AWS Certified DevOps
1 Domain 1: SDLC Automation
1.1 Continuous Integration and Continuous Deployment (CICD)
1.1 1 Design and implement CICD pipelines
1.1 2 Manage code repositories
1.1 3 Implement deployment strategies
1.2 Infrastructure as Code (IaC)
1.2 1 Define and deploy infrastructure using AWS CloudFormation
1.2 2 Manage and modularize templates
1.2 3 Implement service and infrastructure bluegreen deployments
1.3 Configuration Management
1.3 1 Automate configuration management
1.3 2 Implement and manage configuration changes
1.3 3 Implement and manage infrastructure changes
1.4 Monitoring and Logging
1.4 1 Design and implement logging and monitoring
1.4 2 Analyze and troubleshoot issues
1.4 3 Implement and manage alarms and notifications
2 Domain 2: Configuration Management and Infrastructure as Code
2.1 Infrastructure as Code (IaC)
2.1 1 Define and deploy infrastructure using AWS CloudFormation
2.1 2 Manage and modularize templates
2.1 3 Implement service and infrastructure bluegreen deployments
2.2 Configuration Management
2.2 1 Automate configuration management
2.2 2 Implement and manage configuration changes
2.2 3 Implement and manage infrastructure changes
2.3 Version Control
2.3 1 Manage code repositories
2.3 2 Implement version control strategies
2.3 3 Manage branching and merging
3 Domain 3: Monitoring and Logging
3.1 Monitoring
3.1 1 Design and implement monitoring
3.1 2 Implement and manage alarms and notifications
3.1 3 Analyze and troubleshoot issues
3.2 Logging
3.2 1 Design and implement logging
3.2 2 Analyze and troubleshoot issues
3.2 3 Implement and manage log retention and archival
3.3 Metrics and Dashboards
3.3 1 Design and implement metrics collection
3.3 2 Create and manage dashboards
3.3 3 Analyze and troubleshoot performance issues
4 Domain 4: Policies and Standards Automation
4.1 Security and Compliance
4.1 1 Implement and manage security policies
4.1 2 Implement and manage compliance policies
4.1 3 Automate security and compliance checks
4.2 Cost Management
4.2 1 Implement and manage cost optimization strategies
4.2 2 Automate cost monitoring and alerts
4.2 3 Analyze and troubleshoot cost issues
4.3 Governance
4.3 1 Implement and manage governance policies
4.3 2 Automate governance checks
4.3 3 Analyze and troubleshoot governance issues
5 Domain 5: Incident and Event Response
5.1 Incident Management
5.1 1 Design and implement incident management processes
5.1 2 Automate incident detection and response
5.1 3 Analyze and troubleshoot incidents
5.2 Event Management
5.2 1 Design and implement event management processes
5.2 2 Automate event detection and response
5.2 3 Analyze and troubleshoot events
5.3 Root Cause Analysis
5.3 1 Perform root cause analysis
5.3 2 Implement preventive measures
5.3 3 Analyze and troubleshoot root cause issues
6 Domain 6: High Availability, Fault Tolerance, and Disaster Recovery
6.1 High Availability
6.1 1 Design and implement high availability architectures
6.1 2 Implement and manage load balancing
6.1 3 Analyze and troubleshoot availability issues
6.2 Fault Tolerance
6.2 1 Design and implement fault-tolerant architectures
6.2 2 Implement and manage failover strategies
6.2 3 Analyze and troubleshoot fault tolerance issues
6.3 Disaster Recovery
6.3 1 Design and implement disaster recovery strategies
6.3 2 Implement and manage backup and restore processes
6.3 3 Analyze and troubleshoot disaster recovery issues
4.3 Governance Explained

Governance Explained

Key Concepts

Detailed Explanation

Governance

Governance refers to the framework and processes that ensure compliance with internal policies, industry standards, and regulatory requirements. It involves setting up controls, monitoring, and auditing to maintain security, reliability, and efficiency across an organization's AWS environment.

AWS Organizations

AWS Organizations allows you to create groups of AWS accounts and apply policies across them. This centralized management helps in maintaining consistent governance and security practices across multiple accounts. AWS Organizations also provides features like consolidated billing and account management.

Service Control Policies (SCPs)

Service Control Policies (SCPs) are a type of policy that centrally control the maximum available permissions for member accounts in an AWS Organization. SCPs help in enforcing governance by restricting the actions that can be performed by IAM users and roles in member accounts. They ensure that accounts do not exceed the defined permissions.

AWS Config

AWS Config provides a detailed view of the configuration of AWS resources in your account. It continuously monitors and records configuration changes and can evaluate these configurations against desired states. AWS Config helps in ensuring that resources comply with established policies and best practices, thereby supporting governance efforts.

AWS CloudTrail

AWS CloudTrail logs and monitors account activity across your AWS infrastructure. It captures detailed records of actions taken by users, roles, or AWS services. CloudTrail helps in governance by providing visibility into who did what, when, and where, enabling auditing and compliance checks.

Examples and Analogies

Example: AWS Organizations

Here is an example of creating an organization in AWS Organizations:

aws organizations create-organization --feature-set ALL
    

Example: Service Control Policy (SCP)

Here is an example of an SCP that restricts the use of certain AWS services:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Deny",
            "Action": [
                "ec2:RunInstances",
                "ec2:CreateVolume"
            ],
            "Resource": "*"
        }
    ]
}
    

Example: AWS Config Rule

Here is an example of an AWS Config rule to ensure that EC2 instances are tagged with a specific key-value pair:

{
    "ConfigRuleName": "ec2-instance-tag-compliance",
    "Description": "Checks whether EC2 instances are tagged with a specific key-value pair.",
    "Scope": {
        "ComplianceResourceTypes": [
            "AWS::EC2::Instance"
        ]
    },
    "Source": {
        "Owner": "AWS",
        "SourceIdentifier": "REQUIRED_TAGS"
    },
    "InputParameters": {
        "tag1Key": "Environment",
        "tag1Value": "Production"
    }
}
    

Example: AWS CloudTrail

Here is an example of creating a CloudTrail trail to log all API calls in your AWS account:

aws cloudtrail create-trail --name my-trail --s3-bucket-name my-bucket
    

Analogy: Governance as Corporate Governance

Think of governance in AWS as corporate governance in a company. Just as corporate governance ensures that a company operates according to legal and regulatory standards, AWS governance ensures that your cloud environment operates securely and efficiently. AWS Organizations is like the board of directors that sets policies and oversees operations. Service Control Policies (SCPs) are like the bylaws that define what actions are permissible. AWS Config is like the internal audit team that checks if everything is in order. AWS CloudTrail is like the corporate secretary who keeps detailed records of all actions taken.