From the course: Python: Pen Testing AWS

Understanding AWS - Python Tutorial

From the course: Python: Pen Testing AWS

Start my 1-month free trial

Understanding AWS

- [Presenter] Cloud computing has been and continues to be a disruptive technology. Since its inception, it's disruptive technology strategies and redefine the paradigm for technology deployment. So what is Cloud? Cloud is a set of pooled resources delivered over the internet. Cloud allows you to deliver services globally to your customers at the least cost and with the ability to service a variable workload by scaling the underlying resources up and down to meet the needs of the moment and at a cost only of the resources consumed. This is quite different traditional IT where resources have to be purchased and pre-established to meet maximum expected demand. And then upgraded when the inevitable occurs and capacity runs out. Cloud users are a very large pool of resources to deliver services to an equally large number of users. Each user can select the resources they need and provision new resources instantly should their workload require it. How automatic this is and how quickly resources can be provisioned and deep provision depends on the specific service. Cloud computing as we know it started in 2006. When Amazon launched its Amazon Web Services product by 2008, Google had established its presence in the Cloud as had Microsoft. Cloud took off rapidly and by 2012, 67% of businesses used some form of Cloud. By 2019, right scales annual state of the Cloud report indicated that 94% of businesses use some form of Cloud with 91% using public Cloud and 72% using private Cloud. The majority of these are hybrid Cloud environments. The key players in Cloud or Amazon with its AWS services. Microsoft with it's Azure system and Google. There are five essential characteristics of Cloud. On demand self service, allowing the consumer to unilaterally provision resources independently of the service provider. Broad network access through thick or thin clients. As web or traditional services and from a variety of endpoint devices including desktops, phones, laptops and PDAs. Rapid elasticity providing the consumer with the resources needed at any time but scaling up and down quickly enough to appear to the consumer to be unlimited, resource pooling with resources being shared by multiple consumers in a multi-tenanted model in an abstracted form that hides their physical and geographical attributes and measured service with metering in order to monitor control and report on usage by the consumer. There's one additional characteristic which is not included in the Cloud security alliance on this list of essential characteristics and that is Cloud is charged by the amount consumed. This is known as the pay as you go model. Some service providers, however, offer alternative approaches such as subscription services. Cloud service providers place a great deal of importance on security and have large teams of highly skilled security staff ensuring their services are properly protected. A key characteristic of the larger Cloud services is that they have extensive security certifications. This means that Cloud has become in many ways a more secure option than OnPremise technology. While this is a significant benefit for Cloud users, it comes as a shared responsibility model and the service provider is only part of the security picture for the business. Using Cloud-based technology solutions, doesn't take away the requirement for businesses to understand their security responsibilities and manage their risks. And this is typically where the breach has happened. Let's take a look at what AWS looks like from inside using my accounts. I've logged into the management console and we can select services from the top bar. We can say that the services a group by category, compute, storage, database, blockchain, machine learning and many more. Many of the early Cloud deployments were on EC2 compute and S3 storage resources. But with the increased choices available and the demand for more advanced technology, you'll see much more services as you engage in testing. As we scroll down, we can see some of the additional services such as networking and content delivery, media services and use a computing and internet of things and security identity and compliance. In each category, we can see the services for that category. For example, in storage, we can see S3 buckets and the EFS elastic file system. In database, we can see the Amazon RDS, Aurora Rescue Database and the DynamoDB NoSQL database. There's far too many services to expect to understand each one straight away. We'll look at a few of the common services. And as you do further research and gain experience in testing AWS deployments, you'll get to know about more of them.

Contents