AWS Services Cheat Sheet: by Via
AWS Services Cheat Sheet: by Via
Wavelength Deliver ultra-low latency Amazon Amazon Elastic Block Store is a AWS DataSync makes it simple &
application for 5G devices. EBS web service that provides DataSync fast to move large amounts of
Wavelenth block-level storage volumes. data online between on-pre‐
VMware Innovate faster, rapidly EBS mises storage & S3, EFS, or
Cloud on transition to the cloud, & Amazon EFS offers file storage for the FSx for Windows File Server.
AWS work securely from any EFS user’s Amazon EC2 instances. DataSync
location. VMware_On_AWS Storage It's kind of blob Storage. EFS AWS The Transfer Family provides
Local Run latency sensitive applic‐ Amazon FSx supply fully managed 3rd- Transfer fully managed support for file
Zones ations closer to end-users. FSx party file systems with the native Family transfers directly into & out of
LocalZones compatibility & characteristic S3. Transfer_Family
sets for workloads. It's available AWS Highly-secure, portable
Storage as FSx for Windows server Snow devices to collect & process
(Fully managed file storage built Family data at the edge, and migrate
Serv‐ Description
on Windows Server) & Lustre data into and out of AWS.
ice
(Fully managed high-perf‐ Snow_Family
AWS S3 is the storehouse for the
ormance file system integrated
S3 internet i.e. object storage built to Classification:
with S3). FSx_Windows
store & retrieve any amount of Object storage: S3
FSx_Lustre
data from anywhere S3 File storage services: Elastic File System,
AWS Storage Gateway is a service FSx for Windows Servers & FSx for Lustre
AWS AWS Backup is an externally-a‐
Storage which connects an on-premises Block storage: EBS
Backup ccessible backup provider that
Gateway software appliance with cloud-‐ Backup: AWS Backup
makes it easier to align &
based storage. Data transfer:
optimize the backup of data
Storage_Gateway Storage gateway --> 3 types: Tape, File,
across AWS services in the
Volume.
cloud. AWS_Backup
Transfer Family --> SFTP, FTPS, FTP.
Edge computing and storage and Snow
Family --> Snowcone, Snowball,
Snowmobile
Databases
Rela‐ Traditional Aurora, RDS is a In-m‐ Caching, ElastiCache ElastiCache helps in Wide High Keyspaces
tio‐ applic‐ RDS, web emory session for setting up, managing, column scale (for Apache
nal ations, Redshift service that manage‐ Memcached and scaling in-memory industrial Cassandra)
ERP, makes it ment, & Redis cache conditions. apps for
CRM, e- easier to gaming Memcached Redis equipment
commerce set up, leader‐ mainte‐
control, boards, nance,
and scale a geospatial fleet
relational applic‐ manage‐
database ations ment, and
in the Docu‐ Content DocumentDB DocumentDB (with route
cloud. ment manage‐ MongoDB compatibility) optimi‐
Aurora ment, is a quick, dependable, zation
RDS catalogs, and fully-managed
Redshift user database service that Graph Fraud Neptune
Key-‐ High-t‐ DynamoDB DynamoDB profiles makes it easy for you to detection,
value raffic web is a fully set up, operate, and social
apps, e- admini‐ scale MongoDB-comp‐ networ‐
commerce stered atible king,
systems, NoSQL databases.DocumentDB recomm‐
gaming database endation
applic‐ service that engines
ations offers quick
and reliable
perfor‐
mance with
integrated
scalability.
DynamoDB
Time IoT Timestream Timestream Ledger Systems Quantum QLDB is a CodeBuild CodeBuild is a fully
series applic‐ is a fast, of Ledger fully managed service that
ations, scalable, record, Database managed assembles source
DevOps, and supply (QLDB) ledger code, runs unit tests, &
industrial serverless chain, database also generates
telemetry time series regist‐ that artefacts ready to
database rations, provides a deploy. CodeBuild
service for banking transp‐ CodeGuru CodeGuru is a
IoT and transa‐ arent, developer tool powered
operational ctions immutable, by machine learning
applications and that provides intelligent
that makes cryptogra‐ recommendations for
it easy to phically improving code quality
store and verifiable & identifying an applic‐
analyze transaction ation’s most expensive
trillions of log owned lines of code.
events per by a CodeGuru
day. central
Cloud Cloud Development Kit
Timestream trusted
Develo‐ (AWS CDK) is an open
authority.
pment Kit source software
QLDB
development
framework to define
Developer Tools
cloud application
Serv‐ Description resources using familiar
ice programming
Cloud9 Cloud9 is a cloud-based IDE that languages. CDK
enables the user to write, run, and CodeCommit CodeCommit is a
debug code. Cloud9 version control service
CodeAr CodeArtifact is a fully managed that enables the user to
tifact artifact repository service that personally store &
makes it easy for organizations of manage Git archives in
any size to securely store, publish, the AWS cloud.
& share software packages used CodeCommit
in their software development
process. CodeArtifact
Developer Tools (cont) Migration & Transfer services Migration & Transfer services (cont)
Organize Construct 1) Cost Cost Categories is Report Raise 1) Cost Cost & Usage Control Establish
cost Allocation a feature within awareness Explorer Report contains effective
allocation & Tags 2) AWS Cost & accoun‐ 2) Cost the most compre‐ governance
governance Cost Management tability of & hensive set of mechanisms
foundation Categories product suite that your cloud Usage AWS cost & usage with the right
with your enables group cost spend with Report data available, guardrails in
own & usage inform‐ the including additional place
tagging ation into detailed, metadata about
strategy meaningful allocable AWS services,
categories based cost data pricing, & reserv‐
on needs. ations.
CostAllocationTags CostExplorer CUR
CostCategories Access Track 1) credits are applied
billing Consol‐ to bills to help
inform‐ idated cover costs that
ation Billing are associated
across the 2) with eligible
organi‐ Credits services.
zation in a ConsolidatedBilling
consol‐ Credits
idated
view
Forecast Estimate 1) Cost A forecast is a Purchase Leverage 1) Free RI provide a Rightsize Align
resource Explorer prediction of how free trials Tier 2) significant service
utiliz‐ (Self-‐ much you will use & progra‐ Reserved discount (up to allocation
ation & Service) AWS services over mmatic Instances 75%) compared to size to
spend 2) the forecast time discounts 3) Savings On-Demand actual
with Budgets period that you based on Plans 4) pricing. RI workload
forecast (Event- selected, based on workload Spot FreeTier demand
dashbo‐ Driven) your past usage. pattern & Instances SavingsPlan
ards. Forecasting needs 5) SpotEC2
EventDrivenBudgets DynamoDB DynamoDBOD
Budget Keep 1) Budgets allows to On-
spend in Budgets set custom budgets demand
check 2) to track cost & Elasticity Scale & 1) Instance Trusted Advisor is
with Budget usage from the schedule Scheduler an online tool that
custom Alerts simplest to the most services 2) Redshift provides real time
budget via complex use cases. based on pause & guidance to help
threshold Chime Budgets expected resume 3) provision Inspect Stay up-to-
& auto & Slack BudgetAlerts utilization EC2 Auto resources date with
alert 3) ServiceCatalog pattern & Scaling 4) following AWS resource
notifi‐ Service needs Trusted best practices. deployment
cation Catalog Advisor InstanceScheduler & cost
RedshiftP&R optimi‐
EC2ASG zation
TrustedAdvisor opport‐
unities
SDKs & Toolkits SDKs & Toolkits (cont) Networking & Content Delivery (cont)
Service Description Tools for developing Complete list of Connect Transit Transit Gateway
CDK CDK uses the familiarity & and managing applic‐ tools can be found VPCs and Gateway connects VPCs
expressive power of progra‐ ations on AWS here: Tools on-pre‐ & on-premises
mming languages for mises networks through
modeling apps. CDK Networking & Content Delivery networks a central hub.
through a This simplifies
Corretto Corretto is a no-cost, multip‐ Use Functio‐ Serv Descrip‐
central hub network & puts
latform, production-ready cases nality ice tion
an end to
distribution of the OpenJDK. Build a Define VPC VPC lets
complex peering
Corretto cloud and you
relationships.
Crypto Cryptography is hard to do network provision provision a
TransitGateway
Tools safely & correctly. The AWS a logically logically
Provide Privat‐ PrivateLink
Crypto Tools libraries are isolated isolated
private eLink provides private
designed to help everyone do network section of
connec‐ connectivity
cryptography right, even for your the AWS
tivity between VPCs &
without special expertise. AWS Cloud
between services hosted
Crypto Tools resources where you
VPCs, on AWS or on-
can launch
Serverless SAM is an open-source
services, premises,
AWS
Applic‐ framework for building
and on- securely on the
resources
ation serverless applications. It
premises Amazon
in a virtual
Model provides shorthand syntax to
applic‐ network.
network
(SAM) express functions, APIs,
ations PrivateLink
that you
databases, & event source
define.
mappings. SAM
VPC
Networking & Content Delivery (cont) Networking & Content Delivery (cont) Networking & Content
Delivery (cont)
Route Route 53 Route 53 is a highly Direct Global Global Accele‐
users to available & scalable traffic Accele rator is a Protect WAF WAF is a
Internet cloud DNS web through rator networking your web applic‐
applic‐ service. Route53 the AWS service that web ation
ations with Global sends user’s applic‐ firewall that
a network to traffic through ations helps
managed improve AWS’s global from protect your
DNS global network infrastru‐ common web applic‐
service applic‐ cture, improving web ations or
Scale Automa‐ Elastic Elastic Load ation internet user exploits APIs
your tically Load Balancing automa‐ perfor‐ performance by against
network distribute Balancing tically distributes mance up to 60%. common
design traffic incoming application GlobalAccelerator web exploits
across a traffic across multiple Secure Safeguard Shield Shield is a that may
pool of targets, such as your applic‐ managed Distri‐ affect
resources, EC2's, containers, IP network ations buted Denial of availability,
such as addresses, & traffic running Service (DDoS) compromise
instances, Lambda functions. on AWS protection service security, or
containers, ElasticLoadBalancing against that safeguards consume
IP DDoS applications excessive
addresses, attacks running on AWS. resources.
and Shield WAF
Lambda
functions
Networking & Content Delivery (cont) Networking & Content Delivery Networking & Content Delivery (cont)
(cont)
Centrally Firewall Firewall Content Securely CloudFront CloudFront
configure Manager Manager is a Create an (VPN) - Site-to-Site delivery deliver expedites
and security encrypted Site to VPN creates networks data, distribution
manage management connection Site a secure videos, of static &
firewall service between connection applic‐ dynamic
rules which allows your between data ations, and web
to centrally network center or APIs to content.
configure & and your branch office customers CloudFront
manage Amazon & AWS cloud globally
firewall rules VPCs or resources. with low
across AWS site_to_site latency,
accounts & Transit and high
apps in AWS Gateways transfer
Organi‐ Establish Direct Direct speeds
zation. link a private, Connect Connect is a Build a Provide App Mesh App Mesh
text dedicated cloud service network applicati‐ makes it
Build a Connect (VPN) - VPN connection solution that for on-level accessible
hybrid your Client solutions between makes it easy micros‐ networking to guide &
IT users to establish AWS and to establish a ervices for control
network AWS or secure your dedicated archit‐ containers micros‐
on-pre‐ connections datace‐ network ectures and ervices
mises between on- nter, connection micros‐ operating on
resources premises office, or from your ervices AWS.
using a networks, colocation premises to AppMesh
Virtual remote enviro‐ AWS. Create, API API
Private offices, client nment DirectConnect maintain, Gateway Gateway
Network devices, & and allows the
the AWS secure user to
global APIs at design &
network. any scale expand their
VPN own REST
and
WebSocket
APIs at any
scale.
APIGateway
Networking & Content Delivery (cont) Security, Identity, & Compliance (cont) Security, Identity, & Compliance
(cont)
Discover AWS Cloud Cloud Map permits Identity Cognito Cognito lets you
services Map the name & handles management add user sign- Simple, Resource Resource
connected to the cloud resources. for apps up, sign-in, & secure Access Access
your applications CloudMap access control service to Manager Manager
to web & mobile share AWS (RAM) is a
Security, Identity, & Compliance apps quickly resources service
and easily. that
Cate‐ Use Service Descrip‐
Cognito enables
gory cases tion
Managed Directory AWS Managed you to
Identity Securely Identity & IAM is a
Microsoft Service Microsoft Active easily &
& manage Access web
Active Directory (AD) securely
access access to Management service
Directory enables your share AWS
manage services (IAM) for safely
directory-aware resources
ment and contro‐
workloads & with any
resources lling
AWS resources AWS
access to
to use managed account or
AWS
Active Directory within
services.
(AD) in AWS. AWS
IAM
DirectoryService Organi‐
Securely Single Sign- SSO zation.
manage On helps in RAM
access to simpli‐
Central Organi‐ Organi‐
services fying,
governance zations zations
and managing
and helps you
resources SSO
management centrally
access to
across AWS govern
AWS
accounts your
accounts
enviro‐
&
nment as
business
you grow
applic‐
and scale
ations.
your
SSO
workloads
on AWS.
Orgs
Security, Identity, & Compliance (cont) Security, Identity, & Compliance (cont) Security, Identity, & Compliance (cont)
Dete Unified Security Security Analyze Inspector Inspector is a Track user CloudTrail CloudTrail is
ction security Hub Hub gives a applic‐ security vulner‐ activity and a service
and compre‐ ation ability API usage that enables
compliance hensive security assessment governance,
center view of service compliance,
security improves the operational
alerts & security & auditing, &
security compliance of risk auditing
posture the AWS of AWS
across AWS resources. account.
accounts. Inspector CloudTrail
SecurityHub Record Config Config is a Security IoT IoT Device
Managed GuardDuty GuardDuty and service that management Device Defender is
threat is a threat evaluate enables to for IoT Defender a fully
detection detection configura‐ assess, audit, & devices managed
service service that tions of evaluate the service that
contin‐ your AWS configurations helps secure
uously resources of AWS fleet of IoT
monitors for resources. devices.
malicious Config IoTDD
activity &
unauth‐
orized
behavior to
protect
AWS
accounts,
workloads,
& data
stored in
S3.
GuardDuty
Security, Identity, & Compliance (cont) Security, Identity, & Compliance (cont) Security, Identity, & Compliance (cont)
Infrast‐ DDoS Shield Shield is a Filter Web WAF is a web Data Discover and Macie Macie is
ructure protection managed malicious Applic‐ application protec protect your a fully
protec‐ DDoS web traffic ation firewall that tion sensitive managed
tion protection Firewall helps protect data at scale data
service (WAF) web apps or (security
that APIs against &
safeguards common web privacy)
apps exploits that service
running. It may affect that uses
provides availability, ML &
always-on compromise pattern
detection security, or matching
& consume to
automatic excessive discover
inline resources. WAF & protect
mitigations Central Firewall Firewall sensitive
that management Manager Manager eases data.
minimize of firewall the user AWS Macie
application rules WAF administr‐ Key storage Key KMS
downtime ation & mainte‐ and Management makes it
& latency. nance activities management Service easy for
Shield over multiple (KMS) to create
accounts & &
resources. manage
FirewallManager crypto‐
graphic
keys &
control
their use
across a
wide
range of
AWS
services
& in your
applic‐
ations.
KMS
Security, Identity, & Compliance Security, Identity, & Compliance (cont) Security, Identity, & Compliance (cont)
(cont)
Rotate, Secrets Secrets Fast, CloudE‐ Provides
Hardware CloudHSM CloudHSM manage, Manager Manager assist automated, ndure scalable,
based key is a and the user to cost- Disaster cost-effe‐
storage for cloud-‐ retrieve safely encode, effective Recovery ctive
regulatory based secrets store, & recover disaster business
compliance hardware credentials for recovery continuity for
security any user’s physical,
module database & virtual, &
(HSM) that other services. cloud
enables SecretsManager servers.
you to Incident Invest‐ Detective Detective makes CloudEndure
easily response igate it easy to Com No cost, Artifact Artifact is a
generate & potential analyze, invest‐ plia‐ self-service web service
use your security igate, & quickly nce portal for that enables
own issues identify the root on-demand the user to
encryption cause of access to download
keys. potential AWS’ AWS
CloudHSM security issues compliance security &
Provision, Certificate Certificate or suspicious reports compliance
manage, Manager Manager activities. records.
and deploy is a Detective Artifact
public and service
private that easily Data Lakes & Analytics
SSL/TLS provision,
Cate‐ Use Serv‐ Description
certificates manage, &
gory cases ice
deploy
public and
private
SSL/TLS
certs for
use with
AWS
services &
internal
connected
resources.
ACM
Data Lakes & Analytics (cont) Data Lakes & Analytics (cont) Data Lakes & Analytics (cont)
Anal Interactive Athena Athena is Data Redshift The most popular & Operational Elasti‐ Elasticsearch
ytics analytics an intera‐ wareho‐ fastest cloud data analytics csearch Service is a
ctive query using warehouse. Redshift Service fully managed
service that Real- Kinesis Kinesis makes it service that
makes it time easy to collect, makes it easy
easy to analytics process, & analyze to deploy,
analyze real-time, streaming secure, & run
data in S3 data so one can get Elasticsearch
using timely insights. cost effectively
standard Kinesis at scale. ES
SQL. Dashboards Quicksight QuickSight is a
Athena & visualiza‐ fast, cloud-‐
Big data EMR EMR is the tions powered
processing industry-‐ business intell‐
leading igence service
cloud big that makes it
data easy to deliver
platform for insights to
processing everyone in
vast organization.
amounts of QuickSight
data using
open source
tools such
as Apache
Spark, Hive,
HBase,‐
Flink, Hudi,
& Presto.
EMR
Data Lakes & Analytics (cont) Data Lakes & Analytics (cont) Data Lakes & Analytics (cont)
Data Lakes & Analytics (cont) Data Lakes & Analytics (cont) Containers (cont)
Pred‐ Frameworks Deep Deep Learning Platform SageMaker SageMaker Run Fargate Fargate is a
ictive & interfaces Learning AMIs provide services is a fully containers serverless
analytics AMIs machine learning managed without compute
&& practitioners & service that managing engine for
machine researchers with provides servers containers that
learning the infrastructure & every works with
tools to accelerate developer both ECS &
deep learning in & data EKS. Fargate
the cloud, at any scientist Run EC2 Refer compute
scale. with the containers section
DeepLearningAMIs ability to with
build, train, server-
& deploy level
machine control
learning
Contai‐ App2Co App2Container
(ML)
nerize and ntainer (A2C) is a
models
migrate command-line
quickly.
existing tool for
SageMaker
applic‐ modernizing
ations .NET & Java
Containers
applications
Use cases Serv Desc‐ into contai‐
ice ription nerized applic‐
Store, encrypt, ECR Refer ations.
and manage compute App2Container
container images section Quickly Copilot Copilot is a
Run containerized ECS Refer launch command line
applications or compute and interface (CLI)
build micros‐ section manage that enables
ervices contai‐ customers to
nerized quickly launch
Manage EKS Refer
applic‐ & easily
containers with compute
ations manage
Kubernetes section
containerized
applications on
AWS. Copilot
Cate‐ Service Description Aurora Aurora Serverless is Appl‐ SNS SNS is a fully
gory Serverless an on-demand, auto- ication managed messaging
Comp Lambda Lambda lets scaling configuration integr‐ service for both
ute you run code for Amazon Aurora ation system-to-system &
without provis‐ (MySQL & Postgr‐ app-to-person (A2P)
ioning or eSQL-compatible communication.
managing editions), where the SQS SQS is a fully
servers. You database will managed message
pay only for the automatically start queuing service that
compute time up, shut down, & enables to decouple
you consume. scale capacity up or & scale microserv‐
down based on your ices, distributed
Lambda@Edge Lambda@Edge
application's needs. systems, & serverless
is a feature of
Amazon RDS RDS Proxy is a fully applications.
CloudFront that Proxy managed, highly AppSync AppSync is a fully
lets you run available database managed service that
code closer to proxy for RDS that makes it easy to
users of your makes applications develop GraphQL
application, more scalable, APIs by handling the
which improves resilient to database heavy lifting of
performance & failures, & more securely connecting
reduces secure. to data sources like
latency. API API API Gateway is a AWS DynamoDB,
Fargate Refer Proxy Gateway fully managed Lambda.
containers service that makes it
section easy for developers
to create, publish,
Stor‐ S3 Refer storage
maintain, monitor, &
age section
secure APIs at any
EFS Refer storage
scale.
section
Data DynamoDB DynamoDB is a
stores key-value &
document
database that
delivers single-
digit millisecond
performance at
any scale.
Management & Governance (cont) Management & Governance (cont) Management & Governance (cont)
Budgets Budgets allows to set OpsWorks OpsWorks presents Systems Systems Manager to plan,
custom budgets to track a simple and flexible Manager proctor, & automate administr‐
cost & usage from the way to create and ation tasks on the AWS
simplest to the most maintain stacks and resources. SystemsManager
complex use cases. applications. Cost & Refer cost management
Budgets OpsWorks usage section
License License Manager Marketplace Marketplace is a report
Manager makes it easier to digital catalog with Cost Refer cost management
manage software thousands of explorer section
licenses from software software listings
Managed Operate your AWS infrastru‐
vendors such as from independent
Services cture on your behalf.
Microsoft, SAP, Oracle, software vendors
ManagedServices
& IBM across AWS & that make it easy to
X Ray X-Ray
on-premises enviro‐ find, test, buy, &
nments. deploy software that
Recommend security best practices
LicenseManager runs on AWS.
Prov CloudF‐ CloudFormation Marketplace Turn on multifactor authentication for the
ision ormation enables the user to Oper CloudWatch CloudWatch offers a “root” account
design & provision AWS ate reliable, scalable, & Turn on CloudTrail log file validation.
infrastructure deploy‐ flexible monitoring Enable CloudTrail multi-region logging.
ments predictably & solution that can
Integrate CloudTrail with CloudWatch.
repeatedly. easily start.
Enable access logging for CloudTrail S3
CloudFormation CloudWatch
buckets.
Service Service Catalog allows CloudTrail CloudTrail is a
Enable access logging for Elastic Load
Catalog organizations to create service that enables
Balancer (ELB).
& manage catalogs of governance, compli‐
IT services that are ance, operational Enable Redshift audit logging.
approved for use on auditing, & risk Enable Virtual Private Cloud (VPC) flow
AWS. ServiceCatalog auditing of AWS logging.
account. CloudTrail
Require multifactor authentication (MFA) to
Config Config delete CloudTrail buckets
Enable CloudTrail logging across all AWS.
Turn on multi-factor authentication for IAM
users.
Enable IAM users for multi-mode access.
Attach IAM policies to groups or roles
Rotate IAM access keys regularly, and Minimize the number of discrete security
standardize on the selected number of days groups.
Set up a strict password policy. Reduce number of IAM groups.
Set the password expiration period to 90 Terminate unused access keys
days and prevent reuseCustomer Visual‐ Disable access for inactive or unused IAM
force pages with standard headers users
Don’t use expired SSL/TLS certificates Remove unused IAM access keys
User HTTPS for CloudFront distributions Delete unused SSH Public Keys
Restrict access to CloudTrail bucket. Restrict access to AMIs.
Encrypt CloudTrail log files at rest Restrict access to EC2 security groups.
Encrypt Elastic Block Store (EBS) database. Restrict access to RDS instances.
Provision access to resources using IAM Restrict access to Redshift clusters.
roles.
Restrict outbound access.
Ensure EC2 security groups don’t have
Disallow unrestricted ingress access on
large ranges of ports open
uncommon ports.
Configure EC2 security groups to restrict
Restrict access to well-known ports such as
inbound access to EC2.
CIFS, FTP, ICMP, SMTP, SSH, Remote
Avoid using root user accounts. desktop
Use secure SSL ciphers when connecting Inventory & categorize all existing custom
between the client and ELB. apps by the types of data stored,
Use secure SSL versions when connecting compliance requirements & possible threats
between client and ELB. they face.
Use a standard naming (tagging) Involve IT security throughout the develo‐
convention for EC2. pment process.
Encrypt RDS. Grant the fewest privileges as possible for
Ensure access keys are not being used with application users
root accounts. Enforce a single set of data loss prevention
Use secure CloudFront SSL versions. policies across custom applications and all
other cloud services.
Enable the require_ssl parameter in all
Redshift clusters. Encrypt highly sensitive data such as
protected health information (PHI) or
Rotate SSH keys periodically.
personally identifiable information (PII).