Complete tutorial for beginners on AWS. Also explained AWS security features.
1. What you can do with AWS
- Store public or private data.
- Host a static website. These websites use client-side technologies (such as HTML, CSS, and JavaScript) to display content that doesn't change frequently. A static website doesn't require server-side technologies (such as PHP and ASP.NET).
- Host a dynamic website, or web app. These websites include classic three-tier applications, with web, application, and database tiers.
- Support students or online training programs.
- Process business and scientific data.
- Handle peak loads.
2. AWS (Amazon Web services different features)
- AWS Management Console A web interface. To get started, see the Getting Started with the AWS Management Console.
- AWS Command Line Interface (AWS CLI) Commands for a broad set of AWS products.To get started, see AWS Command Line Interface User Guide. Command Line Tools Commands for individual AWS products.
- For more information, see Command Line Tools. AWS Software Development Kits (SDK) APIs that are specific to your programming language or platform. For more information, see SDKs.
Query APIs
Low-level APIs that you access using HTTP requests. For more information, see the API
documentation for each service.
3. Global Security Features in AWS
- Physical access to AWS data centers is strictly controlled, monitored, and audited.
- Access to the AWS network is strictly controlled, monitored, and audited.
- You can manage the security credentials that enable users to access your AWS account using AWS Identity and Access Management (IAM).You can create fine-grained permissions to AWS resources and apply them to users or groups of users.
- You can apply ACL-type permissions on your data and can also use encryption of data at rest.
- You can set up a virtual private cloud (VPC), which is a virtual network that is logically isolated from other virtual networks in the AWS cloud.You can control whether the network is directly routable to the Internet.
- You control and configure the operating system on your virtual server.
- You can set up a security group, which acts as a virtual firewall to control the inbound and outbound traffic for your virtual servers.
- You can specify a key pair when you launch your virtual server, which is used to encrypt your login information. When you log in to your virtual server, you must present the private key of the key pair to decrypt the login information.
Comments
Post a Comment
Thanks for your message. We will get back you.