SlideShare a Scribd company logo
1 of 55
Download to read offline
Study Group: AWS SAA Guide
Chapter 01 - Introducing AWS
William Tai
2020.Apr
Book: AWS SAA Guide
● AWS Certified Solutions Architect - Associate Guide
https://www.amazon.com/AWS-Certified-Solutions-Architect-certification/dp/1789130662/
● Google Books 上可讀到前3章:
https://books.google.com.tw/books?id=P-l1DwAAQBAJ
● PacktPub 與 Oreilly 各有 10 Days Free Trial 可看書的完整內容:
https://www.packtpub.com/virtualization-and-cloud/aws-certified-solution-architect-associate-guide
https://www.oreilly.com/library/view/aws-certified-solutions/9781789130669/
● 本書 Github Source Code:
https://github.com/PacktPublishing/AWS-Certified-Solutions-Architect-Associate-Guide
https://github.com/gabanox/Certified-Solution-Architect-Associate-Guide
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
這章大致在說...
● 什麼是 Software Architecture?
● is about finding the right balance and the midpoint of every circumstance involving the people,
the processes, the organizational culture, the business capabilities, and any external drivers that
can influence the success of a project.
● Web Architecture 101:
● https://engineering.videoblocks.com/web-architecture-101-a3224e126947
● 什麼是 Solution Architect?
● to evaluate several trade-offs, manage the essential complexity of things, their technical
evolution, and the inherent entropy of complex systems.
● 所以嚮往成為一個 Solution Architect, 這章我們學:
● Understanding cloud computing
● Cloud design patterns and principles
● Shared security model
● Identity and access management
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
Cloud Computing and Before
Cloud Computing:
VS.
Multi-Layer Architecture and Conway’s Law:
What is Cloud Computing?
AgilityElasticity Cost Saving Deploy globally in
minutes
https://youtu.be/dH0yz-Osy54
https://aws.amazon.com/what-is-cloud-computing/
Thress Types of Cloud Computing
● IaaS
● PaaS
● SaaS
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
Cloud Design Priciples
1. Enable scalability
2. Automate your environment
3. Use disposable resources
4. Loosely coupled your components
5. Design services, not servers
6. Choose the right database solutions
7. Avoid single points of failure
8. Optimize for cost
9. Use caching
10. Secure your infrastructure everywhere
General Design Principles from
Well-Architected Framework:
1. Stop guessing your capacity needs
2. Test systems at production scale
3. Automate to make architectural
experimentation easier
4. Allow for evolutionary architectures
5. Drive architectures using data
6. Improve through game days
https://wa.aws.amazon.com/wat.design_principles.wa-dp.en.html
1. Enable scalability
Antipattern: Best Practice:
2. Automate your environment
Antipattern: Best Practice:
3. Use disposable resources
Antipattern: Best Practice:
4. Loosely coupled your components
Antipattern: Best Practice:
5. Design services, not servers
Antipattern: Best Practice:
6. Choose the right database solutions
Antipattern: Best Practice:
7. Avoid single points of failure
Antipattern:
Best Practice:
8. Optimize for cost
Antipattern: Best Practice:
9. Use caching
Antipattern:
Best Practice:
10. Secure your infrastructure everywhere
Antipattern: Best Practice:
The CIA triad is a commonly used model to achieve information security.
The Twelve Factors
https://12factor.net/
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
Cloud Design Patterns
http://en.clouddesignpattern.org/index.php/Main_Page
AWS Architecture Center
https://aws.amazon.com/architecture/
如何善用AWS Reference Architectures:
Web Application篇
http://bit.ly/2I90D74
https://docs.microsoft.com/en-us/azure/architecture/patterns/
MS Azure Cloud Design Patterns
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
AWS Cloud Adoption Framework
● The Cloud Adoption Framework offers six perspectives to help business and organizations to create
an actionable plan for the change management associated with their cloud strategies.
● It is a way to align businesses and technology to produce successful results.
https://aws.amazon.com/professional-services/CAF/
https://d1.awsstatic.com/professional-services/caf/AWS_CAF_Creating_an_Action_Plan_Nov2017.pdf
如何規劃與執行大型資料中心遷移和案例分享
https://www.slideshare.net/AmazonWebServices/tag/2017tpesummit
https://www.slideshare.net/AmazonWebServices/ss-76989091
Microsoft Cloud Adoption Framework
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
AWS Well-Architected: WhitePaper & Training
https://aws.amazon.com/architecture/well-architected/
https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf (Jul, 2019)
https://www.aws.training/Details/Curriculum?id=42037
Agenda
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
AWS Shared Responsibility Model
https://aws.amazon.com/compliance/shared-responsibility-model/
AWS
Security “of” the Cloud
Cusomter
Security “in” the Cloud
AWS
Security “of” the Cloud
AWS
Security “of” the Cloud
EBS
AWS
Security “of” the Cloud
AWS
Security “of” the Cloud
AWS
Security “of” the Cloud
Agenda
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
What is IAM?
● AWS Identity and Access Management (IAM) enables you to manage access to
AWS services and resources securely.
● Using IAM, you can create and manage AWS users, groups, roles, and use
permissions to allow and deny their access to AWS resources.
○ User (End User)
○ Group (A collection of users)
○ Permission/Policy
(A document that defines one/more permissions)
○ Role (For AWS resources to access AWS resources)
○ Resource
Business Case - IAM Lab
Function IAM Group Name/
(Role Name)
IAM Policy for Group/
IAM Policy for Role
IAM User Purpose
IAM User Administration arn:aws:iam::aws:policy/
AdministratorAccess
Administrator AWS Console access.
IAM User DatabaseAdministrator DatabaseAdministrator Alan AWS Console access.
DBA, and performing full database backups
on S3.
IAM User NetworkAdministrator NetworkAdministrator Ada, Alan (as
backup)
AWS Console access.
Provisioning of infrastructure and network
resources.
IAM User Development RoleCreatorPolicy
(Customer managed)
AmazonEC2FullAccess
(AWS Managed)
Dennis AWS Console access.
Be able to create EC2 and IAM Role needed
for EC2.
IAM Role EC2ToS3InstanceRole AmazonS3FullAccess
(AWS Managed)
IAM User X inline policy s3-user Programmatic access.
IAM Cross
Account
Auditors SecurityAudit
AWSCloudTrailReadOnlyAccess.
https://github.com/gabanox`/Certified-Solution-Architect-Associate-Guide/blob/master/chapter00/checkpoint1.sh
Customer Managed Policy
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iam:CreateInstanceProfile",
"iam:PassRole",
"iam:List*",
"iam:CreateRole",
"iam:AttachRolePolicy",
"iam:AddRoleToInstanceProfile"
],
"Resource": "*"
}
]
}
Inline Policy
IAM Cross-account Roles
需求方 提供資源方
External auditors will also have read-only
access to CloudTrail:
External auditors
提供資源方
授權給來自此 AWS Account 的
External auditors
IAM User login to AWS console w/ inline policy.
Allow to assume role to another AWS Account w/ “Action”:“sts:AssumeRole”
需求方
需求方
需求方
IAM Best Practices (1)
❖ Identity & Credential Management
1. Users - Create individual users
2. Password - Configure a strong password policy
3. Rotate - Rotate security credentials regularly
4. MFA - Enable MFA for privileged users
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
IAM Best Practices (2)
❖ Identity & Credential Management
1. Users - Create individual users
2. Password - Configure a strong password policy
3. Rotate - Rotate security credentials regularly
4. MFA - Enable MFA for privileged users
❖ Access Permission Management
5. Groups - Manage permissions with groups
6. Permissions - Grant least privilege
7. Conditions – Restrict privileged access further with conditions.
IAM Best Practices (3)
❖ Identity & Credential Management
1. Users - Create individual users
2. Password - Configure a strong password policy
3. Rotate - Rotate security credentials regularly
4. MFA - Enable MFA for privileged users
❖ Access Permission Management
5. Groups - Manage permissions with groups
6. Permissions - Grant least privilege
7. Conditions – Restrict privileged access further with conditions.
❖ Delegate & Audit
8. Sharing - Use IAM roles to share access
9. Roles - Use IAM roles for Amazon EC2 instances
10. Auditing - Enable AWS CloudTrail to get logs of API calls
11. Root - Reduce or remove use of root
Recap - Agenda
6. Shared Security Model
7. IAM
8. Recap
9. Further Reading
1. Cloud Computing
2. Cloud Design Priciples
3. Cloud Design Patterns
4. Cloud Adoption Framework
5. Well-Architected Framework
Further Reading
● Understanding Cloud Design Patterns:
○ http://en.clouddesignpattern.org/index.php/Main_Page
● The AWS Cloud Adoption Framework:
○ https://aws. amazon. com/es/professional- services/CAF/
● AWS architecture well framework:
○ https://aws. amazon. com/es/architecture/well- architected/
● Architecting for the Cloud (AWS Best Practices):
○ https://d1.awsstatic. com/whitepapers/AWS_ Cloud_ Best_Practices.pdf
● AWS - Overview of Security Processes:
○ https://d1. awsstatic. com/whitepapers/Security/AWS_ Security_ Whitepaper. pdf

More Related Content

What's hot

(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & ComplianceAmazon Web Services
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAFAmazon Web Services
 
Enterprise summit – architecting microservices on aws final v2
Enterprise summit – architecting microservices on aws   final v2Enterprise summit – architecting microservices on aws   final v2
Enterprise summit – architecting microservices on aws final v2Amazon Web Services
 
Awsgsg wah-linux
Awsgsg wah-linuxAwsgsg wah-linux
Awsgsg wah-linuxSebin John
 
Training AWS: Module 8 - RDS, Aurora, ElastiCache
Training AWS: Module 8 - RDS, Aurora, ElastiCacheTraining AWS: Module 8 - RDS, Aurora, ElastiCache
Training AWS: Module 8 - RDS, Aurora, ElastiCacheBùi Quang Lâm
 
Rocking the enterprise with Ruby - RubyKaigi 2010
Rocking the enterprise with Ruby - RubyKaigi 2010Rocking the enterprise with Ruby - RubyKaigi 2010
Rocking the enterprise with Ruby - RubyKaigi 2010releasebeta
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at OktaAmazon Web Services
 
Stream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdaysStream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdaysSmartNews, Inc.
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...Amazon Web Services
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or LessAmazon Web Services
 
(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWSAmazon Web Services
 
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum Efficiency
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum EfficiencyDeploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum Efficiency
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum EfficiencyAmazon Web Services
 
How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...Steffen Mazanek
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 

What's hot (20)

Integrating Terraform and Consul
Integrating Terraform and ConsulIntegrating Terraform and Consul
Integrating Terraform and Consul
 
(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF
 
Enterprise summit – architecting microservices on aws final v2
Enterprise summit – architecting microservices on aws   final v2Enterprise summit – architecting microservices on aws   final v2
Enterprise summit – architecting microservices on aws final v2
 
Awsgsg wah-linux
Awsgsg wah-linuxAwsgsg wah-linux
Awsgsg wah-linux
 
Training AWS: Module 8 - RDS, Aurora, ElastiCache
Training AWS: Module 8 - RDS, Aurora, ElastiCacheTraining AWS: Module 8 - RDS, Aurora, ElastiCache
Training AWS: Module 8 - RDS, Aurora, ElastiCache
 
Alert Logic
Alert LogicAlert Logic
Alert Logic
 
AWS Webcast - Website Hosting
AWS Webcast - Website HostingAWS Webcast - Website Hosting
AWS Webcast - Website Hosting
 
Rocking the enterprise with Ruby - RubyKaigi 2010
Rocking the enterprise with Ruby - RubyKaigi 2010Rocking the enterprise with Ruby - RubyKaigi 2010
Rocking the enterprise with Ruby - RubyKaigi 2010
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
Stream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdaysStream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdays
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
 
Handson Lab Log Analytics
Handson Lab Log AnalyticsHandson Lab Log Analytics
Handson Lab Log Analytics
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
 
(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS
 
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum Efficiency
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum EfficiencyDeploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum Efficiency
Deploying a Disaster Recovery Site on AWS: Minimal Cost with Maximum Efficiency
 
How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 

Similar to AWS Study Group - Chapter 01 - Introducing AWS [Solution Architect Associate Guide]

Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Amazon Web Services
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended PracticesAmazon Web Services
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live byJohn Varghese
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Amazon Web Services
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live ByAmazon Web Services
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best PracticesIan Massingham
 
Security Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackSecurity Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackIan Massingham
 
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivIAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivAmazon Web Services
 
AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)Jamie van Brunschot
 

Similar to AWS Study Group - Chapter 01 - Introducing AWS [Solution Architect Associate Guide] (20)

Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
 
Security Framework Shakedown
Security Framework ShakedownSecurity Framework Shakedown
Security Framework Shakedown
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Aws
AwsAws
Aws
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
Security best practices
Security best practices Security best practices
Security best practices
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Security Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackSecurity Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management Track
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Security & Compliance (Part 1)
Security & Compliance (Part 1)Security & Compliance (Part 1)
Security & Compliance (Part 1)
 
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivIAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
 
AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

AWS Study Group - Chapter 01 - Introducing AWS [Solution Architect Associate Guide]

  • 1. Study Group: AWS SAA Guide Chapter 01 - Introducing AWS William Tai 2020.Apr
  • 2. Book: AWS SAA Guide ● AWS Certified Solutions Architect - Associate Guide https://www.amazon.com/AWS-Certified-Solutions-Architect-certification/dp/1789130662/ ● Google Books 上可讀到前3章: https://books.google.com.tw/books?id=P-l1DwAAQBAJ ● PacktPub 與 Oreilly 各有 10 Days Free Trial 可看書的完整內容: https://www.packtpub.com/virtualization-and-cloud/aws-certified-solution-architect-associate-guide https://www.oreilly.com/library/view/aws-certified-solutions/9781789130669/ ● 本書 Github Source Code: https://github.com/PacktPublishing/AWS-Certified-Solutions-Architect-Associate-Guide https://github.com/gabanox/Certified-Solution-Architect-Associate-Guide
  • 3. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 4. 這章大致在說... ● 什麼是 Software Architecture? ● is about finding the right balance and the midpoint of every circumstance involving the people, the processes, the organizational culture, the business capabilities, and any external drivers that can influence the success of a project. ● Web Architecture 101: ● https://engineering.videoblocks.com/web-architecture-101-a3224e126947 ● 什麼是 Solution Architect? ● to evaluate several trade-offs, manage the essential complexity of things, their technical evolution, and the inherent entropy of complex systems. ● 所以嚮往成為一個 Solution Architect, 這章我們學: ● Understanding cloud computing ● Cloud design patterns and principles ● Shared security model ● Identity and access management
  • 5. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 6. Cloud Computing and Before Cloud Computing: VS. Multi-Layer Architecture and Conway’s Law:
  • 7. What is Cloud Computing? AgilityElasticity Cost Saving Deploy globally in minutes https://youtu.be/dH0yz-Osy54 https://aws.amazon.com/what-is-cloud-computing/
  • 8. Thress Types of Cloud Computing ● IaaS ● PaaS ● SaaS
  • 9. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 10. Cloud Design Priciples 1. Enable scalability 2. Automate your environment 3. Use disposable resources 4. Loosely coupled your components 5. Design services, not servers 6. Choose the right database solutions 7. Avoid single points of failure 8. Optimize for cost 9. Use caching 10. Secure your infrastructure everywhere General Design Principles from Well-Architected Framework: 1. Stop guessing your capacity needs 2. Test systems at production scale 3. Automate to make architectural experimentation easier 4. Allow for evolutionary architectures 5. Drive architectures using data 6. Improve through game days https://wa.aws.amazon.com/wat.design_principles.wa-dp.en.html
  • 12. 2. Automate your environment Antipattern: Best Practice:
  • 13. 3. Use disposable resources Antipattern: Best Practice:
  • 14. 4. Loosely coupled your components Antipattern: Best Practice:
  • 15. 5. Design services, not servers Antipattern: Best Practice:
  • 16. 6. Choose the right database solutions Antipattern: Best Practice:
  • 17. 7. Avoid single points of failure Antipattern: Best Practice:
  • 18. 8. Optimize for cost Antipattern: Best Practice:
  • 20. 10. Secure your infrastructure everywhere Antipattern: Best Practice: The CIA triad is a commonly used model to achieve information security.
  • 22. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 24.
  • 25. AWS Architecture Center https://aws.amazon.com/architecture/ 如何善用AWS Reference Architectures: Web Application篇 http://bit.ly/2I90D74
  • 27. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 28. AWS Cloud Adoption Framework ● The Cloud Adoption Framework offers six perspectives to help business and organizations to create an actionable plan for the change management associated with their cloud strategies. ● It is a way to align businesses and technology to produce successful results. https://aws.amazon.com/professional-services/CAF/ https://d1.awsstatic.com/professional-services/caf/AWS_CAF_Creating_an_Action_Plan_Nov2017.pdf
  • 30. Microsoft Cloud Adoption Framework https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
  • 31. Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 32. AWS Well-Architected: WhitePaper & Training https://aws.amazon.com/architecture/well-architected/ https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf (Jul, 2019) https://www.aws.training/Details/Curriculum?id=42037
  • 33. Agenda 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading
  • 34. AWS Shared Responsibility Model https://aws.amazon.com/compliance/shared-responsibility-model/ AWS Security “of” the Cloud Cusomter Security “in” the Cloud
  • 40. Agenda 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading
  • 41. What is IAM? ● AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. ● Using IAM, you can create and manage AWS users, groups, roles, and use permissions to allow and deny their access to AWS resources. ○ User (End User) ○ Group (A collection of users) ○ Permission/Policy (A document that defines one/more permissions) ○ Role (For AWS resources to access AWS resources) ○ Resource
  • 42. Business Case - IAM Lab
  • 43. Function IAM Group Name/ (Role Name) IAM Policy for Group/ IAM Policy for Role IAM User Purpose IAM User Administration arn:aws:iam::aws:policy/ AdministratorAccess Administrator AWS Console access. IAM User DatabaseAdministrator DatabaseAdministrator Alan AWS Console access. DBA, and performing full database backups on S3. IAM User NetworkAdministrator NetworkAdministrator Ada, Alan (as backup) AWS Console access. Provisioning of infrastructure and network resources. IAM User Development RoleCreatorPolicy (Customer managed) AmazonEC2FullAccess (AWS Managed) Dennis AWS Console access. Be able to create EC2 and IAM Role needed for EC2. IAM Role EC2ToS3InstanceRole AmazonS3FullAccess (AWS Managed) IAM User X inline policy s3-user Programmatic access. IAM Cross Account Auditors SecurityAudit AWSCloudTrailReadOnlyAccess. https://github.com/gabanox`/Certified-Solution-Architect-Associate-Guide/blob/master/chapter00/checkpoint1.sh
  • 44. Customer Managed Policy { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "iam:CreateInstanceProfile", "iam:PassRole", "iam:List*", "iam:CreateRole", "iam:AttachRolePolicy", "iam:AddRoleToInstanceProfile" ], "Resource": "*" } ] }
  • 46. IAM Cross-account Roles 需求方 提供資源方 External auditors will also have read-only access to CloudTrail: External auditors
  • 48. IAM User login to AWS console w/ inline policy. Allow to assume role to another AWS Account w/ “Action”:“sts:AssumeRole” 需求方
  • 51. IAM Best Practices (1) ❖ Identity & Credential Management 1. Users - Create individual users 2. Password - Configure a strong password policy 3. Rotate - Rotate security credentials regularly 4. MFA - Enable MFA for privileged users https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  • 52. IAM Best Practices (2) ❖ Identity & Credential Management 1. Users - Create individual users 2. Password - Configure a strong password policy 3. Rotate - Rotate security credentials regularly 4. MFA - Enable MFA for privileged users ❖ Access Permission Management 5. Groups - Manage permissions with groups 6. Permissions - Grant least privilege 7. Conditions – Restrict privileged access further with conditions.
  • 53. IAM Best Practices (3) ❖ Identity & Credential Management 1. Users - Create individual users 2. Password - Configure a strong password policy 3. Rotate - Rotate security credentials regularly 4. MFA - Enable MFA for privileged users ❖ Access Permission Management 5. Groups - Manage permissions with groups 6. Permissions - Grant least privilege 7. Conditions – Restrict privileged access further with conditions. ❖ Delegate & Audit 8. Sharing - Use IAM roles to share access 9. Roles - Use IAM roles for Amazon EC2 instances 10. Auditing - Enable AWS CloudTrail to get logs of API calls 11. Root - Reduce or remove use of root
  • 54. Recap - Agenda 6. Shared Security Model 7. IAM 8. Recap 9. Further Reading 1. Cloud Computing 2. Cloud Design Priciples 3. Cloud Design Patterns 4. Cloud Adoption Framework 5. Well-Architected Framework
  • 55. Further Reading ● Understanding Cloud Design Patterns: ○ http://en.clouddesignpattern.org/index.php/Main_Page ● The AWS Cloud Adoption Framework: ○ https://aws. amazon. com/es/professional- services/CAF/ ● AWS architecture well framework: ○ https://aws. amazon. com/es/architecture/well- architected/ ● Architecting for the Cloud (AWS Best Practices): ○ https://d1.awsstatic. com/whitepapers/AWS_ Cloud_ Best_Practices.pdf ● AWS - Overview of Security Processes: ○ https://d1. awsstatic. com/whitepapers/Security/AWS_ Security_ Whitepaper. pdf