Automating the Protection Finally, automate all security maintenance tasks as much as possible. Repetitive manual tasks are error-prone and should be avoided at all costs. It may take you a bit more time to put the automation in place at first, but it will pay off from the very beginning as your AWS footprint grows. […]
Important note In the case of categorical variables, you can replace the missing data with the value that has the highest occurrence in your dataset. The same logic of grouping the dataset according to specific features is still applicable. You can also use more sophisticated methods of imputation, including constructing an ML model to predict […]
This chapter covers the following official AWS Certified SysOps Administrator – Associate (SOA-C02) exam domains: Domain 2: Reliability and Business Continuity Domain 4: Security and Compliance (For more information on the official AWS Certified SysOps Administrator – Associate [SOA-C02] exam topics, see the Introduction.) At this point you should be familiar with how to make […]
TXT Record Text records are containers used by administrators to attach both human- and machine-readable notes to the zones. TXT records are used to validate, for example, email ownership, application licensing, or any information about a server, network, data center, company, or accounting data. The TXT record is formatted as standard UTF-8 ASCII text data. […]
Resource Relationship AWS Config allows you to find, for any of your resources, what other AWS resources they are connected to or associated with. You can obtain this information from either the AWS Management Console or via commands from the CLI. Since you are already in the Management Console looking at the dashboard, try viewing […]
Protecting the Compute What should you do to ensure the protection of your application’s Amazon EC2 instances, containers, AWS Lambda functions, databases, and so on? Well, to start with, you want to design an AWS environment that has proper resource isolation. There are multiple means of achieving this isolation, as we have seen in Chapter […]
Important note Although, in real scenarios, you usually need to treat missing data via exclusion or imputation, never forget that you can always try to look at the source process and check if you can retrieve (or, at least, better understand) the missing data. You may face this option in the exam. If you don’t […]
Note Did you notice the StringLike and StringEquals operators in the policies contained in the condition statements? Knowing how to parse these out will be essential for deciphering the policies on the test. This will be covered in more detail in Chapter 14, Working with Access Policies. aws iam create-policy –policy-name cr-policy –policy-document file://iam_config_policy.json aws iam attach-role-policy […]
Forwarding Rules Conditional forwarding rules are required to tell the Route 53 Resolver what domain names you want to forward to remote resolvers such as an on-premise DNS server. A forwarding rule is needed for each domain to which you want queries to be forwarded. In the Route 53 console dashboard, select Rules in the […]
Amazon DynamoDB DynamoDB is a serverless NoSQL solution that uses a standard HTTPS access model to access table data. A table in DynamoDB is a collection of items that is regionally bound. A table must also have a unique name in the region where it was created. DynamoDB supports storing any amount of data and […]