Identity and Access Management When it comes to accessing your AWS account and working inside it, you need the Identity and Access Management (IAM) services of AWS. IAM allows you to grant access to other individuals for team management of the services. IAM permits extremely granular permissions. For example, you might grant someone read access…
DHCP Servers – 100-150 Exam Guide
If you enter an airport or coffee shop with a wireless hotspot, DHCP makes it possible for you to access the internet. As you enter the area, your laptop DHCP client contacts the local DHCP server via a wireless connection. The DHCP server assigns an IPv4 address to your laptop. Various types of devices can…
AWS Security Compliance Programs
AWS Security Compliance Programs How does Amazon measure its success when it comes to compliance with security best practices and regulations? Through the success of its many customers! Customers drive AWS efforts in these categories (to name just a few): Compliance reports Attestations Certifications Compliance programs and your adherence to them will help you implement…
Dynamic Addressing with DHCP
Objectives Upon completion of this chapter, you will be able to answer the following questions: • What is the difference between static and dynamic IPv4 addressing? • Configure a DHCPv4 server to dynamically assign IPv4 addresses. Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. Dynamic Host…
An Introduction to AWS Security
An Introduction to AWS Security Amazon understands that a major concern for many organizations considering moving to public (or hybrid) clouds is security. As a result, it has taken great pains to ensure that incredible levels of security are available for your organization, including massive efforts around confidentiality, integrity, and availability (CIA). The CIA triad,…
AWS Responsibilities
AWS Responsibilities Remember that Amazon is considered responsible for security of the cloud. That is, AWS is responsible for protecting the infrastructure that runs the services chosen, including the hardware and software required to power the AWS service as well as the networking and facilities used. Specific Amazon responsibilities include the following: Cloud software, including…
Understanding the Shared Responsibility Model
Understanding the Shared Responsibility Model The AWS shared responsibility model divides the security responsibilities between two parties: the AWS customer (you) and Amazon (AWS). The fact that you are no longer responsible for a massive portion of the security required for scalable data centers is a huge advantage. You can leverage the massive budgets of…
Building a Web Server with the Free Tier 2
Note If you are having issues making an SSH connection using the instructions in step 8, you can try connecting to your instance in a web browser. On the Connect to Instance page, choose the EC2 Instance Connect tab. Then click the Connect button in the lower-right corner, and you should connect to your Linux…
IPv6 Addressing Formats and Rules Summary
The following is a summary of each topic in the chapter and some questions for your reflection. What Did I Learn in this Module? (10.3.1) • IPv4 Issues—The depletion of IPv4 address space has been the motivating factor for moving to IPv6. IPv6 has a larger 128-bit address space, providing 340 undecillion possible addresses. When…
Preferred Format – 100-150 Exam Guide
The previous figure also shows that the preferred format for writing an IPv6 address is x:x:x:x:x:x:x:x, with each “x” consisting of four hexadecimal values. The term octet refers to the eight bits of an IPv4 address. In IPv6, a hextet is the unofficial term used to refer to a segment of 16 bits, or four…