AWS CP CW 1

1234567891011121314151617181920212223242526
Across
  1. 3. an intelligent threat detection system that uncovers unauthorized behavior
  2. 7. offers on-demand access to aws security and compliance reports
  3. 8. a dns service that routes users to applications
  4. 9. this pillar focuses on environmental impact, especially energy consumption and efficiency
  5. 12. allows you to assess, audit, and evaluate the configurations of your resources
  6. 13. helps you control access to mobile and web applications
  7. 16. causes a traffic jam on a website or application in an attempt to cause it to crash
  8. 18. helps you discover and protect sensitive data
  9. 19. allows you to generate and store encryption keys
  10. 20. upgrades an existing instances
  11. 23. this pillar focuses on designing systems that work consistently and recover quickly
  12. 25. this pillar focuses on putting mechanisms in place that help protect your systems and data
  13. 26. giving a user the min access required to get a job done
Down
  1. 1. helps protect your web application against common web attacks
  2. 2. used to describe design principles and best practices for running workloads in the cloud
  3. 4. provides recommendations that help you follow AWS best practices
  4. 5. models the shared security of the cloud
  5. 6. this pillar focuses on creating applications that effectively support production workloads
  6. 10. this pillar focuses on delivering optimum and resilient solutions at least to the cost to the user
  7. 11. adds or replaces instances
  8. 14. automatically distributes your incoming application traffic across multiple ec2 instances
  9. 15. this pillar focuses on the effective use of computing resources to meet system and business requirements while removing bottlenecks
  10. 17. adds or replaces ec2 instances across AZs, based on need and changing demand
  11. 21. a managed ddos protection service
  12. 22. allows you to manage and retrieve secrets
  13. 24. works with ec2 instances to uncover and report vulnerabilities