Book Image

AWS Certified DevOps Engineer - Professional Certification and Beyond

By : Adam Book
Book Image

AWS Certified DevOps Engineer - Professional Certification and Beyond

By: Adam Book

Overview of this book

The AWS Certified DevOps Engineer certification is one of the highest AWS credentials, vastly recognized in cloud computing or software development industries. This book is an extensive guide to helping you strengthen your DevOps skills as you work with your AWS workloads on a day-to-day basis. You'll begin by learning how to create and deploy a workload using the AWS code suite of tools, and then move on to adding monitoring and fault tolerance to your workload. You'll explore enterprise scenarios that'll help you to understand various AWS tools and services. This book is packed with detailed explanations of essential concepts to help you get to grips with the domains needed to pass the DevOps professional exam. As you advance, you'll delve into AWS with the help of hands-on examples and practice questions to gain a holistic understanding of the services covered in the AWS DevOps professional exam. Throughout the book, you'll find real-world scenarios that you can easily incorporate in your daily activities when working with AWS, making you a valuable asset for any organization. By the end of this AWS certification book, you'll have gained the knowledge needed to pass the AWS Certified DevOps Engineer exam, and be able to implement different techniques for delivering each service in real-world scenarios.
Table of Contents (31 chapters)
1
Section 1: Establishing the Fundamentals
7
Section 2: Developing, Deploying, and Using Infrastructure as Code
16
Section 3: Monitoring and Logging Your Environment and Workloads
21
Section 4: Enabling Highly Available Workloads, Fault Tolerance, and Implementing Standards and Policies
27
Section 5: Exam Tips and Tricks

Seeing how to protect data intelligently with Amazon Macie

Organizations that are either moving to the cloud or have established a cloud presence over the past few years start to quickly accumulate data. In Chapter 17, Advanced and Enterprise Logging Scenarios, we discussed the importance of having a good system for data hygiene that includes tagging and metadata. And although this is the optimal solution, this is not always possible. The data that you create, acquire, and accumulate can fall into a range of sensitivity and classification levels. Once you get past the public level, access to that data from those who were not authorized to access it could be classified as a breach:

Figure 22.2 – An example of data classification levels

Not every organization takes the time to classify and categorize the information stored in their cloud. This can lead to a number of vulnerabilities, both internal and external. From an internal point of view, allowing...