When it allbegun?
In 1961, John McCarthy gave a speech at the Massachusetts
Institute of Technology stating that "Computing power can
be sold as a service, like water or electricity."
7
12
1. Infrastructure asa Service (IaaS)
Provides virtualized computing resources over the
internet. It is the most basic category of cloud
computing services.
Use cases:
Website and application hosting, storage, backup,
and recovery.
13.
2. Platform asa Service (PaaS)
Supplies an on-demand environment for developing,
testing, delivering, and managing software
applications. PaaS is designed to make it easier for
developers to create web or mobile apps.
Use cases:
Development frameworks, analytics, business
intelligence.
14.
3. Software asa Service (SaaS)
Delivers software applications over the internet, on a
subscription basis. SaaS applications are also known
as web-based software, on-demand software, or
hosted software.
Use cases:
Email, customer relationship management (CRM),
collaboration tools.
16
1. Public Cloud
Servicesare delivered over the public internet and
shared across organizations
Advantages:
Cost-effective, scalable, reliable, easily accessible, tons of
ready services
Disadvantages:
Might become too costly for high workloads, “vendor lock”
17.
17
2. Private Cloud(on-premises)
Cloud computing resources are used exclusively by one
business or organization. It can be physically located at
your organization’s on-site datacenter or hosted by a
third-party service provider
Advantages:
Offers more control and security
Disadvantages:
Costly to launch, difficult to build and configure
18.
18
3. Multi Cloud
Theuse of multiple cloud
computing services in a single
heterogeneous architecture
Advantages:
Avoids vendor lock-in, enhances
redundancy and reliability, some
services are cheaper
Disadvantages:
Difficult to configure, need to
manage both cloud environments,
double payment in some cases
19.
19
4. Hybrid Cloud
Combinespublic and private clouds, allowing
data and applications to be shared between
them
Advantages:
Provides greater flexibility and more deployment
options. You can use on-premises hardware for a
steady workload and cloud as a flexible layer for
peak loads
Disadvantages:
Difficult to configure and maintain, complex
architecture and networking
22
Compute
AWS EC2
Provides scalablevirtual servers in
the cloud.
Use case: The main tool for
hosting applications and
websites.
Runs code in response to events
without provisioning servers.
Use case: Short repetitive
computing tasks, like real-time file
processing.
Big data computing distributed
on a cluster of managed
machines
Use case: Big data processing,
analytics, cloud implementation
of Hadoop, Spark
AWS Lambda EMR
23.
23
Storage
Elastic Block Store(EBS)
Block storage service for use with
Amazon EC2.
Use case: Persistent storage for
EC2 instances.
Object storage service with high
scalability, data availability, and
security.
Use case: Storing and retrieving
any amount of data.
S3 EFS/NFS
Persistent network storage to
share files across many virtual
machines
Use case: Common file storage
system for many servers
24.
24
Databases
RDS / Aurora
Managedrelational database
service supporting multiple
database engines.
Use case: Running SQL
databases, OLTP applications.
Fully managed highly scalable
and high-performing NoSQL
database service.
Use case: Applications requiring
low-latency data access.
DynamoDB Elasticache
In-memory caching data storage
to deliver frequent queried in real
time
Use case: Cloud implementation
of Redis and Memcached
25.
25
Integrations
Simple Queue Service(SQS)
A queuing service to decouple
microservices, distributed systems,
serverless applications.
Use case: Reliable communication
between application components by
sending, storing, and receiving
messages between software
components at any volume
A managed service that provides
message delivery from publishers to
subscribers using a publish-subscribe
(pub/sub) model
Use case: Sending notifications to
multiple endpoints such as email, SMS,
and HTTP/S, enabling real-time updates
and alerts
Simple Notification Service (SNS) Simple Workflow (SWF)
A service for building, running, and
scaling background jobs, coordinating
work across distributed components
Use case: Managing complex workflows
such as media processing, business
process workflows, and analytics
pipelines
26.
26
Performance and scaling
ApplicationLoad Balancer (ALB)
Distributes incoming application traffic
across multiple targets and ensures the
underlying servers health.
Use case: Improving fault tolerance and
availability
Automatically adjusts server capacity to
maintain steady performance.
Use case: Ensuring applications run
smoothly during demand spikes
Auto Scaling Group (ASG) Cloudfront
A content delivery network (CDN) that
securely delivers data, videos,
applications globally with low latency
and high transfer speeds.
Use case: Accelerating the delivery of
static and dynamic web content,
primarily files, to users worldwide
27.
27
Account and accessmanagement
Identity and Access Manager (IAM)
A web service that helps you securely
control access to AWS services and
resources for your users.
Use case: Managing permissions and
access policies for users and groups to
ensure secure access to AWS resources.
A service that enables you to
consolidate multiple AWS accounts into
an organization that you create and
centrally manage.
Use case: Simplifying billing, access
control, and compliance across multiple
AWS accounts within an organization.
AWS Organizations
28.
28
Security
Web Application Firewall(WAF)
A firewall that helps protect your web
applications from common web
exploits and vulnerabilities.
Use case: Enhancing security by
filtering and monitoring HTTP and
HTTPS requests to your web
applications.
A managed service that makes it easy
to create and control the encryption
keys used to encrypt your data.
Use case: Securing sensitive data by
managing encryption keys for
applications and services.
Key Management Service (KMS) Inspector
An automated security assessment
service that helps improve the security
and compliance of applications
deployed on AWS.
Use case: Identifying vulnerabilities and
deviations from best practices in your
AWS environment to enhance security
posture.
29.
29
DevOps
Cloudformation
A service thathelps you model and set
up your AWS resources in an
automated way, using Infrastructure as
Code approach.
Use case: Automating the provisioning
and updating of infrastructure through
infrastructure as code (IaC).
A fully managed source control service
that makes it easy for teams to host
secure and scalable Git repositories.
Use case: Storing and managing source
code, binaries, and other assets in a
secure and scalable manner.
Code Commit Code Deploy
A service that automates code
deployments to any instance, including
Amazon EC2 and on-premises servers.
Use case: Automating the deployment
of applications to ensure consistent
and reliable updates across various
environments.
30.
30
Networking
Virtual Private Cloud(VPC)
A service that lets you provision an
isolated section of the AWS cloud where
you can launch AWS resources in a
virtual network that you define.
Use case: Enhancing security of your
network environment by creating a
private, isolated section of AWS cloud.
A scalable and highly available Domain
Name System (DNS) web service.
Use case: Managing domain names
and routing end-user requests to
internet applications, ensuring high
availability and reliability.
Route53 Direct Connect
A cloud service solution that makes it
easy to establish a dedicated network
connection from your premises to AWS.
Use case: Improving network
performance and reducing bandwidth
costs by establishing a dedicated
connection to AWS.
31.
31
Monitoring
CloudWatch
A monitoring andobservability service
built for DevOps engineers, developers,
SREs and IT managers.
Use case: Collecting and tracking
metrics, monitoring log files, and
setting alarms to keep your
applications and infrastructure running
smoothly.
A service that enables governance,
compliance, and operational and risk
auditing of your AWS account.
Use case: Logging and monitoring
account activity across your AWS
infrastructure to ensure compliance
and enhance security.
CloudTrail Config
A service that enables you to assess,
audit, and evaluate the configurations
of your AWS resources.
Use case: Monitoring and recording
configurations of your AWS resources
and evaluating them against desired
configurations to ensure compliance.
32.
32
Big Data
Kinesis
A platformon AWS to collect, process,
and analyze real-time, streaming data.
Use case: Building real-time
applications such as log and event data
collection, real-time analytics, and
machine learning.
A fully managed data warehouse that
makes it simple and cost-effective to
analyze data using standard SQL and
existing business intelligence (BI) tools.
Use case: Performing complex queries
and analytics on large datasets to gain
business insights.
Redshift Glue
A fully managed extract, transform, and
load (ETL) service that makes it easy to
prepare and load data for analytics.
Use case: Simplifying the process of
moving data between data stores and
preparing it for analysis.
35
Start simple Right-sizetools for
your project specifics
Apply monitoring Analyse costs
35
Advise for cloud architecture
Use ready solutions
vs. self-built
Don’t shy away from
well-architected review
GRC
39
Cyber security governance,risk,
and compliance (GRC) involves
establishing policies, procedures,
and controls to manage and
mitigate security risks, ensure
regulatory compliance, and align
security initiatives with business
objectives.
40.
Compliance and regulatoryrequirements
40
Regulatory requirements such
as GDPR, HIPAA, and PCI-DSS
mandate data protection,
privacy, and security measures.
Implementing robust data
encryption, regular audits, and
comprehensive access controls
are essential best practices for
maintaining compliance with
these regulations and
protecting organizational data.
41.
OWASP
41
OWASP (Open WebApplication Security Project) is a nonprofit organization focused on improving the security of software
through community-led open-source projects, tools, and resources. One of its most well-known contributions is the
OWASP Top Ten, a regularly updated list highlighting the most critical web application security risks.
42.
Secure development lifecycle(SDLC)
42
The Secure Software
Development Lifecycle
(SDLC) integrates
security practices into
each phase of
software development
to ensure that security
is considered and
implemented from the
initial design through
to deployment and
maintenance.
43.
Threat Modelling
43
Threat modelingis a structured approach to identifying, assessing, and mitigating security threats and vulnerabilities in a
system or application.
Penetration testing
45
Penetration testing,also known as ethical
hacking, involves simulating cyberattacks
on a system, network, or application to
identify and exploit vulnerabilities before
malicious attackers can. The main goal is to
assess the security posture, uncover
weaknesses, and provide actionable
recommendations to enhance overall
security.
46.
Attack simulation
46
A redteam/blue team security
exercise involves a simulated
attack (red team) and defense
(blue team) scenario to evaluate
and improve an organization's
security posture through real-
world adversarial testing and
response.