0% found this document useful (0 votes)
81 views

Unit 5 Cloud Computing Overview RKS

This document provides an overview of cloud computing, including: 1) Cloud computing allows for sharing of resources over private or public networks to provide scalable infrastructure for applications, data, and file storage at a lower cost. 2) There are three cloud computing models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). 3) Cloud deployment models include public, private, hybrid, and externally hosted private clouds.

Uploaded by

mr yash
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Unit 5 Cloud Computing Overview RKS

This document provides an overview of cloud computing, including: 1) Cloud computing allows for sharing of resources over private or public networks to provide scalable infrastructure for applications, data, and file storage at a lower cost. 2) There are three cloud computing models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). 3) Cloud deployment models include public, private, hybrid, and externally hosted private clouds.

Uploaded by

mr yash
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CLOUD COMPUTING – An Overview

Abstract
Resource sharing in a pure plug and play model that dramatically
simplifies infrastructure planning is the promise of „cloud computing‟.
The two key advantages of this model are ease- of-use and cost-
effectiveness. Though there remain questions on aspects such as security
and vendor lock-in, the benefits this model offers are many.
• Realities and risks of the model
• Components in the model Characteristics and Usage of the model

An Overview

Cloud computing is a computing paradigm, where a large pool of systems are


connected in private or public networks, to provide dynamically scalable
infrastructure for application, data and file storage. With the advent of this
technology, the cost of computation, application hosting, content storage and
delivery is reduced significantly.
Cloud Computing Page 1 of 6
Cloud computing is a practical approach to experience direct cost benefits, and it
has the potential to transform a data center from a capital-intensive set up to a
variable priced environment.

The idea of cloud computing is based on a very fundamental principal of


reusability of IT capabilities. The difference that cloud computing brings compared
to traditional concepts of “grid computing”, “distributed computing”, “utility
computing”, or “autonomic computing” is to broaden horizons across
organizational boundaries.

Forrester defines cloud computing as:


“A pool of abstracted, highly scalable, and managed compute infrastructure
capable of hosting end- customer applications and billed by consumption.”

Figure 1: Conceptual view of cloud computing

Cloud Computing Page 2 of 6


Cloud Computing Models

Cloud Providers offer services that can be grouped into three categories.

1. Software as a Service (SaaS): In this model, a complete application is


offered to the customer, as a service on demand. A single instance of the
service runs on the cloud & multiple end users are serviced. On the
customers‟ side, there is no need for upfront investment in servers or
software licenses, while for the provider, the costs are lowered, since only a
single application needs to be hosted & maintained. Today SaaS is offered
by companies such as Google, Salesforce, Microsoft, Zoho, etc.

2. Platform as a Service (Paas): Here, a layer of software, or development


environment is encapsulated & offered as a service, upon which other higher
levels of service can be built. The customer has the freedom to build his own
applications, which run on the provider‟s infrastructure. To meet
manageability and scalability requirements of the applications, PaaS
providers offer a predefined combination of OS and application servers, such
as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby
etc. Google‟s App Engine, Force.com, etc are some of the popular PaaS
examples.

3. Infrastructure as a Service (Iaas): IaaS provides basic storage and


computing capabilities as standardized services over the network. Servers,
storage systems, networking equipment, data centre space etc. are pooled
and made available to handle workloads. The customer would typically
deploy his own software on the infrastructure. Some common examples are
Amazon, GoGrid, 3 Tera, etc.

Cloud Computing Page 3 of 6


Figure 2: Cloud models

Cloud computing deployment models/Types of cloud Computing


There are several different ways in which cloud computing services can be
deployed.

It is often useful to define and describe the different types of cloud services
deployment methods:

Enterprises can choose to deploy applications on Public, Private or


Hybrid clouds. Cloud Integrators can play a vital part in determining the right
cloud path for each organization.

Public Cloud

Public clouds are owned and operated by third parties; they deliver superior
economies of scale to customers, as the infrastructure costs are spread among a mix
of users, giving each individual client an attractive low-cost, “Pay-as-you-go”
model. All customers share the same infrastructure pool with limited
configuration, security protections, and availability variances. These are managed
and supported by the cloud provider. One of the advantages of a Public cloud is
that they may be larger than an enterprises cloud, thus providing the ability to scale

Cloud Computing Page 4 of 6


seamlessly, on demand.
Private Cloud
Private clouds are built exclusively for a single enterprise. They aim to address
concerns on data security and offer greater control, which is typically lacking in a
public cloud. There are two variations to a private cloud:
- On-premise Private Cloud: On-premise private clouds, also known as
internal clouds are hosted within one‟s own data center. This model
provides a more standardized process and protection, but is limited in
aspects of size and scalability. IT departments would also need to incur the
capital and operational costs for the physical resources. This is best suited
for applications which require complete control and configurability of the
infrastructure and security.

- Externally hosted Private Cloud: This type of private cloud is hosted


externally with a cloud provider, where the provider facilitates an exclusive
cloud environment with full guarantee of privacy. This is best suited for
enterprises that don‟t prefer a public cloud due to sharing of physical
resources.
Hybrid Cloud

Hybrid Clouds combine both public and private cloud models. With a Hybrid
Cloud, service providers can utilize 3rd party Cloud Providers in a full or partial
manner thus increasing theflexibility of computing. The Hybrid cloud environment
is capable of providing on-demand, externally provisioned scale. The ability to
augment a private cloud with the resources of a public cloud can be used to
manage any unexpected surges in workload.

Cloud Computing Architecture

Cloud Computing Architecture is a combination of components required for a


Cloud Computing service. A Cloud computing architecture consists of several
components like a front-end platform, a back-end platform or servers, a network or
internet service, and a cloud based delivery service.

Let’s have a look into Cloud Computing and see what Cloud Computing is made of.
Cloud computing comprises of two components front end and back end. Front end
Cloud Computing Page 5 of 6
consist client part of cloud computing system. It comprise of interfaces and
applications that are required to access the Cloud Computing or Cloud
Programming platform.

Cloud Computing Architecture


While back end refers to the cloud itself, it comprises of the resources that are
required for cloud computing services. It consists of virtual machines, servers, data
storage, security mechanism etc. It is under providers control.

Cloud computing distributes the file system that spreads over multiple hard disks
and machines. Data is never stored in one place only and in case one unit fails the
other will take over automatically. The user disk space is allocated on the distributed
file system, while another important component is algorithm for resource allocation.
Cloud computing is a strong distributed environment and it heavily depends upon
strong algorithm.

Cloud Computing Benefits

Enterprises would need to align their applications, so as to exploit the architecture


models that Cloud Computing offers. Some of the typical benefits are listed below:

1. Reduced Cost

There are a number of reasons to attribute Cloud technology with lower


costs. The billing model is pay as per usage; the infrastructure is not

Cloud Computing Page 6 of 6


purchased thus lowering maintenance. Initial expense and recurring
expenses are much lower than traditionalcomputing.

2. Increased Storage

With the massive Infrastructure that is offered by Cloud providers today,


storage & maintenance of large volumes of data is a reality. Sudden
workload spikes are also managed effectively & efficiently, since the cloud
can scale dynamically.

3. Flexibility

This is an extremely important characteristic. With enterprises having to


adapt, even more rapidly, to changing business conditions, speed to deliver
is critical. Cloud computing stresses on getting applications to market very
quickly, by using the most appropriate building blocks necessary for
deployment.

Cloud Computing Challenges

Despite its growing influence, concerns regarding cloud computing still remain. In
our opinion, the benefits outweigh the drawbacks and the model is worth
exploring. Some common challenges are:

1. Data Protection

Data Security is a crucial element that warrants scrutiny. Enterprises are


reluctant to buy an assurance of business data security from vendors. They
fear losing data to competition and the data confidentiality of consumers. In
many instances, the actual storage location is not disclosed, adding onto the
security concerns of enterprises. In the existing models, firewalls across data
centers (owned by enterprises) protect this sensitive information. In the cloud
model, Service providers are responsible for maintaining data security and
enterprises would have to rely on them.

2. Data Recovery and Availability

All business applications have Service level agreements that are stringently
followed. Operational teams play a key role in management of service level

Cloud Computing Page 7 of 6


agreements and runtime governance of applications. In production
environments, operational teams support

Appropriate clustering and Fail


overData Replication
System monitoring (Transactions monitoring, logs monitoring and
others)Maintenance (Runtime Governance)
Disaster recovery
Capacity and performance management
If, any of the above mentioned services is under-served by a cloud provider,
the damage & impact could be severe.

3. Management Capabilities
Despite there being multiple cloud providers, the management of platform
and infrastructure is still in its infancy. Features like „Auto-scaling‟ for
example, are a crucial requirement for many enterprises. There is huge
potential to improve on the scalability and load balancing features provided
today.

4. Regulatory and Compliance Restrictions

In some of the European countries, Government regulations do not allow


customer's personal information and other sensitive information to be
physically located outside the state or country. In order to meet such
requirements, cloud providers need to setup a data center or a storage site
exclusively within the country to comply with regulations. Having such an
infrastructure may not always be feasible and is a big challenge for cloud
providers.
With cloud computing, the action moves to the interface — that is, to the interface
between service suppliers and multiple groups of service consumers. Cloud
services will demand expertise in distributed services, procurement, risk
assessment and service negotiation — areas that many enterprises are only
modestly equipped to handle.

Cloud Computing Technologies

A list of cloud computing technologies are given below -

Cloud Computing Page 8 of 6


Virtualization
Service-Oriented Architecture (SOA)
Grid Computing
Utility Computing
Virtualization

Virtualization is the process of creating a virtual environment to run multiple


applications and operating systems on the same server. The virtual environment can be
anything, such as a single instance or a combination of many operating systems, storage
devices, network application servers, and other environments.

The concept of Virtualization in cloud computing increases the use of virtual machines.
A virtual machine is a software computer or software program that not only works as a
physical computer but can also function as a physical machine and perform tasks such
as running applications or programs as per the user's demand.

Types of Virtualization

A list of types of Virtualization is given below -

i. Hardware virtualization
ii. Server virtualization
iii. Storage virtualization
iv. Operating system virtualization
v. Data Virtualization

Service-Oriented Architecture (SOA)

Service-Oriented Architecture (SOA) allows organizations to access on-demand cloud-


based computing solutions according to the change of business needs. It can work
without or with cloud computing. The advantages of using SOA is that it is easy to
maintain, platform independent, and highly scalable.

Service Provider and Service consumer are the two major roles within SOA.

Applications of Service-Oriented Architecture

There are the following applications of Service-Oriented Architecture -

Cloud Computing Page 9 of 6


o It is used in the healthcare industry.
o It is used to create many mobile applications and games.
o In the air force, SOA infrastructure is used to deploy situational awareness
systems.

The service-oriented architecture is shown below:

Grid Computing

Grid computing is also known as distributed computing. It is a processor architecture


that combines various different computing resources from multiple locations to achieve
a common goal. In grid computing, the grid is connected by parallel nodes to form a
computer cluster. These computer clusters are in different sizes and can run on any
operating system.

Grid computing contains the following three types of machines -

1. Control Node: It is a group of server which administrates the whole network.


2. Provider: It is a computer which contributes its resources in the network
resource pool.
3. User: It is a computer which uses the resources on the network.

Mainly, grid computing is used in the ATMs, back-end


infrastructures, and marketing research.

Utility Computing

Utility computing is the most trending IT service model. It provides on-demand


computing resources (computation, storage, and programming services via API) and
infrastructure based on the pay per use method. It minimizes the associated costs and
maximizes the efficient use of resources. The advantage of utility computing is that it
reduced the IT cost, provides greater flexibility, and easier to manage.

Large organizations such as Google and Amazon established their own utility services
for computing storage and application.

Cloud Computing Applications

Cloud Computing Page 10 of


6
Cloud service providers provide various applications in the field of art, business, data
storage and backup services, education, entertainment, management, social
networking, etc.

The most widely used cloud computing applications are given below -

1. Art Applications
Cloud computing offers various art applications for quickly and easily design attractive
cards, booklets, and images. Some most commonly used cloud art applications are
given below:
i Moo.
ii. Vistaprint
iii. Adobe Creative Cloud

2. Business Applications
Business applications are based on cloud service providers. Today, every organization
requires the cloud business application to grow their business. It also ensures that
business applications are 24*7 available to users.
There are the following business applications of cloud computing -
i. MailChimp
MailChimp is an email publishing platform which provides various options to design,
send, and save templates for emails.
iii. Salesforce
Salesforce platform provides tools for sales, service, marketing, e-commerce, and more.
It also provides a cloud development platform.
iv. Chatter
Chatter helps us to share important information about the organization in real time.
v. Bitrix24
Bitrix24 is a collaboration platform which provides communication, management, and
social collaboration tools.

Cloud Computing Page 11 of


6
vi. Paypal
Paypal offers the simplest and easiest online payment mode using a secure internet
account. Paypal accepts the payment through debit cards, credit cards, and also from
Paypal account holders.
vii. Slack
Slack stands for Searchable Log of all Conversation and Knowledge. It provides
a user-friendly interface that helps us to create public and private channels for
communication.

3. Data Storage and Backup Applications


Cloud computing allows us to store information (data, files, images, audios, and videos)
on the cloud and access this information using an internet connection. As the cloud
provider is responsible for providing security, so they offer various backup recovery
application for retrieving the lost data.

4. Education Applications
Cloud computing in the education sector becomes very popular. It offers various online
distance learning platforms and student information portals to the students. The
advantage of using cloud in the field of education is that it offers strong virtual
classroom environments, Ease of accessibility, secure data storage, scalability, greater
reach for the students, and minimal hardware requirements for the applications.
5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact with the target audience.
Cloud computing offers various entertainment applications such as online games and
video conferencing.

6. Management Applications
Cloud computing offers various cloud management tools which help admins to manage
all types of cloud activities, such as resource deployment, data integration, and disaster
recovery. These management tools also provide administrative control over the
platforms, applications, and infrastructure.
Some important management applications are -
i. Toggl
Toggl helps users to track allocated time period for a particular project.
ii. Evernote
Evernote allows you to sync and save your recorded notes, typed notes, and other notes
in one convenient place. It is available for both free as well as a paid version.
It uses platforms like Windows, macOS, Android, iOS, Browser, and Unix.
iii. GoToMeeting

Cloud Computing Page 12 of


6
GoToMeeting provides Video Conferencing and online meeting apps, which allows
you to start a meeting with your business partners from anytime, anywhere using mobile
phones or tablets. Using GoToMeeting app, you can perform the tasks related to the
management such as join meetings in seconds, view presentations on the shared screen,
get alerts for upcoming meetings, etc.

7. Social Applications
Social cloud applications allow a large number of users to connect with each other using
social networking applications such as Facebook, Twitter, Linkedln, etc.

AWS SERVICES
There are over 200 fully-featured services within the Amazon Web Services (AWS)
ecosystem. AWS Elastic Compute Cloud (EC2), Elastic Container Service (ECS),
Amazon Lambda, and AWS Simple Storage Service (Amazon S3) are some of the most
critical services you should become familiar with.

The benefits they provide may seem to overlap sometimes. But each service has unique
capabilities that you may want to use in some cases and not so much in others.

EC2
o EC2 stands for Amazon Elastic Compute Cloud.
o Amazon EC2 is a web service that provides resizable compute capacity in the
cloud.
o Amazon EC2 reduces the time required to obtain and boot new user instances to
minutes rather than in older days, if you need a server then you had to put a
purchase order, and cabling is done to get a new server which is a very time-
consuming process. Now, Amazon has provided an EC2 which is a virtual
machine in the cloud that completely changes the industry.
o You can scale the compute capacity up and down as per the computing
requirement changes.
o Amazon EC2 changes the economics of computing by allowing you to pay only
for the resources that you actually use. Rather than you previously buy physical
servers, you would look for a server that has more CPU capacity, RAM capacity
and you buy a server over 5 year term, so you have to plan for 5 years in advance.
People spend a lot of capital in such investments. EC2 allows you to pay for the
capacity that you actually use.

Cloud Computing Page 13 of


6
o Amazon EC2 provides the developers with the tools to build resilient applications
that isolate themselves from some common scenarios.

What is Lambda?
o Lambda is used to encapsulate Data centres, Hardware, Assembly code/Protocols,
high-level languages, operating systems, AWS APIs.
o Lambda is a compute service where you can upload your code and create the
Lambda function.
o Lambda takes care of provisioning and managing the servers used to run the
code.
o While using Lambda, you don't have to worry about scaling, patching, operating
systems, etc.

Lambda can be used in the following ways:

o It can be used as an event-driven compute service where AWS Lambda runs your
code in response to events. These events could be changes to data in an Amazon
S3 bucket or an Amazon DynamoDB table.
o It can be used as a compute service to run your code in response to HTTP
requests using Amazon API calls made using AWS SDKs.

What is IAM?
o IAM stands for Identity Access Management.
o IAM allows you to manage users and their level of access to the aws console.
o It is used to set users, permissions and roles. It allows you to grant access to the
different parts of the aws platform.
o AWS Identity and Access Management is a web service that enables Amazon
Web Services (AWS) customers to manage users and user permissions in AWS.
o With IAM, Organizations can centrally manage users, security credentials such as
access keys, and permissions that control which AWS resources users can access.
o Without IAM, Organizations with multiple users must either create multiple user
accounts, each with its own billing and subscriptions to AWS products or share
an account with a single security credential. Without IAM, you also don't have
control about the tasks that the users can do.
Cloud Computing Page 14 of
6
o IAM enables the organization to create multiple users, each with its own security
credentials, controlled and billed to a single aws account. IAM allows the user to
do only what they need to do as a part of the user's job.

Features of IAM
o Centralised control of your AWS account: You can control creation, rotation,
and cancellation of each user's security credentials. You can also control what
data in the aws system users can access and how they can access.
o Shared Access to your AWS account: Users can share the resources for the
collaborative projects.
o Granular permissions: It is used to set a permission that user can use a
particular service but not other services.
o Identity Federation: An Identity Federation means that we can use Facebook,
Active Directory, LinkedIn, etc with IAM. Users can log in to the AWS Console
with same username and password as we log in with the Active Directory,
Facebook, etc.
o Multifactor Authentication: An AWS provides multifactor authentication as we
need to enter the username, password, and security check code to log in to the
AWS Management Console.
o Permissions based on Organizational groups: Users can be restricted to the
AWS access based on their job duties, for example, admin, developer, etc.
o Networking controls: IAM also ensures that the users can access the AWS
resources within the organization's corporate network.
o Provide temporary access for users/devices and services where necessary: If
you are using a mobile app and storing the data in AWS account, you can do this
only when you are using temporary access.
o Integrates with many different aws services: IAM is integrated with many
different aws services.
o Supports PCI DSS Compliance: PCI DSS (Payment Card Industry Data
Security Standard) is a compliance framework. If you are taking credit card
information, then you need to pay for compliance with the framework.

Cloud Computing Page 15 of


6
o Eventually Consistent: IAM service is eventually consistent as it achieves high
availability by replicating the data across multiple servers within the Amazon's
data center around the world.
o Free to use: AWS IAM is a feature of AWS account which is offered at no
additional charge. You will be charged only when you access other AWS services
by using IAM user.

What is S3?
o S3 is a safe place to store the files.
o It is Object-based storage, i.e., you can store the images, word files, pdf files, etc.
o The files which are stored in S3 can be from 0 Bytes to 5 TB.
o It has unlimited storage means that you can store the data as much you want.
o Files are stored in Bucket. A bucket is like a folder available in S3 that stores the
files.
o S3 is a universal namespace, i.e., the names must be unique globally. Bucket
contains a DNS address. Therefore, the bucket must contain a unique name to
generate a unique DNS address.
o If you create a bucket, URL look like:

o
o If you upload a file to S3 bucket, then you will receive an HTTP 200 code means
that the uploading of a file is successful.

Advantages of Amazon S3

o Create Buckets: Firstly, we create a bucket and provide a name to the bucket.
Buckets are the containers in S3 that stores the data. Buckets must have a unique
name to generate a unique DNS address.

o Storing data in buckets: Bucket can be used to store an infinite amount of data.
You can upload the files as much you want into an Amazon S3 bucket, i.e., there
is no maximum limit to store the files. Each object can contain upto 5 TB of data.

Cloud Computing Page 16 of


6
Each object can be stored and retrieved by using a unique developer assigned-
key.
o Download data: You can also download your data from a bucket and can also
give permission to others to download the same data. You can download the data
at any time whenever you want.
o Permissions: You can also grant or deny access to others who want to download
or upload the data from your Amazon S3 bucket. Authentication mechanism
keeps the data secure from unauthorized access.
o Standard interfaces: S3 is used with the standard interfaces REST and SOAP
interfaces which are designed in such a way that they can work with any
development toolkit.
o Security: Amazon S3 offers security features by protecting unauthorized users
from accessing your data.

What is VPC
o VPC stands for Virtual Private Cloud.
o Amazon Virtual Private Cloud (Amazon VPC) provides a logically isolated area
of the AWS cloud where you can launch AWS resources in a virtual network that
you define.
o You have complete control over your virtual networking environment, including
a selection of your IP address range, the creation of subnets, and configuration of
route tables and network gateways.
o You can easily customize the network configuration for your Amazon Virtual
Private Cloud. For example, you can create a public-facing subnet for web
servers that can access to the internet and can also place your backend system
such as databases or application servers to a private-facing subnet.
o You can provide multiple layers of security, including security groups and
network access control lists, to help control access to Amazon EC2 instances in
each subnet.

What can we do with a VPC?

Cloud Computing Page 17 of


6
o Launch instances in a subnet of your choosing. We can choose our own subnet
addressing.
o We can assign custom IP address ranges in each subnet.
o We can configure route tables between subnets.
o We can create an internet gateway and attach it to our VPC.
o It provides much better security control over your AWS resources.
o We can assign security groups to individual instances.
o We also have subnet network access control lists (ACLS).

AWS Security Services


Below is a breakdown of what security services AWS offers and what purposes those
services serve.
Data Protection
Data protection services are required to keep your data secure and ensure that data is not
lost during transfer or corrupted in storage. These services typically include features for
encryption, data duplication, and data monitoring.
Services offered by AWS include:
• AWS Secrets Manager
• AWS Certificate Manager
• AWS CloudHSM (hardware security module)
• AWS Key Management Service (KMS)
• Amazon Macie
Identity and Access Management
Identity services enable you to define credentials, distribute and limit privileges,
manage user and application roles, and identify users. These services enable you to
control what resources users and applications can access and how they can manipulate
them.
Services offered by AWS include:

Cloud Computing Page 18 of


6
• AWS Single Sign-On (SSO)
• Amazon Cognito
• AWS Resource Access Manager
• AWS Directory Service
• AWS Identity and Access Management (IAM)
Infrastructure Protection
Infrastructure protection services enable you to manage the security of configurable
infrastructure, such as network connections. Most infrastructure in AWS is managed
and secured for you, however.
Services offered by AWS include:
• AWS Firewall Manager
• AWS Web Application Firewall (WAF)
• AWS Shield
Threat Detection and Continuous Monitoring
Threat detection and monitoring services provide visibility into your deployment
operations and help you identify suspicious events. These tools can also help you ensure
that performance standards are maintained and provide insight for optimizations.
Services offered by AWS include:
• AWS CloudTrail
• Amazon Inspector
• AWS Security Hub
• AWS Config
• Amazon GuardDuty
• AWS IoT Device Defender
Compliance and Data Privacy
Compliance and data privacy tools enable you to ensure that you are meeting
compliance standards and maintain the security of sensitive information. These services
Cloud Computing Page 19 of
6
require you to understand what regulations apply to your data and what those
regulations require.
Services offered by AWS include:
• AWS Artifact

What is AWS Managed Services?


AMS is an enterprise service that provides ongoing management of your AWS
infrastructure.
AMS provides full-lifecycle services to provision, run, and support your infrastructure,
and automates common activities such as change requests, monitoring, patch
management, security, and backup services. AMS enforces your corporate and security
infrastructure policies, and enables you to develop solutions and applications using your
preferred development approach.

AMS features
AWS Managed Services (AMS) offers the following features for supported AWS
services:

• Logging, Monitoring, Guardrails, and Event Management:


AMS configures and monitors your managed environment for logging activity
and defines alerts based on a variety of health checks. Alerts are investigated by
AMS for applicable AWS services, and those that negatively impact your usage
of those services result in the creation of incidents. AMS aggregates and stores all
logs generated as a result of all operations in CloudWatch, CloudTrail, and
system logs in S3. Upon request, you can ask for additional alerts to be put in
place
• Continuity management (Backup and Restore):
AMS provides backups of resources using standard, existing AWS Backup
functionality on a scheduled interval determined by you. Restore actions from
specific snapshots can be performed by AMS with your RFC.
• Security and access management:

Cloud Computing Page 20 of


6
AMS provides endpoint security (EPS) such as configuring anti-virus and anti-
malware protection. You can also use your own EPS tool and processes and not
use AMS for EPS using a feature called bring your own EPS (BYOEPS).
AMS includes endpoint security (EPS), which is inclusive of antivirus (AV), and
anti-malware protection, malware and intrusion detection (Trend Micro).
• Patch management:
AMS applies and installs updates to EC2 instances for supported operating
systems (OSs) and software pre-installed with supported operating systems.
AMS offers two models for patching:
o AMS standard patch for traditional account-based patching, and
o AMS Patch Orchestrator, for tag-based patching.
• Change management:
AMS change management is the mechanism for you to control changes in your
managed environment. AMS uses a combination of preventative and detective
controls to facilitate this process and provides different level of control and
associated risk depending on the AMS mode selected.
• Automated and self-service provisioning management:
You can provision AWS resources on AMS Advanced in several ways:
o Submit provisioning and configuration Requests for Change (RFCs)
o Deploy through AWS Service Catalog
o Deploy through Direct Change mode
o Deploy through Developer mode. Remember that the resources created
through the Developer mode are not managed by AMS.
o Configure AWS services directly using self-service provisioning for select
AWS services (see Supported AWS services).
• Incident management:
AMS proactively notifies you of incidents detected by AMS. AMS responds to
both customer-submitted and AMS-generated incidents and resolves incidents
based on the incident priority
• Problem management:
AMS performs trend analysis to identify and investigate problems and to identify
the root cause. Problems are remediated either with a workaround or a permanent
solution that prevents recurrence of similar future service impact.

Cloud Computing Page 21 of


6
• Service request management :
You can request information about your managed environment, AMS, or AWS
service offerings by submitting service requests using the AMS interface. Service
request types also include "How to" questions about AWS services and features,
troubleshooting API issues, and technical support cases.
• Firewall management:
AMS provides an optional managed firewall solution for Supported Firewall
Services, which enables internet-bound egress traffic filtering for networks in
your managed environment. This excludes public-facing services that do not use
the AWS network infrastructure and whose traffic goes directly to the internet.
Sample Questions
1. Define cloud computing?
2. What are the different types of deployment model in cloud?
3. What are the various services in cloud computing?
4. Mention some real-life Applications of cloud computing?
5. What is Virtualization?
6. What are the advantages of cloud computing?
7. Explain the various services in AWS management Services.
8. Explain the security services provided by AWS.
9. Write a short note on EC2?

Cloud Computing Page 22 of


6

You might also like