AWS CP CW 1
Across
- 3. an intelligent threat detection system that uncovers unauthorized behavior
- 7. offers on-demand access to aws security and compliance reports
- 8. a dns service that routes users to applications
- 9. this pillar focuses on environmental impact, especially energy consumption and efficiency
- 12. allows you to assess, audit, and evaluate the configurations of your resources
- 13. helps you control access to mobile and web applications
- 16. causes a traffic jam on a website or application in an attempt to cause it to crash
- 18. helps you discover and protect sensitive data
- 19. allows you to generate and store encryption keys
- 20. upgrades an existing instances
- 23. this pillar focuses on designing systems that work consistently and recover quickly
- 25. this pillar focuses on putting mechanisms in place that help protect your systems and data
- 26. giving a user the min access required to get a job done
Down
- 1. helps protect your web application against common web attacks
- 2. used to describe design principles and best practices for running workloads in the cloud
- 4. provides recommendations that help you follow AWS best practices
- 5. models the shared security of the cloud
- 6. this pillar focuses on creating applications that effectively support production workloads
- 10. this pillar focuses on delivering optimum and resilient solutions at least to the cost to the user
- 11. adds or replaces instances
- 14. automatically distributes your incoming application traffic across multiple ec2 instances
- 15. this pillar focuses on the effective use of computing resources to meet system and business requirements while removing bottlenecks
- 17. adds or replaces ec2 instances across AZs, based on need and changing demand
- 21. a managed ddos protection service
- 22. allows you to manage and retrieve secrets
- 24. works with ec2 instances to uncover and report vulnerabilities