AWS Certified Advanced Networking Specialty Course Slides
AWS Certified Advanced Networking Specialty Course Slides
Level: Specialty
Length: 170 minutes
Format: 65 questions (ANS-C00)
Cost: $300 USD
Delivery Method: Testing center or online
Scoring:
• Scaled score between 100 – 1000
• Minimum passing score of 750
Question format:
• Multiple-choice: Has one correct response and three
incorrect responses
• Multiple-response: Has two or more correct responses
out of five or more options
AWS IAM
Unique email address for this account Check if you can use a
dynamic alias with an
[email protected] existing email address
[email protected]
[email protected]
AWS account name / alias
Networking Fundamentals
Servers
Cloud Networking
Email Server
© Digital Cloud Training | https://digitalcloud.training
Server to Server Connectivity
Port: 3306
Protocol: MySQL
Cloud
Company office
Company office
Greater distance =
higher latency
mycompany.local A 192.168.0.1
emailserver.local A 192.168.0.2
DNS Server
Computer connects to
Web Server
192.168.0.1
© Digital Cloud Training | https://digitalcloud.training
IP Addressing Basics
Each part of the
address is a
binary octet
Network ID
The subnet mask is
used to define the
network and host ID
00000001
Binary Values
192 168 0 0
. . .
= 192.168.0.0/24
255 255
. . 255 . 0
Subnet Mask
Class A 10 0 0 0
. . . First address = 172.16.0.1
Class B 172 16 0 0 Last address = 172.16.255.255
. . . Total addresses = 65534
Class C 192 168 0 0
. . .
First address = 192.168.0.1
Last address = 192.168.0.255
Total addresses = 255
Interhost
Session Layer Data TCP, RPC
communication
Session Layer
192.168.0.0/24 eth0
Switch Switch
Router
192.168.0.5
10.0.0.5 10.0.0.3
192.168.0.3
192.168.0.4 10.0.0.4
eth0 192.168.2.2
192.168.2.1
eth1
192.168.1.1 192.168.1.2
eth1 eth0
192.168.0.1 eth0
Destination Interface/Next Hop
192.168.1.0/24 eth0
192.168.0.0/24 via 192.168.1.1
192.168.2.0/24 eth1
192.168.0.0/24
192.168.3.0/24 via 192.168.2.2
192.168.4.0/24 via 192.168.2.2
© Digital Cloud Training | https://digitalcloud.training
Network Address Translation
192.168.0.1 192.168.0.2
192.168.0.200 54.200.168.152
Switch
Router The Internet
192.168.0.3 192.168.0.4
In this configuration computers
with private addresses cannot
Private IP addresses communicate on the Internet
are not routable on
the Internet
© Digital Cloud Training | https://digitalcloud.training
Without Network Address Translation (NAT)
Company office
Web Server
192.168.0.200 54.200.168.152
Source IP address
cannot be routed so
Switch
return traffic fails The Internet
Router
192.168.0.3 192.168.0.4
Web Server
192.168.0.200 54.200.168.152
The NAT service takes
care of translating back
Switch to private IPs internally
Router + NAT The Internet
192.168.0.3 192.168.0.4
VPC VPC
CIDR 10.0.0.0/16 CIDR 10.1.0.0/16
Subnet A segment of a VPC’s IP address range where you can place groups
of isolated resources
Internet Gateway/Egress- The Amazon VPC side of a connection to the public Internet for IPv4/IPv6
only Internet Gateway
Router Routers interconnect subnets and direct traffic between Internet gateways, virtual private gateways,
NAT gateways, and subnets
Peering Connection Direct connection between two VPCs
VPC Endpoints Private connection to public AWS services
NAT Instance Enables Internet access for EC2 instances in private subnets managed by you)
NAT Gateway Enables Internet access for EC2 instances in private subnets (managed by AWS)
Virtual Private Gateway The Amazon VPC side of a Virtual Private Network (VPN) connection
Customer Gateway Customer side of a VPN connection
AWS Direct Connect High speed, high bandwidth, private network connection from customer to aws
Security Group Instance-level firewall
Network ACL Subnet-level firewall
• You can launch your AWS resources, such as Amazon EC2 instances, into
your VPC
10.0.3.0/24
Subnet Name IPv4 CIDR block Availability Zone Route Table Auto-assign Public IP v4
private-1a 10.0.0.0/24 us-east-1a Private-RT No
private-1b 10.0.1.0/24 us-east-1b Private-RT No
private-1c 10.0.2.0/24 us-east-1c Private-RT No
public-1a 10.0.3.0/24 us-east-1a MAIN Yes
public-1b 10.0.4.0/24 us-east-1b MAIN Yes
public-1c 10.0.5.0/24 us-east-1c MAIN Yes
172.16.0.0/12 CIDR blocks from other RFC 1918 ranges Any other CIDR block from the
(10.0.0.0/8 and 192.168.0.0/16) 172.16.0.0/12 range that's not restricted
CIDR blocks from the 172.31.0.0/16 range Any publicly routable IPv4 CIDR block (non-
RFC 1918), or a CIDR block from the
CIDR blocks from the 198.19.0.0/16 range 100.64.0.0/10 range
CIDR blocks from the 198.19.0.0/16 Any publicly routable IPv4 CIDR block
range or a CIDR block from the 100.64.0.0/10
range
198.19.0.0/16 CIDR blocks from the RFC 1918 ranges Any publicly routable IPv4 CIDR block
or a CIDR block from the 100.64.0.0/10
range
Publicly routable CIDR blocks from the RFC 1918 ranges Any other publicly routable IPv4 CIDR
CIDR block or a block, or a CIDR block from the
CIDR block from CIDR blocks from the 198.19.0.0/16 100.64.0.0/10 range
the 100.64.0.0/10 range
range
com.amazonaws.region.s3 Amazon S3
Private subnet
Private-IP Internet
gateway Public Internet
Subnet Name IPv4 CIDR block Availability Zone Route Table Auto-assign Public IPv4
private-1a 10.0.3.0/24 us-east-1a Private-RT No
private-1b 10.0.4.0/24 us-east-1b Private-RT No
public-1a 10.0.1.0/24 us-east-1a MAIN Yes
public-1b 10.0.2.0/24 us-east-1b MAIN Yes
Automatically assign
Has a route to an
IPv4 Public
Internet Gateway
addresses
Destination Target
Private subnet Public subnet
10.0.0.0/16 Local
10.0.80.0/20 10.0.32.0/20
Destination Target
Private subnet Public subnet
10.0.0.0/16 Local
10.0.80.0/20 10.0.32.0/20
Internet
gateway
Private Route Table
Destination Target
Private subnet Public subnet
Outbound data is 10.0.0.0/16 Local
routed to the NAT 0.0.0.0/0 nat-gw-id
Gateway
Private subnet
VPC
CIDR 172.16.0.0/16
Private subnet
172.16.0.15
preferred over
172.16.0.0/16 vpc-peer-1 Private subnet
propagated routes
172.16.0.0/16 vgw-conn-1
172.16.0.20
DC CIDR 172.16.0.0/16
VGW
172.16.0.20
Routes learned and
CGW
propagated by BGP
to route table
Internet
Security Appliance gateway
Availability Zone
Availability Zone
Router
Private subnet Public subnet
Security Security NACLs apply only to
Group B Group A
traffic entering /
Security
Group A exiting the subnet
Network ACL Network ACL
Security Groups
apply at the
Instance level
© Digital Cloud Training | https://digitalcloud.training
Security Group Rules
Separate rules
are defined for
outbound traffic
A source can be an IP
address or security
group ID
© Digital Cloud Training | https://digitalcloud.training
Security Groups Best Practice
Public subnet(s)
Private subnet(s)
Inbound Rules
Security
Groups Send notifications
with SNS
AWS Managed Rule:
AWS Config Amazon Simple
• Check for unrestricted SSH
• Check for unrestricted common ports Notification Service
• Check for unattached SG
Event Target
Region
VPC
Main Route Table
Availability Zone Destination Target
Public subnet 10.0.0.0/16 Local
NAT gateway Elastic-IP
0.0.0.0/0 igw-id
Jump host / Private-IP
us-west-2 us-west-2-lax-1
Amazon S3
Availability Zone Availability Zone Availability Zone Availability Zone
Subnet A segment of a VPC’s IP address range where you can place groups
of isolated resources
Internet Gateway/Egress- The Amazon VPC side of a connection to the public Internet for IPv4/IPv6
only Internet Gateway
Router Routers interconnect subnets and direct traffic between Internet gateways, virtual private gateways,
NAT gateways, and subnets
Peering Connection Direct connection between two VPCs
VPC Endpoints Private connection to public AWS services
NAT Instance Enables Internet access for EC2 instances in private subnets managed by you)
NAT Gateway Enables Internet access for EC2 instances in private subnets (managed by AWS)
Virtual Private Gateway The Amazon VPC side of a Virtual Private Network (VPN) connection
Customer Gateway Customer side of a VPN connection
AWS Direct Connect High speed, high bandwidth, private network connection from customer to aws
Security Group Instance-level firewall
Network ACL Subnet-level firewall
Availability Zone
172.31.15.89
Additional ENIs can be 52.63.195.113
attached from subnets eth1 eth0
within the same AZ EC2 Instance
The primary network
Availability Zone interface has a private IP
Private subnet Public subnet and optionally a public IP
• Basic adapter type for when you • Enhanced networking • Use with High Performance
don’t have any high-performance performance Computing and MPI and ML use
requirements • Higher bandwidth and lower cases
• Can use with all instance types inter-instance latency • Tightly coupled applications
• Must choose supported instance • Can use with all instance types
type
• Partition – spreads your instances across logical partitions such that groups
of instances in one partition do not share the underlying hardware with
groups of instances in different partitions. This strategy is typically used by
large distributed and replicated workloads, such as Hadoop, Cassandra, and
Kafka
Region
VPC
Availability Zone
Region
VPC
Each partition is located on
Availability Zone Availability Zone
a separate AWS rack
Partitions can be
in multiple AZs
(up to 7 per AZ)
EC2 Instances EC2 Instances EC2 Instances
Region
VPC
Availability Zone
Each instance is located on Availability Zone
a separate AWS rack
Availability Zone
172.31.15.89
172.31.55.108
54.66.202.9 52.63.195.113
eth1 eth0
EC2 Instance
A public IP address is a
dynamic address
An Elastic IP address is
Elastic IP a static address
Availability Zone
172.31.15.89
172.31.55.108
54.66.202.9 52.63.195.113
eth1 eth0
EC2 Instance
eth0
EC2 Instance
Availability Zone
172.31.55.108
54.66.202.9 eth1 eth0
EC2 Instance
Availability Zone
eth1 eth0
EC2 Instance
EIPs can be remapped
across AZs
© Digital Cloud Training | https://digitalcloud.training
Public, Private and Elastic IP addresses
Name Description
Public IP address Lost when the instance is stopped
No charge
172.31.32.63
IGW performs
1:1 NAT
3.104.75.244
A rule is
configured on
the listener – Target groups are used
Requests can be TG1 TG2 TG3
ALBs listen on to route requests to
routed based on
HTTP/HTTPS Subnet registered targets
the path in the URL
Path-based
routing
Subnet
https://example.com/specials
Targets can be EC2
instances, IP addresses,
https://example.com/orders Lambda functions or
containers
https://members.example.com/ Subnet
Host-based routing
© Digital Cloud Training | https://digitalcloud.training
Network Load Balancer (NLB)
Network Load
Requests are routed based
Balancer (NLB)
on IP protocol data
NLBs listen on
TCP, TLS, UDP
or TCP_UDP
NLB nodes can TG1 TG2
54.22.182.2
have elastic IPs in
Subnet
each subnet
Targets can be
EC2 instances or
IP addresses
54.239.28.85
Subnet
https://example.com
Targets can be
outside a VPC
https://example.com:8080
(e.g. on-premises)
54.12.10.212
A separate listener on a Subnet
unique port is required
for routing
© Digital Cloud Training | https://digitalcloud.training
Storing Session State
ElastiCache is also a
popular solution for
storing session-state data
Availability Zone
Elastic Load Balancer
DynamoDB Table Public subnet
User does not need to
Session data retrieved re-authenticate
from DynamoDB Table
Availability Zone
Public subnet
Client is directed to
another instance
NLB
ALB SG ALB SG
SG SG
ALB SG SG NLB
SG SG
Encrypted Encrypted
Encrypted
Single encrypted
connection
SSL/TLS CERT
Encrypted
Encrypted
EC2 Status
EC2 Instances Auto Scaling group EC2 Instances
Checks fail
CloudWatch
notifies Auto
Scaling to scale
ASG replaces
failed instance
VPC
GLB endpoint is a target
in the subnet route table
Task Definition
Auto Scaling group
{
"containerDefinitions": [
{ ECS Container ECS Container Amazon Elastic Container
"name": "wordpress",
"links": [ instance instance Registry
"mysql"
],
"image": "wordpress",
"essential": true,
Registry
"portMappings": [
{
"containerPort": 80,
Task Task Task Task
"hostPort": 80
}
],
"memory": 500, An ECS Task is a
"cpu": 10
running Docker Image Image
}
Docker images can be
container
stored in Amazon ECR
ECS Service
AmazonEC2ContainerServiceforEC2Role
ECS Container instance The container instance
IAM role provides
permissions to the host
IAM Instance Role
Task
ECS Service
Task
VPC
Availability Zone Availability Zone Availability Zone
Groups of containers
are known as Pods
in Kubernetes
• Amazon EKS supports native VPC networking with the Amazon VPC
Container Network Interface (CNI) plugin for Kubernetes
• This plugin assigns a private IPv4 or IPv6 address from your VPC to each
pod
• The VPC CNI plugin for Kubernetes is deployed with each of your
Amazon EC2 nodes in a Daemonset with the name aws-node
• The plugin consists of two components:
• L-IPAM daemon – Responsible for creating network interfaces and
attaching the network interfaces to Amazon EC2 instances, assigning
secondary IP addresses to network interfaces, and maintaining a
warm pool of IP addresses on each node for assignment to
Kubernetes pods when they are scheduled
• CNI plugin – Responsible for wiring the host network (for example,
configuring the network interfaces and virtual Ethernet pairs) and
adding the correct network interface to the pod namespace
Private subnet
Key benefits:
Edge-optimized • Reduced latency for requests
endpoint from around the world
Amazon CloudFront Amazon API Gateway
VPC
Key benefits:
• Securely expose your REST APIs
Private endpoint only to other services within
Services in your VPC or connect via Direct
Amazon API Gateway
same VPC Connect
VPC VPC
Public subnet
EC2 Instance
Lambda function
Amazon API
Private subnet
Gateway
EC2 Instance
ANY
DELETE HTTP
GET HTTP_PROXY
HEAD LAMBDA
OPTIONS
PATCH LAMBDA_PROXY
Endpoint
Users Published API POST MOCK
PUT
Integration Request Lambda function, HTTP
Method Request
endpoint, EC2 instance,
AWS service etc.
HTTP STATUS
CODES CONVERT
RESPONSE PASSTHROUGH
BODIES
Map the status codes, headers,
Method Response Integration Response
and payload received from
backend into format for client
• Caching can reduce number of calls to the backend and improve latency of
requests to the API If not in the cache
(cache miss), go to
2 backend
1
• Limits:
• By default, API Gateway limits the steady-state request rate to 10,000
requests per second
• The maximum concurrent requests is 5,000 requests across all APIs within an
AWS account
• If you go over 10,000 requests per second or 5,000 concurrent requests, you
will receive a 429 Too Many Requests error response
• Upon catching such exceptions, the client can resubmit the failed requests in a
way that is rate limiting, while complying with the API Gateway throttling limits
Create a Service
Control Policy (SCP)
and attach to OU
VPCs can be in
different accounts
and Regions
VPC C VPC D
10.3.0.0/16 10.4.0.0/16
VPC Peering
connections are
NOT transitive –
full mesh required
© Digital Cloud Training | https://digitalcloud.training
VPC Peering
Management Account Production Account
An ENI is created in
the subnet
Each interface endpoint
VPC
can connect to one of
Private subnet AWS CloudFormation many AWS services
Bucket policies
can limit access to
EC2 Instance S3 Gateway Amazon S3 endpoint source
Endpoint
Route Table
Destination Target
pl-6ca54005 (com.amazonaws.ap-southeast-2.s3, 54.231.248.0/22, 54.231.252.0/24, 52.95.128.0/21) vpce-ID
How Uses DNS entries to redirect traffic Uses prefix lists in the route table to redirect
traffic
Which API Gateway, CloudFormation, Amazon S3, DynamoDB
services CloudWatch etc.
Security Security Groups VPC Endpoint Policies
VPC VPC
EC2 Instance
Endpoint
Web Server
Network Load
Balancer
Endpoint Service
Public subnet
Route Table
Destination Target
pl-6ca54005 (com.amazonaws.ap-southeast-2.s3, 54.231.248.0/22, 54.231.252.0/24, 52.95.128.0/21) vpce-ID
Region
VPC
Address is 8.1.2.1
Availability Zone
Public subnet
Attribute Description
enableDnsHostnames Determines whether the VPC supports assigning public DNS hostnames to
instances with public IP addresses.
If both DNS attributes are true, instances in the VPC get public DNS hostnames.
The default for this attribute is false unless the VPC is a default VPC or the VPC
was created using the VPC console wizard.
enableDnsSupport Determines whether the VPC supports DNS resolution through the Amazon
provided DNS server.
If this attribute is true, queries to the Amazon provided DNS server succeed.
The default for this attribute is true, no matter how the VPC is created.
simple.dctlabs.com A 1.1.1.1 60
2.2.2.2
simple2.dctlabs.com A 3.3.3.3 60
Amazon Route 53
2
Region
DNS query
20%
3
2.2.2.2
20%
Region – us-east-1
DNS query
1.1.1.1
2.2.2.2
Region – ap-southeast-2
New York
Sydney
DNS query
ALB
DNS query
Region – us-east-1
Region – ap-southeast-2
ap-southeast-2 is the
secondary Region
ALB
Region – us-east-1
Mexico
2.2.2.2
DNS query
Region – ap-southeast-2
New Zealand
ALB
DNS query
2
Region
DNS query
Route 53
Resolver
© Digital Cloud Training | https://digitalcloud.training
DHCP Option Sets
DHCP Options sets support the following options:
• domain-name-servers –
• The IP addresses of up to four IPv4 domain name servers (or up to three
IPv4 domain name servers and "AmazonProvidedDNS") and four IPv6
domain name servers.
• The IPv4 address of the Amazon provided DNS server is 169.254.169.253 (or
the .2 subnet address) and the IPv6 address is fd00:ec2::253
• domain-name - the custom domain name for your instances
• ntp-servers - the IP addresses of up to eight Network Time
Protocol (NTP) servers
• netbios-name-servers - the IP addresses of up to four NetBIOS
name servers
• netbios-node-type - the NetBIOS node type (1, 2, 4, or 8)
VPC
1
Amazon Route 53
Public subnet
2
DNS server
Private subnet VPN gateway VPN connection Customer
gateway
VPC
Amazon Route 53
Public subnet
3
Inbound Client
EC2 Instance
Endpoint
Result is returned by
Route 53 via the Inbound
Endpoint
Region
There are 12+ Global
Regional Edge Caches Users
CloudFront Origins
Edge location
4
Signed URLs should be used for Signed URL returned
individual files and clients that
don’t support cookies 2
1
Serverless
Mobile app authenticates to Application
application and requests
signed URL
© Digital Cloud Training | https://digitalcloud.training
CloudFront Signed Cookies
• Similar to Signed URLs
• Use signed cookies when you don’t want to change
URLs
• Can also be used when you want to provide access to
multiple restricted files (Signed URLs are for individual
files)
GET https://mybucket.s3.amazonaws.com/beach.jpg
Custom Header
Viewer Protocol
For CloudFront
certificate must be
issued in us-east-1
Certificate can be ACM or a
trusted third-party CA Default CF domain
name can be AWS Certificate
changed using Manager
CNAMES
S3 has its own certificate
Certificate can be ACM
(can’t be changed)
(ALB) or third-party (EC2)
Origin Protocol
Origin certificates
S3 Origin must be public
certificates Custom Origin
S3 Origin
Custom Origin
Users are
Requests are redirected to
routed to the another endpoint
optimal endpoint
AWS Global Network
Resolve dctlabs.com
Addresses:
51.45.2.12
53.58.31.89
Answer:
Users in US Edge location Global Accelerator
51.45.2.12 Amazon Route 53
53.58.31.89 Connect via Edge Location
us-east-1 ap-southeast-2
VPC
IPv4 CIDR 172.31.0.0/16
An Egress-only Internet
Gateway allows IPv6 traffic
All IPv6 addresses are
outbound but not inbound
publicly routable (no NAT)
AS400
AS300
20.0.4.0/24
20.0.3.0/24
Destination ASPATH
20.0.1.0/24 100 i
Destination ASPATH
20.0.2.0/24 200 i
20.0.3.0/24 300 i
20.0.4.0/24 400 i
20.0.2.0/24 200 i
20.0.1.0/24 300 100 i
© Digital Cloud Training | https://digitalcloud.training
Border Gateway Protocol (BGP)
AS100 AS200
20.0.1.0/24 20.0.2.0/24
Destination ASPATH
Destination ASPATH
20.0.1.0/24 100 i
20.0.2.0/24 200 i
20.0.3.0/24 300 i
20.0.3.0/24 200 300 i
20.0.3.0/24 300 300 300 i
Private subnet
VPC
CIDR 172.16.0.0/16
Private subnet
172.16.0.15
VPN VPN
Endpoint
10.0.5.12
EC2 Instance
CIDR 10.1.0.0/22
VPN client connects – performs SNAT
over SSL/TLS (443) to 10.0.0.0/16
Region
Assoc.
10.0.1.15
Amazon Workspaces
Assoc.
Private subnet – 10.0.5.0/24
VPN VPN
Endpoint
10.0.5.12
EC2 Instance
VPC
CIDR: 10.0.0.0/16
Public subnet
A VGW is deployed on Supports static routes
the AWS side of the or BGP peering/routing Corporate data center
connection
CIDR: 192.168.0.0/16
EC2 Instance
Virtual Private VPN connection OpenSwan / Internal Server
Gateway (VGW) CGW
Route Table Route Table
Virtual Private Gateway Propagate Destination Target
vgw-id Yes 10.0.0.0/16 openswan-instance-id
Customer gateway
Network traffic ASN: 6500
A VGW is
VPC
deployed on
Remote offices
Public subnet the AWS site
connect to the
Customer office VGW in a hub-and-
Customer gateway spoke model
ASN: 6501
Private subnet Virtual Private Network traffic
Gateway (VGW)
The customer
A DX port (1000-Base-LX or router is connected
10GBASE-LR) must be to the DX router in
allocated in a DX location the DX location
VGW
AWS Direct Customer / Customer
Connect partner router
endpoint
Router
VPC
VGW
VIFs can also be shared with
other AWS accounts –
known as hosted VIFs
VGW
An IPSec S2S VPN is
the backup path
Multiple SPOFs exist in Internet
this architecture, add
redundancy to eliminate
© Digital Cloud Training | https://digitalcloud.training
VPN Backup for Direct Connect
• If the same prefixes are being advertised for DX and
the S2S VPN, the VGW makes routing decisions as
follows (most preferred to least preferred):
• BGP propagated routes from an AWS Direct Connect
connection
• Manually added static routes for a Site-to-Site VPN
connection
• BGP propagated routes from a Site-to-Site VPN
connection
• For matching prefixes where each Site-to-Site VPN
connection uses BGP, the AS PATH is compared and the
prefix with the shortest AS PATH is preferred
• When the AS PATHs are the same length and if the first AS
in the AS_SEQUENCE is the same across multiple paths,
multi-exit discriminators (MEDs) are compared. The path
with the lowest MED value is preferred
Region
AWS Direct Connect location
Region
VGW DX
An IPSec S2S VPN is
VGW is required for established over a public VIF
terminating the VPN across the DX connection
Scenario Method
Connect directly at an AWS Connect directly to an AWS device from your router at an
Direct Connect location AWS Direct Connect location using 1 Gbps, 10 Gbps, or 100
Gbps connection
Connect from your premises Work with a partner in the AWS Partner Network (APN) or
a network provider that will help you connect a router
from your data center, office, or colocation environment to
an AWS Direct Connect location. The network provider
does not have to be a member of the APN to connect you
Connection hosted by an AWS Work with a partner in the AWS Partner Network (APN)
Direct Connect Partner who will create a hosted connection for you. Sign up for
AWS, and then follow the instructions to accept your
hosted connection
VGW
VGW
Region – us-west-1
The DX Gateway is
associated with a VGW
VGW
DX Location - US Corporate office
Private VIF
DX Gateway
VGW
Region – us-west-1
Network traffic
Region eu-central-1 Network traffic can be
routed from on-
premises to any VPC
VGW
VGW VGW
CGW
IPSec VPN
© Digital Cloud Training | https://digitalcloud.training
AWS Transit Gateway
Specify one subnet Example full mesh architecture with
from each AZ to AWS Transit Gateway
enable routing
VPC A within the AZ VPC B
Subnet Subnet
Subnet Subnet
Corporate office
VPC A VPC B
Subnet Subnet
Subnet Subnet
Corporate office
AWS cage Customer /
partner cage
Transit VIF
DX Gateway is
associated with the TGW
DX Gateway AWS Direct Customer / Customer
Connect partner router
endpoint
Router
VPC C VPC D
Subnet Subnet
A Transit VIF is used
when attaching via a DX
Subnet Subnet Gateway to a TGW
Subnet is shared
Public subnet into production
account
Participants can
Participants cannot view or create, modify, and
modify resources of other delete their own
participants or the VPC resources
owner
Public subnet
Public subnet
Instances
CloudFormation builds
Infrastructure patterns are VPC
your infrastructure
defined in a template file
according to the template
using code
Public subnet
Auto Scaling
AWS CloudFormation group
Public subnet
Component Description
Templates The JSON or YAML text file that contains the instructions for building out
the AWS environment
Stacks The entire environment described by the template and created, updated,
and deleted as a single unit
StackSets AWS CloudFormation StackSets extends the functionality of stacks by
enabling you to create, update, or delete stacks across multiple accounts
and regions with a single operation
Change Sets A summary of proposed changes to your stack that will allow you to see
how those changes might impact your existing resources before
implementing them
• CloudFormation reads the template and makes the API calls on your
behalf.
• An administrator account is the AWS account in which you create stack sets
• A target account is the account into which you create, update, or delete one or
more stacks in your stack set
• When you directly update a stack, you submit changes and AWS
CloudFormation immediately deploys them
• Use direct updates when you want to quickly deploy your updates
• With change sets, you can preview the changes AWS CloudFormation
will make to your stack, and then decide whether to apply those
changes
Network Security
Source owner Source VPC Target owner Target VPC Connectivity option
• Subnet
• Network interface
Send notifications
with SNS
Amazon EC2 AWS Config Amazon Simple
Notification Service
vpc-flow-logs-enabled Checks whether Amazon Virtual Private Cloud flow logs are
found and enabled for Amazon VPC
• Block – AWS WAF blocks the request and the AWS resource
responds with an HTTP 403 (Forbidden) status code
IP set match Inspects the request against a set of IP addresses and address ranges
Regex pattern set Compares regex patterns against a specified request component
SQLi attack Inspects for malicious SQL code in a specified request component
XSS scripting attack Inspects for cross-site scripting attacks in a specified request component
HTTPS Connection
User ALB
Encryption At Rest
Encryption Decryption
Encrypted
Plaintext data Plaintext data
data
Decryption
The same key is used
for both encryption
and decryption
Data encryption key
Region
AWS Direct Connect location
Region
VGW DX
An IPSec S2S VPN is
VGW is required for established over a public VIF
terminating the VPN across the DX connection
AWS KMS
• AWS KMS does not store, manage, or track your data keys,
Plaintext data key
Encryption
or perform cryptographic operations with data keys Algorithm
• You must use and manage data keys outside of AWS KMS
Encrypted data key
Type of KMS Key Can view Can manage Used only for my AWS account Automatic rotation
Customer managed key Yes Yes Yes Optional. Every 365 days
• You cannot enable or disable key rotation for AWS owned keys
• Automatic key rotation is supported only on symmetric encryption KMS keys
with key material that AWS KMS generates (Origin = AWS_KMS)
• You must then update your applications with the new key ID
• You can use an alias to represent a KMS key so you don’t need to modify your
application code
• For example:
• Make sure you know the differences between AWS managed and
customer managed KMS keys and automatic vs manual rotation
Amazon CloudWatch
ec2:RunInstances
EventBridge used to be
known as CloudWatch
Events
Event Sources Rules
AWS Services
Custom Apps
Events
Targets
Function requires
Amazon Elasticsearch
permissions to
Service
CloudWatch Logs
AWS Lambda AWS Lambda
© Digital Cloud Training | https://digitalcloud.training
Cross-Account Log Data Sharing
• Share CloudWatch Logs across accounts
• Kinesis Data Streams is the only supported destination
• Log data sender – sends log data to the recipient
• Log data recipient – sends data to a Kinesis Data stream
Account A
Region
Account C
Subscription
CloudWatch filter
Account B
Amazon Kinesis
Region
Data Stream
Subscription
CloudWatch filter
SNS Topic
Create a Trail for Metric filter used to
indefinite retention trigger CW Alarm
Account A
Region
Account C
Account B
Region S3 Bucket
Configure logging to
bucket in Account C
Type of KMS Key Can view Can manage Used only for my AWS account Automatic rotation
Customer managed key Yes Yes Yes Optional. Every 365 days