Across
- 3. service that helps you securely control access to AWS resources
- 5. service that enables you to build and run applications that use Apache Kafka to process streaming data
- 8. It is a service that provides secure, rugged devices, so you can bring AWS computing and storage capabilities to your edge environments, and transfer data into and out of AWS
- 11. It provides a unified user interface, enabling you to easily manage your software development activities in one place
- 13. It uses an authentication device that continuously generates random, six-digit, single-use authentication codes
- 16. Object storage built to retrieve any amount of data from anywhere
- 18. It is a virtual private server (VPS) provider that provides developers with compute, storage, and networking resources and capacity to deploy and manage websites and web applications
- 19. It is a fully managed continuous integration service that compiles source code, runs tests, and produces software packages that are ready to deploy
- 20. It helps developers analyze and debug production, distributed applications, such as those built using a microservices architecture
- 21. service that provides message delivery from publishers to subscribers
Down
- 1. service that extends AWS infrastructure, services, APIs, and tools to customer premises
- 2. It is a service that allows developers to create applications that run on 5G networks with low latency
- 4. It is a fully managed source control service that hosts secure Git-based repositories
- 6. It collects and processes large streams of data records in real time
- 7. It is a managed orchestration service for Apache Airflow, to setup and operate data pipelines in the cloud at scale
- 9. collections of users and have policies attached to them
- 10. It is an easy-to-manage relational database service optimized for total cost of ownership
- 12. It is a content delivery network (CDN) that allows you to store (cache) your content at “edge locations” located around the world
- 14. serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS)
- 15. It is a document that defines a set of permissions and specifies which AWS resources those permissions grant access to
- 17. It defines a set of permissions and access policies that determine what actions a user or AWS service can take
