Security Considerations for SQS – AWS Security Fundamentals – SCS-C02 Study Guide

Security Considerations for SQS Having gone over the functions of the SQS service along with how it differs from the SNS service, you can now examine some of the security best practices for SQS: Create a specific role for the administration of the queues that do not have access to consume or publish messages. This […]

Security Considerations for SNS – AWS Security Fundamentals – SCS-C02 Study Guide

Security Considerations for SNS The following points present some of the security considerations and best practices when using SNS: Simple Queue Service (SQS) The managed queue example at the beginning of this section referenced a queueing system wherein requests could be held until they were ready to be processed. This type of queue enables you […]

Document Databases – AWS Security Fundamentals – SCS-C02 Study Guide

Document Databases A document database is a non-relational (or NoSQL) database that allows you to store documents and data in the JSON-type format and query that data. One of the truly unique features of document databases is that there is no fixed schema and that they can have documents nested inside of each other. AWS […]

Security Considerations for RDS – AWS Security Fundamentals – SCS-C02 Study Guide

Security Considerations for RDS Having gone through the RDS service and its capabilities, you can now examine some of the security considerations and best practices for RDS: Amazon Aurora Amazon Aurora was built in response to customers wanting the performance of commercial-grade database engines such as Oracle or Microsoft SQL Server without dealing with all […]

Elastic Block Store (EBS) – AWS Security Fundamentals – SCS-C02 Study Guide

Elastic Block Store (EBS) Although EBS and EC2 are closely tied together, it is important to remember that they are both separate services. EBS is a storage service that provides network-based storage allocated in the same Availability Zone as the instance and is then mounted for usage. The amount of instance storage allocated to an […]

Relational Database Service – AWS Security Fundamentals – SCS-C02 Study Guide

Relational Database Service Relational Database Service (RDS) aims to remove the tasks previously performed by a database administrator who had to be on staff but gave little to no actual value to the end product or project. These tasks include provisioning a new database, creating backups, scaling out to read replicas, patching and upgrading instances, […]

Checking the Health of a Specific Endpoint – AWS Security Fundamentals – SCS-C02 Study Guide

Checking the Health of a Specific Endpoint In this case, you would create a check from Route 53 that conducts checks at regular intervals specified by you. Your health checks monitor an endpoint that is either an IP address or a domain name. Route 53 then checks at specified intervals if the server, application, or […]

Security Considerations for AWS Lambda – AWS Security Fundamentals – SCS-C02 Study Guide

Security Considerations for AWS Lambda Now that you have a general understanding of the AWS Lambda service, you can examine some of the security considerations to be aware of when using it: With a look at AWS Lambda, this section wrapped up the overview of AWS compute services. Next, you will look at the networking […]

AWS Lambda – AWS Security Fundamentals – SCS-C02 Study Guide

AWS Lambda AWS Lambda is a serverless compute service that allows you to run your code as a function without needing to set up or provision any servers or orchestrate any containers. Rather than being classified as the usual IaaS or PaaS, it falls under the category of Function as a Service (FaaS). It automatically […]

Using User Data Scripts to Configure EC2 Instances at Launch – AWS Security Fundamentals – SCS-C02 Study Guide

Using User Data Scripts to Configure EC2 Instances at Launch Although you can launch EC2 instances and then go and configure the software packages that you need on them manually, there are more efficient approaches. Following manual steps can lead to human mistakes and is a much more time-consuming process that can otherwise easily be […]