DDoS
Distributed Denial of Service attack
CloudTrail
Gives you after the fact incident investigation.
Shield
Protects against Layer 3 and Layer 4 attacks only
AWS WAF
And at its most basic level it allows 3 different behaviors.
It’s going to allow all requests except the ones you specify.
Or you can block all requests except the ones you specify.
Or it can count the requests that match the properties that you specify.
Operates at Layer 7 and in the exam, like I said, you’re going to get scenario-based questions asking how to block Layer 7 attacks.
So at Layer 7, you want to use a WAF.
Layer 4 you’re going to use Shield.
Always think of a WAF whenever you hear the term Layer 7.
WAF can block Layer 7 DDoS attacks as well as things like SQL injections and cross-site scripting.
And if you need to block access to specific countries or IP addresses, you can also achieve this using AWS WAF.
GuardDuty
Macie
Inspector
KMS
Is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data.
Now there’s 3 ways to control permissions within KMS.
KMS versus CloudHSM
KMS
CloudHSM
Secrets Manager
Secrets Manager can be used to securely store your application secrets, your database credentials, your API keys, SSH keys, passwords, et cetera.
Applications use the Secrets Manager’s API.
Rotating credentials is super easy, but just be careful because when enabled, Secrets Manager will rotate these credentials immediately
You need to make sure all your application instances are configured to use Secrets Manager before enabling credential rotation.
Now you will get scenario based questions where it’s going to test if you should use Parameter Store or Secrets Manager.
Presigned URLs
If you see a scenario question where you need to share private files in your S3 bucket think of presigned URLs.
Advanced IAM policies
Benefits of Certificate Manager