forked from Ernyoke/certified-aws-devops-professional
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Adjustments; notes for amazon data lifecycle manager; new content for…
… Machie.
- Loading branch information
Showing
8 changed files
with
54 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
21 changes: 21 additions & 0 deletions
21
03-resilient-cloud-solutions/amazon-data-lifecycle-manager.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
# Amazon Data Lifecycle Manager | ||
|
||
- We can use Amazon Data Lifecycle Manager to automate the creation, retention, and deletion of EBS snapshots and EBS-backed AMIs | ||
- When we automate snapshot and AMI management, it helps us to: | ||
- Protect valuable data by enforcing a regular backup schedule | ||
- Create standardized AMIs that can be refreshed at regular intervals | ||
- Retain backups as required by auditors or internal compliance | ||
- Reduce storage costs by deleting outdated backups. | ||
- Create disaster recovery backup policies that back up data to isolated Regions or accounts | ||
|
||
## Policies | ||
|
||
- With Amazon Data Lifecycle Manager, we create policies to define your backup creation and retention requirements | ||
- These policies typically specify the following: | ||
- Policy type — Defines the type of backup resources that the policy manages (snapshots or EBS-backed AMIs) | ||
- Target resources — Defines the type of resources that are targeted by the policy (instances or EBS volumes) | ||
- Creation frequency — Defines how often the policy runs and creates snapshots or AMIs | ||
- Retention threshold — Defines how long the policy retains snapshots or AMIs after creation | ||
- Additional actions — Defines additional actions that the policy should perform, such as cross-Region copying, archiving, or resource tagging | ||
- Default policies: back up all volumes and instances in a Region that do not have recent backups | ||
- Custom policies: target specific resources based on their assigned tags and support advanced features, such as fast snapshot restore, snapshot archiving, cross-account copying, and pre and post scripts |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,27 @@ | ||
# Amazon Macie | ||
|
||
- Macie is a data visibility security service which helps classify and protect sensitive and business-critical content | ||
- It has 1Gb free tier for analyzing data | ||
- Provides a dashboard with results group by severity | ||
- Provides alerts for findings and additional information about it | ||
- Provides integration with multiple accounts | ||
- A security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS | ||
- Macie recognizes sensitive data such as personally identifiable information (PII) or intellectual property | ||
- Amazon Macie allows you to achieve the following: | ||
- Identify and protect various data types, including PII, PHI, regulatory documents, API keys, and secret keys | ||
- Verify compliance with automated logs that allow for instant auditing | ||
- Identify changes to policies and access control lists | ||
- Receive notifications when data and account credentials leave protected zones | ||
- Detect when large quantities of business-critical documents are shared internally and externally | ||
|
||
## Concepts | ||
|
||
- Data source is the origin or location of a set of data: | ||
- AWS CloudTrail event logs and errors, including Amazon S3 object-level API activity | ||
- Amazon S3 objects: we can integrate Macie with our S3 buckets and/or specify S3 prefixes | ||
- User, in the context of Macie, a user is the AWS Identity and Access Management (IAM) identity that makes the request | ||
- There are certain file formats that Macie does not support, such as wav files | ||
- Once Macie begins monitoring your data, it uses several automatic content classification methods to identify and prioritize your sensitive and critical data and to accurately assign business value to our data | ||
- Each classification has a designated risk level between 1 and 10, with 10 being the highest risk and 1 being the lowest | ||
- Classification methods: | ||
- Content Type Classification | ||
- File Extension Classification | ||
- Theme Classification | ||
- Regex Classification | ||
- PII Classification | ||
- Support Vector Machine–Based Classifier |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters