
Knowledge Check
27
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Question 6
MFA adds an extra ___________ of security
1. Permission
2. Layer
3. Check
Knowledge Check
28
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
AWS Service Management
Section 5
29
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
How API Calls Are Made
AWS Service Management
30
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Section 6
31
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Develop, Deploy, Run & Scale Workloads in the AWS Cloud
Image Source: Obtained from AWS Practitioner Training (Do Not Distribute)
Core Technologies
Compute
32
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Benefits of Amazon EC2
Elasticity
1
Control
2
Flexibility
3
Integrated
4
Reliable
5
Secure
6
Cost-Effective
7
Image Source: Image 1 - ttps://www.testpreptraining.com/tutorial/aws-certified-solutions-architect-professional-sap-c01/elasticity-and-scalability-in-aws/
Image 2 - https://help.thorntech.com/docs/sftp-gateway-classic/locked-out-of-ec2-instance/
Image 3 - https://www.datacamp.com/tutorial/aws-ec2-beginner-tutorial
33
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Wide selection of hardware and software configurations optimized to fit different use cases
Amazon EC2 choices: Instance Types
Image Source: https://redblink.com/amazon-ec2-instance-types/
34
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Amazon Machine Images (AMI)
Image Source: Image 1 - https://aws.amazon.com/blogs/aws/the-aws-marketplace-find-compare-and-launch-cloud-software/
Image 2 - Screenshots from AWS Website
35
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
 Automatically adjusts
resource capacity
 Define where
Amazon EC2 Auto
scaling deploys
resources
 Specify the
Amazon VPC & subnets
Amazon EC2 Auto Scaling Group
Image Source: https://aws.amazon.com/blogs/machine-
learning/configuring-autoscaling-inference-endpoints-in-
amazon-sagemaker/
(please refer to the AWS site for the original image & content)
36
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
 Automatically distribute traffic across
multiple EC2 instances
 Configure health checks
 Offload encryption & decryption
 Types:
– Application Load Balancer (App
Layer)
– Network Load Balancer (Network
Layer)
– Gateway Load Balancer (Third-Party
Virtual Appliances)
Amazon Elastic Load Balancing (Amazon ELB)
Image Source: https://aws.amazon.com/blogs/aws/elb-connection-draining-
remove-instances-from-service-with-care/
(please refer to the AWS site for the original image & content)
37
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
A Reliable, Scalable & Secure Place for Data
Storage
Image Source: Obtained from AWS Practitioner Training (Do Not Distribute)
38
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Amazon Elastic Block Store (Amazon EBS)
Image Source:
https://www.softnas.com/docs/softnas/v3/html/ebs_volumes_and_device_mapping_
print.html
Network attached block storage for use with Amazon
EC2 instances
 Persists independently from instance
 Used like a physical hard drive
 Automatically replicated
 Attached to any instance in the same AZ
 One EBS volume to one EC2 instance
 One instance to many EBS volumes
 EMS volumes can retain data after EC2 instance
termination
 Allow point-in-time snapshots to S3 GiB
increments
39
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Infinite scalability, greater analysis,
and faster data retrieval
– Highly scalable object storage
with 99.999999999%
durability
– And 99.99% availability
Amazon Simple Storage Service (Amazon S3)
Common S3 use cases:
– Data Lakes
– Backup & Storage
– Application hosting
– Media hosting
– Software delivery
Image Source: Obtained from AWS Practitioner Training (Do Not Distribute)
40
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
 Purpose-built for specific application use cases
 Offload time-consuming management tasks
 aws.amazon.com/databases
Image Source: Obtained from AWS Practitioner Training (Do Not Distribute)
Core Technologies
Databases
41
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Databases
AWS Database Services Database on Amazon EC2
Easy to setup, manage, maintain More Control/Flexibility
Reduce undifferentiated heavy-lifting Operating system access
Push-Button high availability Need features of specific application
Automatic backup/recovery
Scale up/down based upon pattern
42
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Isolate Cloud Infrastructure & Scale Request-Handling Capacity
Networking Services
Image Source: Obtained from AWS Practitioner Training (Do Not Distribute)
43
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Networking Services
Image Source: https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html
(please refer to the AWS site for the original image & content)
44
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Key Takeaways
 Cloud Security at AWS is the highest priority
 Inherit Benefits from data centers & network
architecture
 Similar to on-premises data centers, without
maintaining facilities & hardware
 Can be easily automated
 Inherit all the best practices of AWS
 One of the most important concepts to understand
 AWS is designed to help build secure, high-
performing, resilient & efficient infrastructure for
applications
Security
45
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Security, Identity & Compliance Services
Image Source: https://aws.amazon.com/blogs/media/aligning-aws-security-services-to-movielabs-common-security-architecture-for-production-csap/
(please refer to the AWS site for the original image & content)
46
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
AWS Shared Responsibility Model
Image Source: https://aws.amazon.com/blogs/security/welcoming-the-aws-customer-incident-response-team/
(please refer to the AWS site for the original image & content)
47
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Amazon Identity & Access Management
Securely manage access to
AWS services & resources
 Fine-grained access
control to
AWS resources
 Multi-
factor authentication
 The ability to analyze
access
 Integration with
corporate directories
Core Technologies
48
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
Sharing information
 Industry certifications
 Security & control practices
 Compliance reports directly under NDA
Assurance Programs
 Certifications & attestations
 Laws, regulations & privacy
 Alignment & frameworks
AWS Cloud Compliance
Source: aws.amazon.com/compliance
49
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Core Technologies
 Security Group
 Amazon EC2 Auto Scaling
 Amazon Elastic Block Store (EBS)
 Availability Zone
 Block storage for Amazon EC2 instances
 Virtual firewall providing security at the
instance level
 Service maintaining availability of
resources by increasing or decreasing
capacity
 Separate geographic area within an AWS
Region, designed to facilitate high
availability
Knowledge Check
50
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Services
Section 7
51
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Strategies
The Seven R's
Rehost
1
Replatform
2
Relocate
3
Refactor
4
Retire
5
Retain
6
Repurchase
7
52
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Strategies
 Rehost
 Recreating the on-premises network, only hosted on AWS
 Automating with tools such as AWS Application Migration Service
 Easier to optimize and re-architect applications after migration
Rehost: Lift & Shift
Image Source: Obtained from AWS
Practitioner Training (Do Not Distribute)
53
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Strategies
 Relocate
 Migration specific to VMware cloud on AWS
 Example: Migrate hypervisor host Oracle database to VMware cloud on AWS
Relocate: Hypervisor-Level Lift & Shift
Image Source: Obtained from AWS
Practitioner Training (Do Not Distribute)
54
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Strategies
 Replatform
 Retaining the core architecture
 Making targeted AWS cloud optimizations
 Example: Migrating database to Amazon RDS
 Migrating application to Amazon Elastic Beanstalk
Replatform: Lift, Tinker & Shift
Image Source: Obtained from AWS
Practitioner Training (Do Not Distribute)
55
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Migration Strategies
 Refactor
 Re-imagining how the application is architected & developed
 Using cloud-native features
 Example: Migrating database to Amazon RDS
 Migrating application to Amazon Elastic Beanstalk
Refactor: Modernize
Image Source: Obtained from AWS
Practitioner Training (Do Not Distribute)
56
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Exploring Other Strategies
Migration Strategies
 Shutting off non-useful
applications
 Reducing spend,
management & security
 Keeping certain
applications on-
premises
 Moving workflows to
software as a service
(SAAS)
57
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
Section 8
58
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Design for failure & nothing fails
– Avoid single points of failure
– Multiple instances
– Multiple Availability Zones
– Separate single server into multiple
tiered application
– For Amazon RDS, use Multi-AZ
feature
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
59
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Build security in every layer
– Encrypt Data at rest & in transit
– Enforce principle of least privilege in
IAM
– Implement both Security Groups &
Network Access Control List (NACL)
– Consider advanced security features
& services
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
60
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Leverage different storage options
– Move static web assets to Amazon S3
– Use Amazon CloudFront
– Store session state in DynamoDB
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
61
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Implement elasticity
– Implement Auto Scaling policies
– Architect resiliency to reboot &
relaunch
– Leverage managed scalable like
Amazon S3 & Amazon DynamoDB
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
62
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Think parallel
– Scale horizontally, not vertically
– Decouple compute from
session/state
– Use Elastic Load Balancing
– Right-size your infrastructure
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
63
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Loose coupling sets you free
– Instead of a single, ordered,
workflow, use multiple queues
– Use Amazon Simple Queue Service &
Simple Notification Service (SQS &
SNS)
– Leverage existing services
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
64
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Architectural Best Practices
 Don't fear constraints
– Rethink traditional constraints
– Need more RAM?
– Better IOPS for databases?
– Response to failure?
 Design for failure & nothing fails
 Build security in every layer
 Leverage different storage options
 Implement elasticity
 Think parallel
 Loose coupling sets you free
 Don't fear constraints
Cloud Architectural Best Practices
65
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Well Architected Framework
 A framework for ensuring infrastructures are:
– Secure
– High-performing
– Resilient
– Efficient
– Sustainable
 Practices developed through reviewing customer’s architectures on AWS
 Systematic approach for evaluating & implementing architectures
 Well-Architected Tool in the console
Overview
66
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
A Well Architected Framework
The Six Pillars
67
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Well Architected Framework
 Well Architected Framework
 Horizontal Scaling
 Replatform
 Rightsizing instances
 N on-premised application to the cloud,
while making targeted cloud optimization
 A critical resource to help you design
solutions following best practice
 Add more resources to an application,
instead of more power to compute
resources
 Reviewing deployed resources, seeking
opportunities to downsize instance types
Knowledge Check
68
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Case-Study
 ABC Apparel is a large online clothing seller
 We are in business since 8 yrs now & experienced steady growth since the beginning
 We acquired a small company XYZ 2 months ago
 They make unique custom t-shirts & hoodies
 Their customer can design their own or they offer assists service to help with design
 They have lot of musician & theatre group clients
 I am regional IT director, so I absorbed their infrastructure
 Their site does neat things, and we plan to keep it as it for time being, but we need to make it
lot robust
 Performance is not good, during certain hours really slow to respond to users
69
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2023
Q & A
Section 9
CONFIDENTIAL
AND
PROPRIETARY
©
ENCORA
2022
The quality software development
partner who significantly accelerates
your speed-to-market.
Thank you!

More Related Content

Similar to AWS Basic Practitioner Heena Talreja.pptx

Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiGirish Kalamati
 
Automating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAutomating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAmazon Web Services
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
Level-up Your Cloud Visibility Into AWS With ThousandEyes
Level-up Your Cloud Visibility Into AWS With ThousandEyesLevel-up Your Cloud Visibility Into AWS With ThousandEyes
Level-up Your Cloud Visibility Into AWS With ThousandEyesThousandEyes
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 
Secure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPTSecure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPTAmazon Web Services
 
Spanning cloud services across azure and aws
Spanning cloud services across azure and awsSpanning cloud services across azure and aws
Spanning cloud services across azure and awsMohamed Wali
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016Gaurav "GP" Pal
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Amazon Web Services
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Amazon Web Services
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Amazon Web Services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 

Similar to AWS Basic Practitioner Heena Talreja.pptx (20)

Tcp security white paper
Tcp security white paperTcp security white paper
Tcp security white paper
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
 
Automating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAutomating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar Series
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
awsppt.pptx
awsppt.pptxawsppt.pptx
awsppt.pptx
 
Deep Dive: Hybrid Architectures
Deep Dive: Hybrid ArchitecturesDeep Dive: Hybrid Architectures
Deep Dive: Hybrid Architectures
 
Level-up Your Cloud Visibility Into AWS With ThousandEyes
Level-up Your Cloud Visibility Into AWS With ThousandEyesLevel-up Your Cloud Visibility Into AWS With ThousandEyes
Level-up Your Cloud Visibility Into AWS With ThousandEyes
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Secure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPTSecure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPT
 
Spanning cloud services across azure and aws
Spanning cloud services across azure and awsSpanning cloud services across azure and aws
Spanning cloud services across azure and aws
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
 
Breaking The Cloud Kill Chain
Breaking The Cloud Kill ChainBreaking The Cloud Kill Chain
Breaking The Cloud Kill Chain
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
AWS_Security_Essentials
AWS_Security_EssentialsAWS_Security_Essentials
AWS_Security_Essentials
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

AWS Basic Practitioner Heena Talreja.pptx