Establishing a Business Continuity Plan It may sound obvious, but every measure you take to protect your workload against a disaster should be carefully considered and planned accordingly. First, these measures will have a significant impact on your solution design. Second, the cost of your solution will increase with the degree of protection against a […]
1 Introducing the Salesforce Data Architect Journey The Salesforce Certified Data Architect credential is an important part of every Salesforce Architect’s certification journey. It forms a constituent part of the Application Architect domain of the Certified Technical Architect credential, but it can stand alone, given the varying complexities and knowledge required to pass the exam. […]
Data Events for S3 Buckets When you created your new trail, you enabled the data events for S3 objects. These logs closely resemble the S3 access logs but are stored in the CloudTrail logging system rather than a specified S3 bucket (in the case of S3 access logs). One of the most obvious reasons to […]
Automating Recovery for Components Constrained to a Single Location In some cases, it will not be possible to run components of the workload across multiple AZs. For example, all nodes of an Amazon EMR cluster are launched in the same AZ to improve job performance thanks to reduced latency and thus a higher data access […]
Conclusion That was a really good accomplishment: you just mastered the basics of clustering algorithms and you should now be able to drive your own projects and research about this topic! For the exam, remember that clustering belongs to the unsupervised field of machine learning, so there is no need to have labeled data. Also, […]
Using Fault Isolation to Protect Your Data Fault isolation limits the impact a failure can have on a workload to a limited set of components. This is a similar effect to the blast radius limitation that you want to achieve in terms of security. The idea is always the same: the components located outside of […]
Multifactor Authentication (MFA) Multifactor authentication is a method of authenticating a user that requires more than one way of verifying the identity of that user. For example, a regular authentication method would be to have the user provide a username and a password. With MFA, the user would also be required to provide another item […]
Flow Logs Flow Logs capture data on IP traffic flows between interfaces in a VPC. You select the source and destination of the flow you want to analyze, and the service will show you the path between the two inside of AWS. The Flow Log captures are external to the actual data flow in your […]
Default Settings for CloudTrail Before diving deeper into the features and functionality of the CloudTrail service, you first need to understand its default settings. Knowing this can be helpful when deciphering questions and answers regarding the CloudTrail service on the Security Specialty Certification exam. Be sure that you understand the following base concepts for the […]
X-Ray Traces The X-Ray service receives inbound and outbound trace data that is collected from your applications. X-Ray traces create a service map to give you a visual reference of the workflow and identify latency and performance issues, as shown in Figure 5.11. X-Ray aggregates the collected trace information and metadata by installing the AWS daemon […]