Book Image

AWS for Solutions Architects

By : Alberto Artasanchez
3 (1)
Book Image

AWS for Solutions Architects

3 (1)
By: Alberto Artasanchez

Overview of this book

One of the most popular cloud platforms in the world, Amazon Web Services (AWS) offers hundreds of services with thousands of features to help you build scalable cloud solutions; however, it can be overwhelming to navigate the vast number of services and decide which ones best suit your requirements. Whether you are an application architect, enterprise architect, developer, or operations engineer, this book will take you through AWS architectural patterns and guide you in selecting the most appropriate services for your projects. AWS for Solutions Architects is a comprehensive guide that covers the essential concepts that you need to know for designing well-architected AWS solutions that solve the challenges organizations face daily. You'll get to grips with AWS architectural principles and patterns by implementing best practices and recommended techniques for real-world use cases. The book will show you how to enhance operational efficiency, security, reliability, performance, and cost-effectiveness using real-world examples. By the end of this AWS book, you'll have gained a clear understanding of how to design AWS architectures using the most appropriate services to meet your organization's technological and business requirements.
Table of Contents (20 chapters)
1
Section 1: Exploring AWS
4
Section 2: AWS Service Offerings and Use Cases
11
Section 3: Applying Architectural Patterns and Reference Architectures
17
Section 4: Hands-On Labs

Authenticating, authorizing, and managing users

Unless you are making the most basic microservice, the service you create will need to have a security wrapper around it to ensure that only authorized users can access it. Before we can determine whether a user is authorized to access a resource, we need to authenticate the user (make sure that they are who they say they are) – or, in other words:

  • Authentication verifies credentials.
  • Authorization verifies permissions.

As you can imagine, AWS has offerings to cover these requirements, many of which have been around since AWS first launched. Let's briefly review them.

AWS Identity and Access Management

AWS offers many varied services. One thing that they have in common is that they can all be managed and controlled to determine who can access them via the Identity and Access Management (IAM) service.

Like many other security frameworks and services, it establishes a series of components to enable...