Foreword |
|
xxvii | |
Introduction |
|
xxix | |
Assessment Test |
|
xxxvii | |
Chapter 1 Introduction to AWS |
|
1 | (20) |
|
|
3 | (3) |
|
Advantages of Cloud Computing |
|
|
3 | (2) |
|
Cloud Computing Deployment Models |
|
|
5 | (1) |
|
|
6 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
AWS Cloud Computing Platform |
|
|
8 | (9) |
|
|
9 | (1) |
|
Compute and Networking Services |
|
|
9 | (2) |
|
Storage and Content Delivery |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (2) |
|
|
19 | (2) |
Chapter 2 Amazon Simple Storage Service (Amazon S3) and Amazon Glacier Storage |
|
21 | (30) |
|
|
23 | (1) |
|
Object Storage versus Traditional Block and File Storage |
|
|
24 | (1) |
|
Amazon Simple Storage Service (Amazon S3) Basics |
|
|
25 | (5) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Durability and Availability |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
Amazon S3 Advanced Features |
|
|
30 | (6) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Object Lifecycle Management |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Best Practices, Patterns, and Performance |
|
|
36 | (1) |
|
|
36 | (2) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
Amazon Glacier versus Amazon Simple Storage Service (Amazon S3) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (6) |
|
|
46 | (5) |
Chapter 3 Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Elastic Block Store (Amazon EBS) |
|
51 | (34) |
|
|
53 | (1) |
|
Amazon Elastic Compute Cloud (Amazon EC2) |
|
|
53 | (12) |
|
|
53 | (3) |
|
Securely Using an Instance |
|
|
56 | (3) |
|
The Lifecycle of Instances |
|
|
59 | (2) |
|
|
61 | (4) |
|
|
65 | (1) |
|
Amazon Elastic Block Store (Amazon EBS) |
|
|
65 | (5) |
|
Elastic Block Store Basics |
|
|
65 | (1) |
|
Types of Amazon EBS Volumes |
|
|
66 | (2) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (2) |
|
|
73 | (8) |
|
|
81 | (4) |
Chapter 4 Amazon Virtual Private Cloud (Amazon VPC) |
|
85 | (26) |
|
|
87 | (1) |
|
Amazon Virtual Private Cloud (Amazon VPC) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (2) |
|
Dynamic Host Configuration Protocol (DHCP) Option Sets |
|
|
92 | (1) |
|
Elastic IP Addresses (EIPs) |
|
|
92 | (1) |
|
Elastic Network Interfaces (ENIs) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
Network Access Control Lists (ACLs) |
|
|
97 | (1) |
|
Network Address Translation (NAT) Instances and NAT Gateways |
|
|
98 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Virtual Private Gateways (VPGs), Customer Gateways (CGWs), and Virtual Private Networks (VPNs) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (2) |
|
|
105 | (2) |
|
|
107 | (4) |
Chapter 5 Elastic Load Balancing, Amazon CloudWatch, and Auto Scaling |
|
111 | (26) |
|
|
112 | (1) |
|
|
112 | (5) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Configuring Elastic Load Balancing |
|
|
115 | (2) |
|
|
117 | (2) |
|
|
119 | (7) |
|
|
120 | (1) |
|
|
121 | (5) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (3) |
|
|
131 | (6) |
Chapter 6 AWS Identity and Access Management (IAM) |
|
137 | (20) |
|
|
138 | (2) |
|
|
140 | (3) |
|
|
140 | (1) |
|
|
140 | (1) |
|
Roles/Temporary Security Tokens |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
144 | (1) |
|
Associating Policies with Principals |
|
|
145 | (2) |
|
|
147 | (2) |
|
Multi-Factor Authentication (MFA) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Resolving Multiple Permissions |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (4) |
|
|
154 | (3) |
Chapter 7 Databases and AWS |
|
157 | (40) |
|
|
158 | (3) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Amazon Relational Database Service (Amazon RDS) |
|
|
161 | (11) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (2) |
|
High Availability with Multi-AZ |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (5) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (9) |
|
|
178 | (3) |
|
|
181 | (2) |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (2) |
|
|
189 | (3) |
|
|
192 | (5) |
Chapter 8 SOS, SWF, and SNS |
|
197 | (24) |
|
Amazon Simple Queue Service (Amazon SQS) |
|
|
198 | (5) |
|
|
199 | (1) |
|
Delay Queues and Visibility Timeouts |
|
|
200 | (1) |
|
Queue Operations, Unique IDs, and Metadata |
|
|
201 | (1) |
|
Queue and Message Identifiers |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Amazon Simple Workflow Service (Amazon SWF) |
|
|
203 | (5) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Workflow Execution Closure |
|
|
206 | (1) |
|
Lifecycle of a Workflow Execution |
|
|
206 | (2) |
|
Amazon Simple Notification Service (Amazon SNS) |
|
|
208 | (3) |
|
Common Amazon SNS Scenarios |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (3) |
|
|
216 | (5) |
Chapter 9 Domain Name System (DNS) and Amazon Route 53 |
|
221 | (28) |
|
|
223 | (7) |
|
Domain Name System (DNS) Concepts |
|
|
223 | (3) |
|
Steps Involved in Domain Name System (DNS) Resolution |
|
|
226 | (2) |
|
|
228 | (2) |
|
|
230 | (6) |
|
|
230 | (1) |
|
Domain Name System (DNS) Service |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (3) |
|
Amazon Route 53 Enables Resiliency |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (6) |
|
|
244 | (5) |
Chapter 10 Amazon ElastiCache |
|
249 | (14) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (6) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
261 | (2) |
Chapter 11 Additional Key Services |
|
263 | (44) |
|
|
265 | (1) |
|
Storage and Content Delivery |
|
|
265 | (6) |
|
|
266 | (3) |
|
|
269 | (2) |
|
|
271 | (6) |
|
|
272 | (2) |
|
AWS Key Management Service (KMS) and AWS CloudHSM |
|
|
274 | (2) |
|
|
276 | (1) |
|
|
277 | (7) |
|
|
278 | (2) |
|
Amazon Elastic MapReduce (Amazon EMR) |
|
|
280 | (1) |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
284 | (12) |
|
|
284 | (3) |
|
|
287 | (3) |
|
|
290 | (2) |
|
|
292 | (2) |
|
|
294 | (2) |
|
|
296 | (1) |
|
|
297 | (4) |
|
|
301 | (6) |
Chapter 12 Security on AWS |
|
307 | (56) |
|
|
308 | (1) |
|
Shared Responsibility Model |
|
|
308 | (1) |
|
|
309 | (1) |
|
AWS Global Infrastructure Security |
|
|
310 | (5) |
|
Physical and Environmental Security |
|
|
310 | (2) |
|
Business Continuity Management |
|
|
312 | (1) |
|
|
313 | (1) |
|
Network Monitoring and Protection |
|
|
314 | (1) |
|
AWS Account Security Features |
|
|
315 | (5) |
|
|
316 | (1) |
|
|
317 | (1) |
|
AWS Multi-Factor Authentication (AWS MFA) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
AWS Cloud Service-Specific Security |
|
|
320 | (30) |
|
|
320 | (4) |
|
|
324 | (6) |
|
|
330 | (4) |
|
AWS Storage Gateway Security |
|
|
334 | (1) |
|
|
334 | (8) |
|
|
342 | (1) |
|
|
343 | (2) |
|
Deployment and Management Services |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
350 | (5) |
|
|
350 | (1) |
|
|
350 | (1) |
|
Service-Specific Security |
|
|
351 | (4) |
|
|
355 | (2) |
|
|
357 | (1) |
|
|
358 | (5) |
Chapter 13 AWS Risk and Compliance |
|
363 | (18) |
|
|
364 | (1) |
|
Overview of Compliance in AWS |
|
|
364 | (2) |
|
Shared Responsibility Model |
|
|
364 | (2) |
|
Strong Compliance Governance |
|
|
366 | (1) |
|
Evaluating and Integrating AWS Controls |
|
|
366 | (2) |
|
AWS IT Control Information |
|
|
367 | (1) |
|
|
368 | (1) |
|
AWS Risk and Compliance Program |
|
|
368 | (2) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
AWS Reports, Certifications, and Third-Party Attestations |
|
|
370 | (4) |
|
|
374 | (1) |
|
|
375 | (2) |
|
|
377 | (4) |
Chapter 14 Architecture Best Practices |
|
381 | (34) |
|
|
382 | (1) |
|
Design for Failure and Nothing Fails |
|
|
383 | (2) |
|
|
385 | (4) |
|
|
386 | (1) |
|
|
386 | (2) |
|
|
388 | (1) |
|
Leverage Different Storage Options |
|
|
389 | (3) |
|
One Size Does Not Fit All |
|
|
389 | (3) |
|
Build Security in Every Layer |
|
|
392 | (3) |
|
Use AWS Features for Defense in Depth |
|
|
393 | (1) |
|
Offload Security Responsibility to AWS |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
Loose Coupling Sets You Free |
|
|
396 | (2) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (8) |
|
|
409 | (6) |
Appendix Answers to Review Questions |
|
415 | (22) |
|
Chapter 1: Introduction to AWS |
|
|
416 | (1) |
|
Chapter 2: Amazon Simple Storage Service (Amazon S3) and Amazon Glacier Storage |
|
|
417 | (2) |
|
Chapter 3: Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Elastic Block Store (Amazon EBS) |
|
|
419 | (1) |
|
Chapter 4: Amazon Virtual Private Cloud (Amazon VPC) |
|
|
420 | (1) |
|
Chapter 5: Elastic Load Balancing, Amazon CloudWatch, and Auto Scaling |
|
|
421 | (2) |
|
Chapter 6: AWS Identity and Access Management (IAM) |
|
|
423 | (1) |
|
Chapter 7: Databases and AWS |
|
|
423 | (2) |
|
Chapter 8: SQS, SWF, and SNS |
|
|
425 | (1) |
|
Chapter 9: Domain Name System (DNS) and Amazon Route 53 |
|
|
426 | (1) |
|
Chapter 10: Amazon ElastiCache |
|
|
427 | (1) |
|
Chapter 11: Additional Key Services |
|
|
428 | (2) |
|
Chapter 12: Security on AWS |
|
|
430 | (2) |
|
Chapter 13: AWS Risk and Compliance |
|
|
432 | (1) |
|
Chapter 14: Architecture Best Practices |
|
|
433 | (4) |
Index |
|
437 | |