unit 4 & 5 easy notes
unit 4 & 5 easy notes
● Google manages all infrastructure needs, allowing developers to focus on writing code.
● Supports languages like Python, Java, Node.js, Go, Ruby, PHP, and .NET.
3. Application Diagnostics
4. Security Features
5. Traffic Splitting
6. Versioning
7. Custom Runtimes
8. API Selection
● GAE Cloud Storage: Reads and writes files during app runtime.
Capabilities
1. Standard Environment
● Provides access to Google Cloud APIs (Cloud Storage, Cloud SQL, etc.).
2. Flexible Environment
● Can access Google Cloud project resources within Google Compute Engine.
Google App Engine is a powerful platform for building and deploying scalable applications
with minimal infrastructure management. Whether using the Standard or Flexible
Environment, developers can optimize their apps for performance, security, and cost efficiency.
The Amazon Web Services (AWS) platform provides more than 200 fully featured services
from data centers located all over the world. It is the world's most comprehensive cloud
platform offering scalable and cost-effective cloud computing solutions. AWS is widely
adopted for on-demand operations such as compute power, database storage, content
delivery, and more to help organizations scale and grow.
AWS works in multiple configurations based on user requirements. Users can view the type of
configuration used and the corresponding server map for AWS services.
● Compute Service
● Storage
● Database
● Networking & Content Delivery
● Security Tools
● Developer Tools
● Management Tools
Compute Service
These services help developers build, deploy, and scale applications in the cloud.
AWS EC2
● Offers various instance types for CPU, memory, storage, and networking
configurations.
AWS Lambda
Storage Services
AWS offers cloud-based storage solutions with high durability and disaster recovery
capabilities.
Amazon S3
Amazon EBS
● Used primarily by Amazon EC2 instances for file, database, and block-level storage.
Database Services
AWS offers cost-efficient, secure, and scalable database solutions.
DynamoDB
Amazon VPC
Amazon Route 53
● A highly available DNS service that translates domain names into IP addresses.
Developer Tools
These tools help developers build, deploy, and manage applications seamlessly.
AWS CodeStar
AWS CodeBuild
● Enables users to create and manage encryption keys for data protection.
Management Tools
AWS provides tools for cost optimization, risk management, and automation.
Amazon CloudWatch
AWS CloudFormation
● No long-term commitments.
● AWS Free Tier offers free services across 58 AWS products to help users explore the
platform.
Applications of AWS
AWS is widely used for various applications, including:
1. Storage & Backup
● Businesses use AWS for file storage, indexing, and critical business applications.
2. Website Hosting
3. Gaming
● AWS provides the necessary compute power for seamless gaming experiences.
● AWS helps companies build and scale mobile, e-commerce, and SaaS applications.
9. Game Development
● AWS provides backend services, analytics, and hosting for game development.
Advantages of AWS
1. User-friendly programming model and architecture.
● Netflix
● Intuit
● Coinbase
● Finra
● Capital One
● Adobe
● Airbnb
● AOL
● Hitachi
With this, we conclude the comprehensive overview of Amazon Web Services (AWS).
Here is a neatly formatted and easy-to-study version of the key points about Microsoft Azure:
Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing
platform. It provides a broad range of cloud services, including compute, analytics, storage and
networking. Users can pick and choose from these services to develop and scale new
applications or run existing applications in the public cloud.
● Pay-as-you-go (PAYG) pricing model—users pay only for what they use.
● Users subscribe to Azure and get access to its services via the Azure portal.
● Can create and manage virtual machines (VMs), databases, and cloud-based
resources.
6. Metric Collection & Storage – Collect and store performance metrics.
7. Virtual Hard Drives – Provides large data storage for VMs.
1. Compute
2. Mobile
3. Web
4. Storage
5. Analytics
● Provides real-time analytics, big data, data lakes, ML, BI, IoT streams, data
warehousing.
6. Networking
8. Integration
9. Identity
10. IoT
11. DevOps
12. Development
13. Security
15. Containers
16. Databases
17. Migration
20. Blockchain
21. Intune
😊
This structured format makes it easy to study and remember. Let me know if you need further
simplifications!
Absolutely! Here's a simple explanation for those two topics, great for beginners:
✅ 11. DevOps (Development + Operations)
What it means:
DevOps is a set of practices that combines software development and IT operations. It helps
teams work together to build, test, and deliver apps faster.
In Azure:
● Azure DevOps tools: A set of tools to plan, build, test, and release software.
● Tool integration: Easily connect with other popular tools (like GitHub, Jenkins, etc.).
✅ 12. Development
What it means:
These services help software developers write and manage code easily on Azure.
In Azure:
● Developers can share their code, test it, and track issues/bugs.
✅ 21. Intune
What it means:
Microsoft Intune is a cloud service that helps manage mobile devices and apps in a safe
and organized way.
In Azure:
● Enroll devices: Register laptops, phones, tablets so the company can manage them.
● Push security policies: Send rules (like password requirements or app restrictions) to
all devices.
● Track app usage: See which apps are being used on devices.
● Remote wipe: If a device is lost or stolen, Intune can erase only company data (not
personal files), keeping everything secure.
Let me know if you want a full beginner summary of all 21 points too!
Unit 5
Thanks for the heads-up! Here's the correct and complete revision notes for IAM Functions,
followed by the rest of the sections you asked for. These are compact, clear, and include all key
points, as you requested.
2. Authorization
3. Auditing
Operational Activities:You're right! Let's revise and improve the IAM Operational
Activities section properly. Here's a clear, complete, and well-structured summary
covering all key points from the original content:
1. Provisioning
● Definition: The process of creating and assigning user accounts and access rights
to systems, applications, and databases.
● Deprovisioning:
○ The reverse process: removes or disables access when a user leaves or
changes roles.
● Key Processes:
3. Entitlement Management
● Objective: Ensure users have only the necessary access rights (principle of least
privilege).
● Processes:
4. Compliance Management
● Purpose: Tracks and verifies that access control policies are followed.
● Key Practices:
● Example: Application owners regularly verify that only authorized users have
access to sensitive data.
● Approaches:
🎯 Key Benefits:
● ✅ Simplifies Development:
○ App developers do not need to build custom login or access control logic.
● ✅ Improved Security:
○ Centralized enforcement of security policies, password rules, and identity
verification.
○ Means moving these functions outside the application logic and managing
them in a central IAM or identity service.
🏢 Examples in Practice:
● Using Active Directory, OAuth2.0, or Identity Providers (IdPs) like Okta, Azure AD,
or Keycloak to manage logins and permissions for multiple apps.
Let me know if you’d like a diagram or comparison with decentralized auth systems!
●
Avoid duplicate identities, enable SSO SAML (Security Assertion Markup Language)
● Google, Microsoft, Salesforce offer basic IAM but may lack enterprise-level controls.
○ Federation, SSO
Circle of Trust:
- Loss
- Leakage
- Misuse
- Breaches and unauthorized access
---
A proper cloud data strategy must address all three types of data:
1. **Data in Use**
2. **Data in Motion**
You're right — let's enhance those two sections with more clarity,
completeness, and bullet-wise points for better revision. Here’s a
refined and complete version of:
● Information about the data you store and use (not the data itself)
➤ Security-Related Logs
● Network-Level:
○ Firewall logs
● Host-Level:
● Customers should:
Importance:
---
### **Storage in Cloud Environments**
1. **Confidentiality**
2. **Integrity**
3. **Availability**
- Even with confidentiality and integrity, data must be available
1. **Network-based attacks**
|--------------------|-------------------|---------------------|-----------------|
✅ **Summary**
Cloud data security is critical and multi-faceted, involving:
---
Let me know if you'd like a PDF or PPT version for easy revision!