AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02): Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2024
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | DE-2070s |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (429 Seiten) |
ISBN: | 9781801815079 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV050102234 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 241218s2024 xx o|||| 00||| eng d | ||
020 | |a 9781801815079 |9 978-1-80181-507-9 | ||
035 | |a (ZDB-30-PQE)EBC31210019 | ||
035 | |a (ZDB-30-PAD)EBC31210019 | ||
035 | |a (ZDB-89-EBL)EBL31210019 | ||
035 | |a (OCoLC)1424950388 | ||
035 | |a (DE-599)BVBBV050102234 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 006.78 | |
100 | 1 | |a Sard, Patrick |e Verfasser |4 aut | |
245 | 1 | 0 | |a AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) |b Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
250 | |a 1st ed | ||
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2024 | |
264 | 4 | |c ©2024 | |
300 | |a 1 Online-Ressource (429 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Determining an Authentication and Access Control Strategy for Complex Organizations -- Making the Most Out of this Book - Your Certification and Beyond -- Diving into Identity and Access Management -- IAM users -- MFA -- IAM User Groups -- IAM Roles -- IAM Policies -- Identity-Based Policies -- Resource-Based Policies -- Permissions Boundaries -- Organizations SCPs -- ACLs -- Session Policies -- Identity-Based Versus Resource-Based Policies -- Examining Access Control -- Role-Based Access Control (RBAC) -- Attribute-Based Access Control (ABAC) -- Leveraging Access Delegation -- Temporary Access Delegation -- Accessing Resources from One Account to Another -- IAM roles' Trust Policies -- AWS Resource Access Manager (RAM) -- Considering User Federation -- Reviewing AWS Directory Service -- Simple AD -- Limitations -- When to Use It -- AD Connector -- Limitations -- When to Use It -- Managed Microsoft AD -- When to Use It -- Summary -- Further Reading -- Chapter 2: Designing Networks for Complex Organizations -- Establishing VPN Connections -- AWS Managed VPN -- AWS VPN CloudHub -- Software VPN -- Introducing AWS DX -- Various Flavors of AWS DX -- Dedicated Connection -- Hosted Connection -- Hosted VIF -- AWS DX Connectivity Overview -- Additional Considerations for Resiliency -- Cost Factor -- Introducing AWS Storage Gateway -- File Gateway -- S3 File Gateway -- FSx File Gateway -- Volume Gateway -- Tape Gateway -- Additional Considerations -- Resiliency -- Quotas -- Leveraging VPC Endpoints -- Interface Endpoints -- GWLB Endpoints -- Gateway Endpoints -- Additional Considerations -- AZs -- Pricing -- Introducing AWS Transit Gateway -- AWS Transit Gateway Overview -- Routing with AWS Transit Gateway -- Summary -- Further Reading | |
505 | 8 | |a Chapter 3: Designing a Multi-Account AWS Environment for Complex Organizations -- Deciding on Resource and Billing Isolation -- Elements of Structure -- Organization -- OUs -- Account -- VPC -- Subnet -- Striking the Right Balance for Resource Isolation -- One Bill or Multiple Bills -- Establishing a Billing Strategy for Multiple Accounts -- Introducing AWS Organizations -- Managing Policies Across Accounts and Filtering out Unwanted Access -- Authorization Policies -- Management Policies -- AI Services Opt-Out Policies -- Backup Policies -- Tag Policies -- Automating the Creation of New Accounts through APIs -- Organizing Accounts into OUs -- Setting up SCPs -- Using SCPs as Deny Lists -- Using SCPs as Allow Lists -- Account Management at Scale with AWS Organizations -- Leveraging Control Tower -- What does Control Tower Deliver Exactly? -- How does Control Tower Operate? -- Summary -- Further Reading -- Chapter 4: Ensuring Cost Optimization -- Cost Optimization Principles -- Establishing Governance with Tagging -- Activating Cost Allocation Tags -- Creating Cost Allocation Tags -- Tagging Strategies and Considerations -- Monitoring with Alerts, Notifications, and Reports -- Enabling Billing Alerts -- Creating a Billing Alarm -- Setting Up Notifications -- Viewing Reports -- Summary -- Further Reading -- Chapter 5: Determining Security Requirements and Controls -- Managing Identity and Access -- IAM Users and Roles -- AWS Service Roles -- Using Federation for Access Control and Authentication -- Protecting your Infrastructure -- Protecting the Network -- Protecting the Compute -- Performing Vulnerability Assessments -- Reducing the Attack Surface -- Leveraging Managed Services -- Automating the Protection -- Protecting your Data -- Data Classification -- Protecting Data at Rest -- Data Encryption -- AWS KMS and AWS CloudHSM. | |
505 | 8 | |a When to Use AWS CloudHSM -- Trust but Control -- Limiting Data Access and Visibility -- Protecting Data in Transit -- Detecting Incidents -- Picking the Right Tool for the Right Task -- Centralizing and Analyzing Logs -- Responding to Incidents -- Summary -- Further Reading -- Chapter 6: Meeting Reliability Requirements -- Reliability Design Principles -- Principle 1 - Automatically Recover from Failure -- Principle 2 - Test Recovery Procedures -- Principle 3 - Scale Horizontally to Increase Aggregate Workload Availability -- Principle 4 - Stop Guessing Capacity -- Principle 5 - Manage Change in Automation -- Foundational Requirements -- Resource Constraints -- Network Topology -- Using Highly Available Network Connectivity for Your Public Endpoints -- Provisioning Redundant Connectivity between Your AWS and On-Premises Environments -- Ensuring IPv4 Subnet Allocation Accounts for Expansion and Availability -- Using Hub-and-Spoke Topologies Instead of a Many-to-Many Mesh -- Enforcing Non-Overlapping Private IPv4 Address Ranges Where Private Networks Are Interconnected -- Designing for Failure -- Designing Your Workload Service Architecture -- Designing Interactions in a Distributed System to Prevent Failures -- Identifying Which Kind of Distributed System Is Required -- Implementing Loosely Coupled Dependencies -- Making All Responses Idempotent -- Doing Constant Work -- Designing Interactions in a Distributed System to Mitigate or Withstand Failures -- Implementing Graceful Degradation to Transform Applicable Hard Dependencies into Soft Dependencies -- Throttling Requests -- Controlling and Limiting Retry Calls -- Failing Fast and Limiting Queues -- Setting Client Timeouts -- Making Services Stateless Where Possible -- Change Management -- Monitoring Workload Resources -- Generation - Monitoring All Components of Your Workload | |
505 | 8 | |a Aggregation - Defining and Calculating Metrics -- Real-Time Processing and Alarming - Sending Notifications -- Real-Time Processing and Alarming - Automating Responses -- Storage and Analytics - Keeping Logs for Further Analysis -- Monitoring End-to-End Tracing of Requests through Your System -- Designing Your Workload to Adapt to Changes in Demand -- Using Automation When Obtaining or Scaling Resources -- Obtaining Resources upon Detection of Impairment -- Obtaining Resources to Satisfy the Demand -- Load Testing Your Workload -- Implementing Change -- Use Runbooks for Standard Activities such as Deployment -- Integrate Functional Testing as Part of Your Deployment -- Integrate Resiliency Testing as Part of Your Deployment -- Deploy Using Immutable Infrastructure -- Deploy Changes with Automation -- Failure Management -- Backing Up Data -- Using Fault Isolation to Protect Your Data -- Deploying the Workload to Multiple Locations -- Automating Recovery for Components Constrained to a Single Location -- Summary -- Further Reading -- Chapter 7: Ensuring Business Continuity -- Disaster Recovery versus High Availability -- Establishing a Business Continuity Plan -- DR Options on AWS -- Backup and Restore -- Re-Building or Backing Up Everything -- Identifying and Backing Up the Necessary Data -- Securing and Encrypting Backup -- Performing Data Backup Automatically -- Backup Frequency -- Pilot Light -- AWS Services for a Pilot Light Approach -- Warm Standby -- AWS Services for a Warm Standby Approach -- Active-Active -- AWS Services for an Active-Active Approach -- Detecting a Disaster and Testing DR -- Summary -- Further Reading -- Chapter 8: Meeting Performance Objectives -- Performance Design Principles -- Principle #1 - Democratize Advanced Technologies -- Principle #2 - Go Global in Minutes -- Principle #3 - Use Serverless Architectures | |
505 | 8 | |a Principle #4 - Experiment More Often -- Principle #5 - Consider Mechanical Sympathy -- Architecting for Performance -- Compute Selection -- EC2 Instances -- Containers -- Functions -- Storage Selection -- Database Selection -- Network Selection -- Monitoring Performance -- Reviewing and Adapting Your Solution -- Summary -- Further Reading -- Chapter 9: Establishing a Deployment Strategy -- Deployment Strategies -- AWS Deployment Services -- AWS OpsWorks -- AWS Elastic Beanstalk -- AWS App Runner -- AWS CodeDeploy -- Deployment Groups -- Deployment Configurations -- Application Specification -- AWS CloudFormation -- Organizing Your Stacks -- Reusing Common Patterns -- Maintaining IaC Resources -- Scaling with CloudFormation StackSets -- The AWS Cloud Development Kit -- Amazon Elastic Container Service (ECS) -- Amazon Elastic Kubernetes Service (EKS) -- AWS Copilot -- AWS Proton -- Tracking Deployment -- Summary -- Further Reading -- Chapter 10: Designing for Cost Efficiency -- Understanding AWS Pricing Models -- Compute -- On-Demand -- Reserved -- Spot -- Storage -- Databases -- Network -- Evaluating Costs -- AWS Pricing Calculator -- AWS Cost Explorer -- AWS Cost and Usage Reports -- Right-Sizing Workloads -- Summary -- Further Reading -- Chapter 11: Improving Operational Excellence -- Design Principles -- Principle #1 - Perform Operations as Code -- Principle #2 - Make Frequent, Small, Reversible Changes -- Principle #3 - Refine Operations Procedures Frequently -- Principle #4 - Anticipate Failure -- Principle #5 - Learn from All Operational Failures -- Principle #6 - Use Managed Services -- Principle #7 - Implement Observability for Actionable Insights -- Improving the Organizational Fit -- Organization Priorities -- Operating Models -- Relationship and Ownership -- Choosing an Operating Model -- Operating Model Examples | |
505 | 8 | |a The Role of Organizational Culture | |
650 | 4 | |a Streaming video | |
700 | 1 | |a Wadia, Yohan |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Sard, Patrick |t AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) |d Birmingham : Packt Publishing, Limited,c2024 |z 9781801813136 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035439396 | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31210019 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818806144823459840 |
---|---|
adam_text | |
any_adam_object | |
author | Sard, Patrick |
author_facet | Sard, Patrick |
author_role | aut |
author_sort | Sard, Patrick |
author_variant | p s ps |
building | Verbundindex |
bvnumber | BV050102234 |
collection | ZDB-30-PQE |
contents | Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Determining an Authentication and Access Control Strategy for Complex Organizations -- Making the Most Out of this Book - Your Certification and Beyond -- Diving into Identity and Access Management -- IAM users -- MFA -- IAM User Groups -- IAM Roles -- IAM Policies -- Identity-Based Policies -- Resource-Based Policies -- Permissions Boundaries -- Organizations SCPs -- ACLs -- Session Policies -- Identity-Based Versus Resource-Based Policies -- Examining Access Control -- Role-Based Access Control (RBAC) -- Attribute-Based Access Control (ABAC) -- Leveraging Access Delegation -- Temporary Access Delegation -- Accessing Resources from One Account to Another -- IAM roles' Trust Policies -- AWS Resource Access Manager (RAM) -- Considering User Federation -- Reviewing AWS Directory Service -- Simple AD -- Limitations -- When to Use It -- AD Connector -- Limitations -- When to Use It -- Managed Microsoft AD -- When to Use It -- Summary -- Further Reading -- Chapter 2: Designing Networks for Complex Organizations -- Establishing VPN Connections -- AWS Managed VPN -- AWS VPN CloudHub -- Software VPN -- Introducing AWS DX -- Various Flavors of AWS DX -- Dedicated Connection -- Hosted Connection -- Hosted VIF -- AWS DX Connectivity Overview -- Additional Considerations for Resiliency -- Cost Factor -- Introducing AWS Storage Gateway -- File Gateway -- S3 File Gateway -- FSx File Gateway -- Volume Gateway -- Tape Gateway -- Additional Considerations -- Resiliency -- Quotas -- Leveraging VPC Endpoints -- Interface Endpoints -- GWLB Endpoints -- Gateway Endpoints -- Additional Considerations -- AZs -- Pricing -- Introducing AWS Transit Gateway -- AWS Transit Gateway Overview -- Routing with AWS Transit Gateway -- Summary -- Further Reading Chapter 3: Designing a Multi-Account AWS Environment for Complex Organizations -- Deciding on Resource and Billing Isolation -- Elements of Structure -- Organization -- OUs -- Account -- VPC -- Subnet -- Striking the Right Balance for Resource Isolation -- One Bill or Multiple Bills -- Establishing a Billing Strategy for Multiple Accounts -- Introducing AWS Organizations -- Managing Policies Across Accounts and Filtering out Unwanted Access -- Authorization Policies -- Management Policies -- AI Services Opt-Out Policies -- Backup Policies -- Tag Policies -- Automating the Creation of New Accounts through APIs -- Organizing Accounts into OUs -- Setting up SCPs -- Using SCPs as Deny Lists -- Using SCPs as Allow Lists -- Account Management at Scale with AWS Organizations -- Leveraging Control Tower -- What does Control Tower Deliver Exactly? -- How does Control Tower Operate? -- Summary -- Further Reading -- Chapter 4: Ensuring Cost Optimization -- Cost Optimization Principles -- Establishing Governance with Tagging -- Activating Cost Allocation Tags -- Creating Cost Allocation Tags -- Tagging Strategies and Considerations -- Monitoring with Alerts, Notifications, and Reports -- Enabling Billing Alerts -- Creating a Billing Alarm -- Setting Up Notifications -- Viewing Reports -- Summary -- Further Reading -- Chapter 5: Determining Security Requirements and Controls -- Managing Identity and Access -- IAM Users and Roles -- AWS Service Roles -- Using Federation for Access Control and Authentication -- Protecting your Infrastructure -- Protecting the Network -- Protecting the Compute -- Performing Vulnerability Assessments -- Reducing the Attack Surface -- Leveraging Managed Services -- Automating the Protection -- Protecting your Data -- Data Classification -- Protecting Data at Rest -- Data Encryption -- AWS KMS and AWS CloudHSM. When to Use AWS CloudHSM -- Trust but Control -- Limiting Data Access and Visibility -- Protecting Data in Transit -- Detecting Incidents -- Picking the Right Tool for the Right Task -- Centralizing and Analyzing Logs -- Responding to Incidents -- Summary -- Further Reading -- Chapter 6: Meeting Reliability Requirements -- Reliability Design Principles -- Principle 1 - Automatically Recover from Failure -- Principle 2 - Test Recovery Procedures -- Principle 3 - Scale Horizontally to Increase Aggregate Workload Availability -- Principle 4 - Stop Guessing Capacity -- Principle 5 - Manage Change in Automation -- Foundational Requirements -- Resource Constraints -- Network Topology -- Using Highly Available Network Connectivity for Your Public Endpoints -- Provisioning Redundant Connectivity between Your AWS and On-Premises Environments -- Ensuring IPv4 Subnet Allocation Accounts for Expansion and Availability -- Using Hub-and-Spoke Topologies Instead of a Many-to-Many Mesh -- Enforcing Non-Overlapping Private IPv4 Address Ranges Where Private Networks Are Interconnected -- Designing for Failure -- Designing Your Workload Service Architecture -- Designing Interactions in a Distributed System to Prevent Failures -- Identifying Which Kind of Distributed System Is Required -- Implementing Loosely Coupled Dependencies -- Making All Responses Idempotent -- Doing Constant Work -- Designing Interactions in a Distributed System to Mitigate or Withstand Failures -- Implementing Graceful Degradation to Transform Applicable Hard Dependencies into Soft Dependencies -- Throttling Requests -- Controlling and Limiting Retry Calls -- Failing Fast and Limiting Queues -- Setting Client Timeouts -- Making Services Stateless Where Possible -- Change Management -- Monitoring Workload Resources -- Generation - Monitoring All Components of Your Workload Aggregation - Defining and Calculating Metrics -- Real-Time Processing and Alarming - Sending Notifications -- Real-Time Processing and Alarming - Automating Responses -- Storage and Analytics - Keeping Logs for Further Analysis -- Monitoring End-to-End Tracing of Requests through Your System -- Designing Your Workload to Adapt to Changes in Demand -- Using Automation When Obtaining or Scaling Resources -- Obtaining Resources upon Detection of Impairment -- Obtaining Resources to Satisfy the Demand -- Load Testing Your Workload -- Implementing Change -- Use Runbooks for Standard Activities such as Deployment -- Integrate Functional Testing as Part of Your Deployment -- Integrate Resiliency Testing as Part of Your Deployment -- Deploy Using Immutable Infrastructure -- Deploy Changes with Automation -- Failure Management -- Backing Up Data -- Using Fault Isolation to Protect Your Data -- Deploying the Workload to Multiple Locations -- Automating Recovery for Components Constrained to a Single Location -- Summary -- Further Reading -- Chapter 7: Ensuring Business Continuity -- Disaster Recovery versus High Availability -- Establishing a Business Continuity Plan -- DR Options on AWS -- Backup and Restore -- Re-Building or Backing Up Everything -- Identifying and Backing Up the Necessary Data -- Securing and Encrypting Backup -- Performing Data Backup Automatically -- Backup Frequency -- Pilot Light -- AWS Services for a Pilot Light Approach -- Warm Standby -- AWS Services for a Warm Standby Approach -- Active-Active -- AWS Services for an Active-Active Approach -- Detecting a Disaster and Testing DR -- Summary -- Further Reading -- Chapter 8: Meeting Performance Objectives -- Performance Design Principles -- Principle #1 - Democratize Advanced Technologies -- Principle #2 - Go Global in Minutes -- Principle #3 - Use Serverless Architectures Principle #4 - Experiment More Often -- Principle #5 - Consider Mechanical Sympathy -- Architecting for Performance -- Compute Selection -- EC2 Instances -- Containers -- Functions -- Storage Selection -- Database Selection -- Network Selection -- Monitoring Performance -- Reviewing and Adapting Your Solution -- Summary -- Further Reading -- Chapter 9: Establishing a Deployment Strategy -- Deployment Strategies -- AWS Deployment Services -- AWS OpsWorks -- AWS Elastic Beanstalk -- AWS App Runner -- AWS CodeDeploy -- Deployment Groups -- Deployment Configurations -- Application Specification -- AWS CloudFormation -- Organizing Your Stacks -- Reusing Common Patterns -- Maintaining IaC Resources -- Scaling with CloudFormation StackSets -- The AWS Cloud Development Kit -- Amazon Elastic Container Service (ECS) -- Amazon Elastic Kubernetes Service (EKS) -- AWS Copilot -- AWS Proton -- Tracking Deployment -- Summary -- Further Reading -- Chapter 10: Designing for Cost Efficiency -- Understanding AWS Pricing Models -- Compute -- On-Demand -- Reserved -- Spot -- Storage -- Databases -- Network -- Evaluating Costs -- AWS Pricing Calculator -- AWS Cost Explorer -- AWS Cost and Usage Reports -- Right-Sizing Workloads -- Summary -- Further Reading -- Chapter 11: Improving Operational Excellence -- Design Principles -- Principle #1 - Perform Operations as Code -- Principle #2 - Make Frequent, Small, Reversible Changes -- Principle #3 - Refine Operations Procedures Frequently -- Principle #4 - Anticipate Failure -- Principle #5 - Learn from All Operational Failures -- Principle #6 - Use Managed Services -- Principle #7 - Implement Observability for Actionable Insights -- Improving the Organizational Fit -- Organization Priorities -- Operating Models -- Relationship and Ownership -- Choosing an Operating Model -- Operating Model Examples The Role of Organizational Culture |
ctrlnum | (ZDB-30-PQE)EBC31210019 (ZDB-30-PAD)EBC31210019 (ZDB-89-EBL)EBL31210019 (OCoLC)1424950388 (DE-599)BVBBV050102234 |
dewey-full | 006.78 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.78 |
dewey-search | 006.78 |
dewey-sort | 16.78 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050102234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241218s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801815079</subfield><subfield code="9">978-1-80181-507-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC31210019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC31210019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL31210019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424950388</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050102234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.78</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sard, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02)</subfield><subfield code="b">Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (429 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Determining an Authentication and Access Control Strategy for Complex Organizations -- Making the Most Out of this Book - Your Certification and Beyond -- Diving into Identity and Access Management -- IAM users -- MFA -- IAM User Groups -- IAM Roles -- IAM Policies -- Identity-Based Policies -- Resource-Based Policies -- Permissions Boundaries -- Organizations SCPs -- ACLs -- Session Policies -- Identity-Based Versus Resource-Based Policies -- Examining Access Control -- Role-Based Access Control (RBAC) -- Attribute-Based Access Control (ABAC) -- Leveraging Access Delegation -- Temporary Access Delegation -- Accessing Resources from One Account to Another -- IAM roles' Trust Policies -- AWS Resource Access Manager (RAM) -- Considering User Federation -- Reviewing AWS Directory Service -- Simple AD -- Limitations -- When to Use It -- AD Connector -- Limitations -- When to Use It -- Managed Microsoft AD -- When to Use It -- Summary -- Further Reading -- Chapter 2: Designing Networks for Complex Organizations -- Establishing VPN Connections -- AWS Managed VPN -- AWS VPN CloudHub -- Software VPN -- Introducing AWS DX -- Various Flavors of AWS DX -- Dedicated Connection -- Hosted Connection -- Hosted VIF -- AWS DX Connectivity Overview -- Additional Considerations for Resiliency -- Cost Factor -- Introducing AWS Storage Gateway -- File Gateway -- S3 File Gateway -- FSx File Gateway -- Volume Gateway -- Tape Gateway -- Additional Considerations -- Resiliency -- Quotas -- Leveraging VPC Endpoints -- Interface Endpoints -- GWLB Endpoints -- Gateway Endpoints -- Additional Considerations -- AZs -- Pricing -- Introducing AWS Transit Gateway -- AWS Transit Gateway Overview -- Routing with AWS Transit Gateway -- Summary -- Further Reading</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: Designing a Multi-Account AWS Environment for Complex Organizations -- Deciding on Resource and Billing Isolation -- Elements of Structure -- Organization -- OUs -- Account -- VPC -- Subnet -- Striking the Right Balance for Resource Isolation -- One Bill or Multiple Bills -- Establishing a Billing Strategy for Multiple Accounts -- Introducing AWS Organizations -- Managing Policies Across Accounts and Filtering out Unwanted Access -- Authorization Policies -- Management Policies -- AI Services Opt-Out Policies -- Backup Policies -- Tag Policies -- Automating the Creation of New Accounts through APIs -- Organizing Accounts into OUs -- Setting up SCPs -- Using SCPs as Deny Lists -- Using SCPs as Allow Lists -- Account Management at Scale with AWS Organizations -- Leveraging Control Tower -- What does Control Tower Deliver Exactly? -- How does Control Tower Operate? -- Summary -- Further Reading -- Chapter 4: Ensuring Cost Optimization -- Cost Optimization Principles -- Establishing Governance with Tagging -- Activating Cost Allocation Tags -- Creating Cost Allocation Tags -- Tagging Strategies and Considerations -- Monitoring with Alerts, Notifications, and Reports -- Enabling Billing Alerts -- Creating a Billing Alarm -- Setting Up Notifications -- Viewing Reports -- Summary -- Further Reading -- Chapter 5: Determining Security Requirements and Controls -- Managing Identity and Access -- IAM Users and Roles -- AWS Service Roles -- Using Federation for Access Control and Authentication -- Protecting your Infrastructure -- Protecting the Network -- Protecting the Compute -- Performing Vulnerability Assessments -- Reducing the Attack Surface -- Leveraging Managed Services -- Automating the Protection -- Protecting your Data -- Data Classification -- Protecting Data at Rest -- Data Encryption -- AWS KMS and AWS CloudHSM.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">When to Use AWS CloudHSM -- Trust but Control -- Limiting Data Access and Visibility -- Protecting Data in Transit -- Detecting Incidents -- Picking the Right Tool for the Right Task -- Centralizing and Analyzing Logs -- Responding to Incidents -- Summary -- Further Reading -- Chapter 6: Meeting Reliability Requirements -- Reliability Design Principles -- Principle 1 - Automatically Recover from Failure -- Principle 2 - Test Recovery Procedures -- Principle 3 - Scale Horizontally to Increase Aggregate Workload Availability -- Principle 4 - Stop Guessing Capacity -- Principle 5 - Manage Change in Automation -- Foundational Requirements -- Resource Constraints -- Network Topology -- Using Highly Available Network Connectivity for Your Public Endpoints -- Provisioning Redundant Connectivity between Your AWS and On-Premises Environments -- Ensuring IPv4 Subnet Allocation Accounts for Expansion and Availability -- Using Hub-and-Spoke Topologies Instead of a Many-to-Many Mesh -- Enforcing Non-Overlapping Private IPv4 Address Ranges Where Private Networks Are Interconnected -- Designing for Failure -- Designing Your Workload Service Architecture -- Designing Interactions in a Distributed System to Prevent Failures -- Identifying Which Kind of Distributed System Is Required -- Implementing Loosely Coupled Dependencies -- Making All Responses Idempotent -- Doing Constant Work -- Designing Interactions in a Distributed System to Mitigate or Withstand Failures -- Implementing Graceful Degradation to Transform Applicable Hard Dependencies into Soft Dependencies -- Throttling Requests -- Controlling and Limiting Retry Calls -- Failing Fast and Limiting Queues -- Setting Client Timeouts -- Making Services Stateless Where Possible -- Change Management -- Monitoring Workload Resources -- Generation - Monitoring All Components of Your Workload</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Aggregation - Defining and Calculating Metrics -- Real-Time Processing and Alarming - Sending Notifications -- Real-Time Processing and Alarming - Automating Responses -- Storage and Analytics - Keeping Logs for Further Analysis -- Monitoring End-to-End Tracing of Requests through Your System -- Designing Your Workload to Adapt to Changes in Demand -- Using Automation When Obtaining or Scaling Resources -- Obtaining Resources upon Detection of Impairment -- Obtaining Resources to Satisfy the Demand -- Load Testing Your Workload -- Implementing Change -- Use Runbooks for Standard Activities such as Deployment -- Integrate Functional Testing as Part of Your Deployment -- Integrate Resiliency Testing as Part of Your Deployment -- Deploy Using Immutable Infrastructure -- Deploy Changes with Automation -- Failure Management -- Backing Up Data -- Using Fault Isolation to Protect Your Data -- Deploying the Workload to Multiple Locations -- Automating Recovery for Components Constrained to a Single Location -- Summary -- Further Reading -- Chapter 7: Ensuring Business Continuity -- Disaster Recovery versus High Availability -- Establishing a Business Continuity Plan -- DR Options on AWS -- Backup and Restore -- Re-Building or Backing Up Everything -- Identifying and Backing Up the Necessary Data -- Securing and Encrypting Backup -- Performing Data Backup Automatically -- Backup Frequency -- Pilot Light -- AWS Services for a Pilot Light Approach -- Warm Standby -- AWS Services for a Warm Standby Approach -- Active-Active -- AWS Services for an Active-Active Approach -- Detecting a Disaster and Testing DR -- Summary -- Further Reading -- Chapter 8: Meeting Performance Objectives -- Performance Design Principles -- Principle #1 - Democratize Advanced Technologies -- Principle #2 - Go Global in Minutes -- Principle #3 - Use Serverless Architectures</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Principle #4 - Experiment More Often -- Principle #5 - Consider Mechanical Sympathy -- Architecting for Performance -- Compute Selection -- EC2 Instances -- Containers -- Functions -- Storage Selection -- Database Selection -- Network Selection -- Monitoring Performance -- Reviewing and Adapting Your Solution -- Summary -- Further Reading -- Chapter 9: Establishing a Deployment Strategy -- Deployment Strategies -- AWS Deployment Services -- AWS OpsWorks -- AWS Elastic Beanstalk -- AWS App Runner -- AWS CodeDeploy -- Deployment Groups -- Deployment Configurations -- Application Specification -- AWS CloudFormation -- Organizing Your Stacks -- Reusing Common Patterns -- Maintaining IaC Resources -- Scaling with CloudFormation StackSets -- The AWS Cloud Development Kit -- Amazon Elastic Container Service (ECS) -- Amazon Elastic Kubernetes Service (EKS) -- AWS Copilot -- AWS Proton -- Tracking Deployment -- Summary -- Further Reading -- Chapter 10: Designing for Cost Efficiency -- Understanding AWS Pricing Models -- Compute -- On-Demand -- Reserved -- Spot -- Storage -- Databases -- Network -- Evaluating Costs -- AWS Pricing Calculator -- AWS Cost Explorer -- AWS Cost and Usage Reports -- Right-Sizing Workloads -- Summary -- Further Reading -- Chapter 11: Improving Operational Excellence -- Design Principles -- Principle #1 - Perform Operations as Code -- Principle #2 - Make Frequent, Small, Reversible Changes -- Principle #3 - Refine Operations Procedures Frequently -- Principle #4 - Anticipate Failure -- Principle #5 - Learn from All Operational Failures -- Principle #6 - Use Managed Services -- Principle #7 - Implement Observability for Actionable Insights -- Improving the Organizational Fit -- Organization Priorities -- Operating Models -- Relationship and Ownership -- Choosing an Operating Model -- Operating Model Examples</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Role of Organizational Culture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Streaming video</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wadia, Yohan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Sard, Patrick</subfield><subfield code="t">AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02)</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2024</subfield><subfield code="z">9781801813136</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035439396</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31210019</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050102234 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T19:05:06Z |
institution | BVB |
isbn | 9781801815079 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035439396 |
oclc_num | 1424950388 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (429 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Sard, Patrick Verfasser aut AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt 1st ed Birmingham Packt Publishing, Limited 2024 ©2024 1 Online-Ressource (429 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Determining an Authentication and Access Control Strategy for Complex Organizations -- Making the Most Out of this Book - Your Certification and Beyond -- Diving into Identity and Access Management -- IAM users -- MFA -- IAM User Groups -- IAM Roles -- IAM Policies -- Identity-Based Policies -- Resource-Based Policies -- Permissions Boundaries -- Organizations SCPs -- ACLs -- Session Policies -- Identity-Based Versus Resource-Based Policies -- Examining Access Control -- Role-Based Access Control (RBAC) -- Attribute-Based Access Control (ABAC) -- Leveraging Access Delegation -- Temporary Access Delegation -- Accessing Resources from One Account to Another -- IAM roles' Trust Policies -- AWS Resource Access Manager (RAM) -- Considering User Federation -- Reviewing AWS Directory Service -- Simple AD -- Limitations -- When to Use It -- AD Connector -- Limitations -- When to Use It -- Managed Microsoft AD -- When to Use It -- Summary -- Further Reading -- Chapter 2: Designing Networks for Complex Organizations -- Establishing VPN Connections -- AWS Managed VPN -- AWS VPN CloudHub -- Software VPN -- Introducing AWS DX -- Various Flavors of AWS DX -- Dedicated Connection -- Hosted Connection -- Hosted VIF -- AWS DX Connectivity Overview -- Additional Considerations for Resiliency -- Cost Factor -- Introducing AWS Storage Gateway -- File Gateway -- S3 File Gateway -- FSx File Gateway -- Volume Gateway -- Tape Gateway -- Additional Considerations -- Resiliency -- Quotas -- Leveraging VPC Endpoints -- Interface Endpoints -- GWLB Endpoints -- Gateway Endpoints -- Additional Considerations -- AZs -- Pricing -- Introducing AWS Transit Gateway -- AWS Transit Gateway Overview -- Routing with AWS Transit Gateway -- Summary -- Further Reading Chapter 3: Designing a Multi-Account AWS Environment for Complex Organizations -- Deciding on Resource and Billing Isolation -- Elements of Structure -- Organization -- OUs -- Account -- VPC -- Subnet -- Striking the Right Balance for Resource Isolation -- One Bill or Multiple Bills -- Establishing a Billing Strategy for Multiple Accounts -- Introducing AWS Organizations -- Managing Policies Across Accounts and Filtering out Unwanted Access -- Authorization Policies -- Management Policies -- AI Services Opt-Out Policies -- Backup Policies -- Tag Policies -- Automating the Creation of New Accounts through APIs -- Organizing Accounts into OUs -- Setting up SCPs -- Using SCPs as Deny Lists -- Using SCPs as Allow Lists -- Account Management at Scale with AWS Organizations -- Leveraging Control Tower -- What does Control Tower Deliver Exactly? -- How does Control Tower Operate? -- Summary -- Further Reading -- Chapter 4: Ensuring Cost Optimization -- Cost Optimization Principles -- Establishing Governance with Tagging -- Activating Cost Allocation Tags -- Creating Cost Allocation Tags -- Tagging Strategies and Considerations -- Monitoring with Alerts, Notifications, and Reports -- Enabling Billing Alerts -- Creating a Billing Alarm -- Setting Up Notifications -- Viewing Reports -- Summary -- Further Reading -- Chapter 5: Determining Security Requirements and Controls -- Managing Identity and Access -- IAM Users and Roles -- AWS Service Roles -- Using Federation for Access Control and Authentication -- Protecting your Infrastructure -- Protecting the Network -- Protecting the Compute -- Performing Vulnerability Assessments -- Reducing the Attack Surface -- Leveraging Managed Services -- Automating the Protection -- Protecting your Data -- Data Classification -- Protecting Data at Rest -- Data Encryption -- AWS KMS and AWS CloudHSM. When to Use AWS CloudHSM -- Trust but Control -- Limiting Data Access and Visibility -- Protecting Data in Transit -- Detecting Incidents -- Picking the Right Tool for the Right Task -- Centralizing and Analyzing Logs -- Responding to Incidents -- Summary -- Further Reading -- Chapter 6: Meeting Reliability Requirements -- Reliability Design Principles -- Principle 1 - Automatically Recover from Failure -- Principle 2 - Test Recovery Procedures -- Principle 3 - Scale Horizontally to Increase Aggregate Workload Availability -- Principle 4 - Stop Guessing Capacity -- Principle 5 - Manage Change in Automation -- Foundational Requirements -- Resource Constraints -- Network Topology -- Using Highly Available Network Connectivity for Your Public Endpoints -- Provisioning Redundant Connectivity between Your AWS and On-Premises Environments -- Ensuring IPv4 Subnet Allocation Accounts for Expansion and Availability -- Using Hub-and-Spoke Topologies Instead of a Many-to-Many Mesh -- Enforcing Non-Overlapping Private IPv4 Address Ranges Where Private Networks Are Interconnected -- Designing for Failure -- Designing Your Workload Service Architecture -- Designing Interactions in a Distributed System to Prevent Failures -- Identifying Which Kind of Distributed System Is Required -- Implementing Loosely Coupled Dependencies -- Making All Responses Idempotent -- Doing Constant Work -- Designing Interactions in a Distributed System to Mitigate or Withstand Failures -- Implementing Graceful Degradation to Transform Applicable Hard Dependencies into Soft Dependencies -- Throttling Requests -- Controlling and Limiting Retry Calls -- Failing Fast and Limiting Queues -- Setting Client Timeouts -- Making Services Stateless Where Possible -- Change Management -- Monitoring Workload Resources -- Generation - Monitoring All Components of Your Workload Aggregation - Defining and Calculating Metrics -- Real-Time Processing and Alarming - Sending Notifications -- Real-Time Processing and Alarming - Automating Responses -- Storage and Analytics - Keeping Logs for Further Analysis -- Monitoring End-to-End Tracing of Requests through Your System -- Designing Your Workload to Adapt to Changes in Demand -- Using Automation When Obtaining or Scaling Resources -- Obtaining Resources upon Detection of Impairment -- Obtaining Resources to Satisfy the Demand -- Load Testing Your Workload -- Implementing Change -- Use Runbooks for Standard Activities such as Deployment -- Integrate Functional Testing as Part of Your Deployment -- Integrate Resiliency Testing as Part of Your Deployment -- Deploy Using Immutable Infrastructure -- Deploy Changes with Automation -- Failure Management -- Backing Up Data -- Using Fault Isolation to Protect Your Data -- Deploying the Workload to Multiple Locations -- Automating Recovery for Components Constrained to a Single Location -- Summary -- Further Reading -- Chapter 7: Ensuring Business Continuity -- Disaster Recovery versus High Availability -- Establishing a Business Continuity Plan -- DR Options on AWS -- Backup and Restore -- Re-Building or Backing Up Everything -- Identifying and Backing Up the Necessary Data -- Securing and Encrypting Backup -- Performing Data Backup Automatically -- Backup Frequency -- Pilot Light -- AWS Services for a Pilot Light Approach -- Warm Standby -- AWS Services for a Warm Standby Approach -- Active-Active -- AWS Services for an Active-Active Approach -- Detecting a Disaster and Testing DR -- Summary -- Further Reading -- Chapter 8: Meeting Performance Objectives -- Performance Design Principles -- Principle #1 - Democratize Advanced Technologies -- Principle #2 - Go Global in Minutes -- Principle #3 - Use Serverless Architectures Principle #4 - Experiment More Often -- Principle #5 - Consider Mechanical Sympathy -- Architecting for Performance -- Compute Selection -- EC2 Instances -- Containers -- Functions -- Storage Selection -- Database Selection -- Network Selection -- Monitoring Performance -- Reviewing and Adapting Your Solution -- Summary -- Further Reading -- Chapter 9: Establishing a Deployment Strategy -- Deployment Strategies -- AWS Deployment Services -- AWS OpsWorks -- AWS Elastic Beanstalk -- AWS App Runner -- AWS CodeDeploy -- Deployment Groups -- Deployment Configurations -- Application Specification -- AWS CloudFormation -- Organizing Your Stacks -- Reusing Common Patterns -- Maintaining IaC Resources -- Scaling with CloudFormation StackSets -- The AWS Cloud Development Kit -- Amazon Elastic Container Service (ECS) -- Amazon Elastic Kubernetes Service (EKS) -- AWS Copilot -- AWS Proton -- Tracking Deployment -- Summary -- Further Reading -- Chapter 10: Designing for Cost Efficiency -- Understanding AWS Pricing Models -- Compute -- On-Demand -- Reserved -- Spot -- Storage -- Databases -- Network -- Evaluating Costs -- AWS Pricing Calculator -- AWS Cost Explorer -- AWS Cost and Usage Reports -- Right-Sizing Workloads -- Summary -- Further Reading -- Chapter 11: Improving Operational Excellence -- Design Principles -- Principle #1 - Perform Operations as Code -- Principle #2 - Make Frequent, Small, Reversible Changes -- Principle #3 - Refine Operations Procedures Frequently -- Principle #4 - Anticipate Failure -- Principle #5 - Learn from All Operational Failures -- Principle #6 - Use Managed Services -- Principle #7 - Implement Observability for Actionable Insights -- Improving the Organizational Fit -- Organization Priorities -- Operating Models -- Relationship and Ownership -- Choosing an Operating Model -- Operating Model Examples The Role of Organizational Culture Streaming video Wadia, Yohan Sonstige oth Erscheint auch als Druck-Ausgabe Sard, Patrick AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Birmingham : Packt Publishing, Limited,c2024 9781801813136 |
spellingShingle | Sard, Patrick AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Determining an Authentication and Access Control Strategy for Complex Organizations -- Making the Most Out of this Book - Your Certification and Beyond -- Diving into Identity and Access Management -- IAM users -- MFA -- IAM User Groups -- IAM Roles -- IAM Policies -- Identity-Based Policies -- Resource-Based Policies -- Permissions Boundaries -- Organizations SCPs -- ACLs -- Session Policies -- Identity-Based Versus Resource-Based Policies -- Examining Access Control -- Role-Based Access Control (RBAC) -- Attribute-Based Access Control (ABAC) -- Leveraging Access Delegation -- Temporary Access Delegation -- Accessing Resources from One Account to Another -- IAM roles' Trust Policies -- AWS Resource Access Manager (RAM) -- Considering User Federation -- Reviewing AWS Directory Service -- Simple AD -- Limitations -- When to Use It -- AD Connector -- Limitations -- When to Use It -- Managed Microsoft AD -- When to Use It -- Summary -- Further Reading -- Chapter 2: Designing Networks for Complex Organizations -- Establishing VPN Connections -- AWS Managed VPN -- AWS VPN CloudHub -- Software VPN -- Introducing AWS DX -- Various Flavors of AWS DX -- Dedicated Connection -- Hosted Connection -- Hosted VIF -- AWS DX Connectivity Overview -- Additional Considerations for Resiliency -- Cost Factor -- Introducing AWS Storage Gateway -- File Gateway -- S3 File Gateway -- FSx File Gateway -- Volume Gateway -- Tape Gateway -- Additional Considerations -- Resiliency -- Quotas -- Leveraging VPC Endpoints -- Interface Endpoints -- GWLB Endpoints -- Gateway Endpoints -- Additional Considerations -- AZs -- Pricing -- Introducing AWS Transit Gateway -- AWS Transit Gateway Overview -- Routing with AWS Transit Gateway -- Summary -- Further Reading Chapter 3: Designing a Multi-Account AWS Environment for Complex Organizations -- Deciding on Resource and Billing Isolation -- Elements of Structure -- Organization -- OUs -- Account -- VPC -- Subnet -- Striking the Right Balance for Resource Isolation -- One Bill or Multiple Bills -- Establishing a Billing Strategy for Multiple Accounts -- Introducing AWS Organizations -- Managing Policies Across Accounts and Filtering out Unwanted Access -- Authorization Policies -- Management Policies -- AI Services Opt-Out Policies -- Backup Policies -- Tag Policies -- Automating the Creation of New Accounts through APIs -- Organizing Accounts into OUs -- Setting up SCPs -- Using SCPs as Deny Lists -- Using SCPs as Allow Lists -- Account Management at Scale with AWS Organizations -- Leveraging Control Tower -- What does Control Tower Deliver Exactly? -- How does Control Tower Operate? -- Summary -- Further Reading -- Chapter 4: Ensuring Cost Optimization -- Cost Optimization Principles -- Establishing Governance with Tagging -- Activating Cost Allocation Tags -- Creating Cost Allocation Tags -- Tagging Strategies and Considerations -- Monitoring with Alerts, Notifications, and Reports -- Enabling Billing Alerts -- Creating a Billing Alarm -- Setting Up Notifications -- Viewing Reports -- Summary -- Further Reading -- Chapter 5: Determining Security Requirements and Controls -- Managing Identity and Access -- IAM Users and Roles -- AWS Service Roles -- Using Federation for Access Control and Authentication -- Protecting your Infrastructure -- Protecting the Network -- Protecting the Compute -- Performing Vulnerability Assessments -- Reducing the Attack Surface -- Leveraging Managed Services -- Automating the Protection -- Protecting your Data -- Data Classification -- Protecting Data at Rest -- Data Encryption -- AWS KMS and AWS CloudHSM. When to Use AWS CloudHSM -- Trust but Control -- Limiting Data Access and Visibility -- Protecting Data in Transit -- Detecting Incidents -- Picking the Right Tool for the Right Task -- Centralizing and Analyzing Logs -- Responding to Incidents -- Summary -- Further Reading -- Chapter 6: Meeting Reliability Requirements -- Reliability Design Principles -- Principle 1 - Automatically Recover from Failure -- Principle 2 - Test Recovery Procedures -- Principle 3 - Scale Horizontally to Increase Aggregate Workload Availability -- Principle 4 - Stop Guessing Capacity -- Principle 5 - Manage Change in Automation -- Foundational Requirements -- Resource Constraints -- Network Topology -- Using Highly Available Network Connectivity for Your Public Endpoints -- Provisioning Redundant Connectivity between Your AWS and On-Premises Environments -- Ensuring IPv4 Subnet Allocation Accounts for Expansion and Availability -- Using Hub-and-Spoke Topologies Instead of a Many-to-Many Mesh -- Enforcing Non-Overlapping Private IPv4 Address Ranges Where Private Networks Are Interconnected -- Designing for Failure -- Designing Your Workload Service Architecture -- Designing Interactions in a Distributed System to Prevent Failures -- Identifying Which Kind of Distributed System Is Required -- Implementing Loosely Coupled Dependencies -- Making All Responses Idempotent -- Doing Constant Work -- Designing Interactions in a Distributed System to Mitigate or Withstand Failures -- Implementing Graceful Degradation to Transform Applicable Hard Dependencies into Soft Dependencies -- Throttling Requests -- Controlling and Limiting Retry Calls -- Failing Fast and Limiting Queues -- Setting Client Timeouts -- Making Services Stateless Where Possible -- Change Management -- Monitoring Workload Resources -- Generation - Monitoring All Components of Your Workload Aggregation - Defining and Calculating Metrics -- Real-Time Processing and Alarming - Sending Notifications -- Real-Time Processing and Alarming - Automating Responses -- Storage and Analytics - Keeping Logs for Further Analysis -- Monitoring End-to-End Tracing of Requests through Your System -- Designing Your Workload to Adapt to Changes in Demand -- Using Automation When Obtaining or Scaling Resources -- Obtaining Resources upon Detection of Impairment -- Obtaining Resources to Satisfy the Demand -- Load Testing Your Workload -- Implementing Change -- Use Runbooks for Standard Activities such as Deployment -- Integrate Functional Testing as Part of Your Deployment -- Integrate Resiliency Testing as Part of Your Deployment -- Deploy Using Immutable Infrastructure -- Deploy Changes with Automation -- Failure Management -- Backing Up Data -- Using Fault Isolation to Protect Your Data -- Deploying the Workload to Multiple Locations -- Automating Recovery for Components Constrained to a Single Location -- Summary -- Further Reading -- Chapter 7: Ensuring Business Continuity -- Disaster Recovery versus High Availability -- Establishing a Business Continuity Plan -- DR Options on AWS -- Backup and Restore -- Re-Building or Backing Up Everything -- Identifying and Backing Up the Necessary Data -- Securing and Encrypting Backup -- Performing Data Backup Automatically -- Backup Frequency -- Pilot Light -- AWS Services for a Pilot Light Approach -- Warm Standby -- AWS Services for a Warm Standby Approach -- Active-Active -- AWS Services for an Active-Active Approach -- Detecting a Disaster and Testing DR -- Summary -- Further Reading -- Chapter 8: Meeting Performance Objectives -- Performance Design Principles -- Principle #1 - Democratize Advanced Technologies -- Principle #2 - Go Global in Minutes -- Principle #3 - Use Serverless Architectures Principle #4 - Experiment More Often -- Principle #5 - Consider Mechanical Sympathy -- Architecting for Performance -- Compute Selection -- EC2 Instances -- Containers -- Functions -- Storage Selection -- Database Selection -- Network Selection -- Monitoring Performance -- Reviewing and Adapting Your Solution -- Summary -- Further Reading -- Chapter 9: Establishing a Deployment Strategy -- Deployment Strategies -- AWS Deployment Services -- AWS OpsWorks -- AWS Elastic Beanstalk -- AWS App Runner -- AWS CodeDeploy -- Deployment Groups -- Deployment Configurations -- Application Specification -- AWS CloudFormation -- Organizing Your Stacks -- Reusing Common Patterns -- Maintaining IaC Resources -- Scaling with CloudFormation StackSets -- The AWS Cloud Development Kit -- Amazon Elastic Container Service (ECS) -- Amazon Elastic Kubernetes Service (EKS) -- AWS Copilot -- AWS Proton -- Tracking Deployment -- Summary -- Further Reading -- Chapter 10: Designing for Cost Efficiency -- Understanding AWS Pricing Models -- Compute -- On-Demand -- Reserved -- Spot -- Storage -- Databases -- Network -- Evaluating Costs -- AWS Pricing Calculator -- AWS Cost Explorer -- AWS Cost and Usage Reports -- Right-Sizing Workloads -- Summary -- Further Reading -- Chapter 11: Improving Operational Excellence -- Design Principles -- Principle #1 - Perform Operations as Code -- Principle #2 - Make Frequent, Small, Reversible Changes -- Principle #3 - Refine Operations Procedures Frequently -- Principle #4 - Anticipate Failure -- Principle #5 - Learn from All Operational Failures -- Principle #6 - Use Managed Services -- Principle #7 - Implement Observability for Actionable Insights -- Improving the Organizational Fit -- Organization Priorities -- Operating Models -- Relationship and Ownership -- Choosing an Operating Model -- Operating Model Examples The Role of Organizational Culture Streaming video |
title | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_auth | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_exact_search | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_full | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_fullStr | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_full_unstemmed | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
title_short | AWS Certified Solutions Architect - Professional Exam Guide (SAP-C02) |
title_sort | aws certified solutions architect professional exam guide sap c02 gain the practical skills knowledge and confidence to ace the aws sap c02 exam on your first attempt |
title_sub | Gain the Practical Skills, Knowledge, and Confidence to Ace the AWS (SAP-C02) Exam on Your First Attempt |
topic | Streaming video |
topic_facet | Streaming video |
work_keys_str_mv | AT sardpatrick awscertifiedsolutionsarchitectprofessionalexamguidesapc02gainthepracticalskillsknowledgeandconfidencetoacetheawssapc02examonyourfirstattempt AT wadiayohan awscertifiedsolutionsarchitectprofessionalexamguidesapc02gainthepracticalskillsknowledgeandconfidencetoacetheawssapc02examonyourfirstattempt |