SlideShare a Scribd company logo
1 of 3
Effective use of Amazon
web services for Web
Deployment
By
Ghazanfar Latif (Gabe)
gabe@prebinary.com
4.
Cloud
Watch
3. IAM
5.
SNS
2.
Security
Settings
1.
MFA
RDS
(Failover
)
RDS
(Live)
Availability Zone B
Availability Zone A
Amazo
n S3
Cloud
Front
VPC
EBS 3
EBS 2
EBS 1
EC2 Server
Application tools
Application Data
Server Setup Tools
X509
www.xyz.co
m
cdn.xyz.co
m
Amazon Management Console
Security Setting, SNS, Elastic IP, MFA
US East Zone
6. S3
Permissio
n
11.
GPO
10.
Server
Firewall
9.
SSL
8.
VPC
7.
GovCloud
Availability Zone A
Amazo
n S3
VPC
EBS 3
EBS 2
EBS 1
EC2 Server
Kerberos MIT tools
Web EHR App
Apache
X509
PHP
Amazon Management Console Security
Setting, SNS, Elastic IP, MFA
www.abc.com
US West Region
MFA: Will use Multi
Factor Authentication
device to Access the
AWS Console in a more
secure way.
SNS: We will use SNS
Service to provide
limited rights of the AWS
Management Console to
the different Developers.
GPO Settings: We
setup the policies for
the different users of
the server according
to their requirements
which will make
server and data
more secure
Instance Security
Settings: We will setup
the limited access of the
EC2 instance to the
users by allowing and
blocking different ports
of the instance.
VPC: We will setup VPC
for the establishment of
local area network within
the different EC2 instance
running in a particular
AWS Region which will
make them one step
secure.
Windows Firewall
Settings: We will
enable windows
firewall to access of
the server resources
externally which will
also make EHR one
step more secure.
S3 Access: We will
setup S3 Permissions
for the limited access of
S3 Buckets.
Security Enabling for Cloud
GovCloud: We will use
GovCloud EC2 Instance for the
Cloud HER Deployment which is
more secure and fully comply
HIPAA Regulations.
CloudWatch: We will
setup alarms for the
resources usage.
SSL Certificate: We
will use SSL Certificate
for Secure and
encrypted
communication
between client and
EC2 Server
IAM: This service can
be used to provide
limited access of the
Amazon Management
Console to different
users.

More Related Content

What's hot

What's hot (20)

Aws training institute in chennai
Aws training institute in chennaiAws training institute in chennai
Aws training institute in chennai
 
Storing, Managing, and Deploying Docker Container Images with Amazon ECR
Storing, Managing, and Deploying Docker Container Images with Amazon ECRStoring, Managing, and Deploying Docker Container Images with Amazon ECR
Storing, Managing, and Deploying Docker Container Images with Amazon ECR
 
網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間
 
Android Cloud to Device Messaging with the Google App Engine
Android Cloud to Device Messaging with the Google App EngineAndroid Cloud to Device Messaging with the Google App Engine
Android Cloud to Device Messaging with the Google App Engine
 
Deep Dive on IoT at AWS
Deep Dive on IoT at AWSDeep Dive on IoT at AWS
Deep Dive on IoT at AWS
 
Rapier
RapierRapier
Rapier
 
Aws(sns)
Aws(sns)Aws(sns)
Aws(sns)
 
開發語音控制的IoT應用服務
開發語音控制的IoT應用服務開發語音控制的IoT應用服務
開發語音控制的IoT應用服務
 
Domain and hostion
Domain and hostionDomain and hostion
Domain and hostion
 
AWS ECOSYSTEM - Introduction
AWS ECOSYSTEM - IntroductionAWS ECOSYSTEM - Introduction
AWS ECOSYSTEM - Introduction
 
Building a Scalable Email Processor With AWS
Building a Scalable Email Processor With AWSBuilding a Scalable Email Processor With AWS
Building a Scalable Email Processor With AWS
 
Serverless everywhere
Serverless everywhereServerless everywhere
Serverless everywhere
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFront(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFront
 
Send and receive email for serverless developers
Send and receive email for serverless developersSend and receive email for serverless developers
Send and receive email for serverless developers
 
Code Deploy
Code Deploy Code Deploy
Code Deploy
 
Architecting applications on amazon web services with node.js
Architecting applications on amazon web services with node.jsArchitecting applications on amazon web services with node.js
Architecting applications on amazon web services with node.js
 
MongoDB World 2019: Lift & Shift MongoDB to Atlas
MongoDB World 2019: Lift & Shift MongoDB to AtlasMongoDB World 2019: Lift & Shift MongoDB to Atlas
MongoDB World 2019: Lift & Shift MongoDB to Atlas
 
Amazon Network Security
Amazon Network SecurityAmazon Network Security
Amazon Network Security
 
Women Who Code
Women Who CodeWomen Who Code
Women Who Code
 

Similar to Effective use of amazon web services for web deployment

Security enabling at amazon cloud (presntation)
Security enabling at amazon cloud  (presntation)Security enabling at amazon cloud  (presntation)
Security enabling at amazon cloud (presntation)
Ghazanfar Latif (Gabe)
 
CoSolvent Community Server : Amazon Web Services Hosting ...
CoSolvent Community Server : Amazon Web Services Hosting ...CoSolvent Community Server : Amazon Web Services Hosting ...
CoSolvent Community Server : Amazon Web Services Hosting ...
webhostingguy
 

Similar to Effective use of amazon web services for web deployment (20)

Security enabling at amazon cloud (presntation)
Security enabling at amazon cloud  (presntation)Security enabling at amazon cloud  (presntation)
Security enabling at amazon cloud (presntation)
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
 
AWS Services - Part 1
AWS Services - Part 1AWS Services - Part 1
AWS Services - Part 1
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million Users
 
AWS Partner ConneXions Taiwan - Q3 2016 Technology Update
AWS Partner ConneXions Taiwan - Q3 2016 Technology UpdateAWS Partner ConneXions Taiwan - Q3 2016 Technology Update
AWS Partner ConneXions Taiwan - Q3 2016 Technology Update
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million Users
 
China Gaming Industry Experience and Architecture Sharing
China Gaming Industry Experience and Architecture SharingChina Gaming Industry Experience and Architecture Sharing
China Gaming Industry Experience and Architecture Sharing
 
中國AWS遊戲業經驗和架構分享
中國AWS遊戲業經驗和架構分享中國AWS遊戲業經驗和架構分享
中國AWS遊戲業經驗和架構分享
 
Build a Website on AWS for Your First 10 Million Users
Build a Website on AWS for Your First 10 Million UsersBuild a Website on AWS for Your First 10 Million Users
Build a Website on AWS for Your First 10 Million Users
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Build an app on aws for your first 10 million users (2)
Build an app on aws for your first 10 million users (2)Build an app on aws for your first 10 million users (2)
Build an app on aws for your first 10 million users (2)
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
AWS Security
AWS SecurityAWS Security
AWS Security
 
CoSolvent Community Server : Amazon Web Services Hosting ...
CoSolvent Community Server : Amazon Web Services Hosting ...CoSolvent Community Server : Amazon Web Services Hosting ...
CoSolvent Community Server : Amazon Web Services Hosting ...
 
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
 
Amazon Web Sevice(aws)
Amazon Web Sevice(aws)Amazon Web Sevice(aws)
Amazon Web Sevice(aws)
 
SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...
SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...
SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 

More from Ghazanfar Latif (Gabe) (10)

What is Interaction Design?
What is Interaction Design?What is Interaction Design?
What is Interaction Design?
 
White rabbit game cloud deployment architecture
White rabbit game cloud deployment architectureWhite rabbit game cloud deployment architecture
White rabbit game cloud deployment architecture
 
Svm on cloud (presntation)
Svm on cloud  (presntation)Svm on cloud  (presntation)
Svm on cloud (presntation)
 
Mtbc cloud ehr
Mtbc cloud ehrMtbc cloud ehr
Mtbc cloud ehr
 
A L A Q S A
A L A Q S AA L A Q S A
A L A Q S A
 
Areyouap
AreyouapAreyouap
Areyouap
 
Attitude Fyh 02 P R E E T R A N J A N
Attitude Fyh 02 P R E E T R A N J A NAttitude Fyh 02 P R E E T R A N J A N
Attitude Fyh 02 P R E E T R A N J A N
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Outreach Scholarship Program for Hiegher Education in Pakistan
Outreach Scholarship Program for Hiegher Education in PakistanOutreach Scholarship Program for Hiegher Education in Pakistan
Outreach Scholarship Program for Hiegher Education in Pakistan
 
Semantic Web Technologies Presenattion (Topic: TripIt)
Semantic Web Technologies Presenattion (Topic: TripIt)Semantic Web Technologies Presenattion (Topic: TripIt)
Semantic Web Technologies Presenattion (Topic: TripIt)
 

Effective use of amazon web services for web deployment

  • 1. Effective use of Amazon web services for Web Deployment By Ghazanfar Latif (Gabe) gabe@prebinary.com
  • 2. 4. Cloud Watch 3. IAM 5. SNS 2. Security Settings 1. MFA RDS (Failover ) RDS (Live) Availability Zone B Availability Zone A Amazo n S3 Cloud Front VPC EBS 3 EBS 2 EBS 1 EC2 Server Application tools Application Data Server Setup Tools X509 www.xyz.co m cdn.xyz.co m Amazon Management Console Security Setting, SNS, Elastic IP, MFA US East Zone 6. S3 Permissio n 11. GPO 10. Server Firewall 9. SSL 8. VPC 7. GovCloud
  • 3. Availability Zone A Amazo n S3 VPC EBS 3 EBS 2 EBS 1 EC2 Server Kerberos MIT tools Web EHR App Apache X509 PHP Amazon Management Console Security Setting, SNS, Elastic IP, MFA www.abc.com US West Region MFA: Will use Multi Factor Authentication device to Access the AWS Console in a more secure way. SNS: We will use SNS Service to provide limited rights of the AWS Management Console to the different Developers. GPO Settings: We setup the policies for the different users of the server according to their requirements which will make server and data more secure Instance Security Settings: We will setup the limited access of the EC2 instance to the users by allowing and blocking different ports of the instance. VPC: We will setup VPC for the establishment of local area network within the different EC2 instance running in a particular AWS Region which will make them one step secure. Windows Firewall Settings: We will enable windows firewall to access of the server resources externally which will also make EHR one step more secure. S3 Access: We will setup S3 Permissions for the limited access of S3 Buckets. Security Enabling for Cloud GovCloud: We will use GovCloud EC2 Instance for the Cloud HER Deployment which is more secure and fully comply HIPAA Regulations. CloudWatch: We will setup alarms for the resources usage. SSL Certificate: We will use SSL Certificate for Secure and encrypted communication between client and EC2 Server IAM: This service can be used to provide limited access of the Amazon Management Console to different users.

Editor's Notes

  1. Design 1, When we go to from Micro instance to Large Instance?
  2. Design 1, When we go to from Micro instance to Large Instance?