AWS S3 use
Data storage
S3 buckets are similar to
Directories
S3 Objects are
Files
S3 object keys are
The full path of the object within the bucket
The 4 ways to implement S3 security
1) IAM Policies
2) Object Access Control List (ACL)
3) Bucket Access Control List (ACL)
4) Encryption
S3 bucket policy can be used to
The 2 types of S3 replication are
1) Cross-region replication
2) Same-region replication
The 7 S3 storage classes are
S3 Standard – General Purpose
S3 Standard-Infrequent Access
S3 One Zone-Infrequent Access
Amazon S3 Glacier Storage Classes
Amazon S3 Glacier Instant Retrieval
Amazon S3 Glacier Flexible Retrieval
Amazon S3 Glacier Deep Archive – for long term storage
S3 Intelligent-Tiering
The 2types of S3 encryption are
1) Server-side Encryption (default)
2)Client-side Encryption
Server-side Encryption occurs when
The server encrypts the file after receiving it
Client-side Encryption occurs when
The user encrypts the file before uploading it
IAM Access Analyzer for S3
AWS Snow Family includes
Highly-secure, portable devices to collect and process data at the edge, and migrate data into and out of AWS
The 3 Snow Family devices for Data Migration are
1) Snowcone
2) Snowball Edge
3) Snowmobile
The 2 Snow Family devices for Edge computing are
1) Snowcone
2) Snowball Edge
Snowball Edge is a