You are on page 1of 1

Region- geographical isolated area(33), us-east1 geographic location worldwide where different

datacenter are clustered. Each datacenter has redundant, electricity, cooling, heating, networking and
connectivity.

Availability zones(105)- one or more individually separate and distinct datacentres with redundant
power, networking, connectivity in an AWS Region. An Availability Zones (AZ) is a group of data centres.

Data center – physical facilities housing a vast array of servers, networking equipment, and storage
systems. Data centers are designed to provide a secure and controlled environment for storing and
processing data

Edge location - These are mini data center's that are available across all the cities in the world. Edge
Locations are located at other locations from regions. They store copies of stuff– videos, music, and
more. When user want something, AWS grabs it from the nearest pit stop, and deliver the content faster

IAM- enables the user to securely control access to AWS services and resources for the users.

Users – unique individual entity(),

Roles - used to provide permissions to entities that you trust within your AWS account. Roles are
users in another account. Roles are similar to users but with roles you do not need to create any
username and password to work with the resources.,

Groups - groups are collections of IAM users. They allow you to group users with similar
permissions and manage their access collectively,

Policies - Policies are permissions that you can attach to the users that you create. These policies
will contain that access that you have provided to the users that you have created.

Access Control List - Grant/Deny permission to specific ensuring that only authorized users and
systems have access to resources and data, while also enforcing security policies and compliance
requirements.

MFA - : Multi factor Authentication can add an extra layer of security to your infrastructure by
adding a second method of authentication beyond just password or access key.

Best practices – least privileges, security, logging

You might also like