Book Image

AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

By : Ben Piper, David Clinton
Book Image

AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

By: Ben Piper, David Clinton

Overview of this book

AWS certifications validate the technical skills and knowledge required for building secure and reliable applications on the AWS cloud. The AWS Certified Cloud Practitioner certification is for individuals who have the knowledge and skills necessary to demonstrate an understanding of the AWS Cloud, independent of specific technical roles addressed by other AWS certifications. An AWS Certified Cloud Practitioner is a recommended path to achieving specialty certification or an optional start toward Associate certification. This guide provides a solid introduction and the resources you need to prove your knowledge in the exam. It covers all topics, beginning with what the AWS cloud and its basic global infrastructure and architectural principles. Other chapters dive into the technical, exploring core characteristics of deploying and operating in the AWS Cloud Platform, as well as basic security and compliance aspects and the shared security model. The text identifies sources of documentation or technical assistance, such as white papers or support tickets. The authors discuss the AWS Cloud value proposition and define billing, account management, and pricing models. This includes describing the key services AWS can provide and their common use cases such as compute, analytics, and so on. By the end of this book, you'll be thoroughly prepared for the foundational CLF-C01 exam.
Table of Contents (24 chapters)
Free Chapter
1
Cover
2
Acknowledgments
3
About the Authors
4
Table of Exercises
5
Introduction
6
Assessment Test
7
Answers to Assessment Test
20
Index
21
Advert
22
End User License Agreement

Summary

You should enforce the use of strong passwords by your users by creating a password policy in IAM. Ideally, you should also require multi-factor authentication (MFA).

Programmatic and command-line access to resources is authenticated using security credentials consisting of an access key ID and a secret access key. SSH access to EC2 Linux instances must be authenticated using a key pair generated by AWS—the private key must be installed on the client (user) computer.

You can efficiently control resource access for large numbers of users with different access needs through IAM groups. The principle of least privilege supports giving your users and groups only the minimum permissions they’ll need to do their jobs.

An IAM role is a set of permissions permitting access to a beneficiary process to a defined set of resources. This is an important tool for securely enabling functionality between parts of your AWS infrastructure.

You can review important information on...