Tag: Notes
All the articles with the tag "Notes".
-
Implementing a Strong Identity Foundation in AWS: Best Practices and Implementation Patterns
In any cloud environment, ensuring a strong identity foundation is paramount for maintaining security and compliance. AWS offers a range of tools and services to help you implement the principle of
-
Elements in the JSON Policy Structure in IAM
Identities in AWS In AWS you manage access by creating policies and attaching them to an identity. The way that AWS thinks of the elements which interact with them is through IDENTITIES or AWS
-
The AWS Well Architected Framework
Discover how to effectively design, utilize, and manage workloads in the cloud by translating requirements into architecture and operations while adhering to best practices. The Six Pillars:
-
Data Encryption at AWS S3
What is Encryption at rest? Encryption works by using an algorithm to convert plain text into ciphertext. This new ciphertext will be unreadable if it falls into the wrong hands. There are many
-
Introduction to AWS Identity and Access Management (IAM)
Theory Users must be authenticated before they can access AWS services and Resources. AWS services can be accessed via AWS CLI AWS SDKs AWS Management Console You can create: Individual IAM users:
-
Understanding Distributed System - Maintainability
Introduction Itβs widely recognized that the bulk of software costs arise after its initial development in maintenance tasks like bug fixes, feature additions, and day-to-day operation. Therefore,
-
Understanding Distributed System β Resiliency
Introduction Chapter 24 - Common Failure Causes Hardware Faults Incorrect Error Handling Configuration Changes Single Points of Failure Network Faults Resources Leaks Load Pressure Cascading Failures
-
Understanding Distributed System β Scalability
Introduction Scaling an application involves maintaining performance as load increases. The long-term solution for increasing capacity is to architect for horizontal scalability. In this section,