<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Cliff Claven</title>
    <description>The latest articles on Forem by Cliff Claven (@c_claven_03c4a41605f86c8e4).</description>
    <link>https://forem.com/c_claven_03c4a41605f86c8e4</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1853534%2Fab62fd84-6d32-4160-8537-f566528442fd.png</url>
      <title>Forem: Cliff Claven</title>
      <link>https://forem.com/c_claven_03c4a41605f86c8e4</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/c_claven_03c4a41605f86c8e4"/>
    <language>en</language>
    <item>
      <title>AWS Cloud Practitioner Exam - The Difficult Parts</title>
      <dc:creator>Cliff Claven</dc:creator>
      <pubDate>Fri, 15 May 2026 21:12:52 +0000</pubDate>
      <link>https://forem.com/c_claven_03c4a41605f86c8e4/aws-cloud-practitioner-exam-the-difficult-parts-38if</link>
      <guid>https://forem.com/c_claven_03c4a41605f86c8e4/aws-cloud-practitioner-exam-the-difficult-parts-38if</guid>
      <description>&lt;p&gt;&lt;em&gt;Just studying with Claude here and got a little too excited about a cheat sheet . ...&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  FOCUS: AWS Security &amp;amp; Storage 
&lt;/h2&gt;

&lt;p&gt;No corporate speak. No filler. Just what these things do and when to reach for them.&lt;/p&gt;




&lt;h2&gt;
  
  
  🎥 AWS Config — The Security Camera That Never Blinks
&lt;/h2&gt;

&lt;p&gt;Imagine a security camera pointed at your AWS resources, taking a snapshot every time something changes. That's Config.&lt;/p&gt;

&lt;p&gt;Your S3 bucket was private Monday, public Tuesday — Config caught both states, logged the diff, and knows exactly who did it. You can add rules like &lt;em&gt;"S3 buckets must never be public."&lt;/em&gt; Break the rule, get flagged as non-compliant.&lt;/p&gt;

&lt;p&gt;This is called &lt;strong&gt;drift detection&lt;/strong&gt; — your resource wandered away from desired state, and Config is the auditor that noticed.&lt;/p&gt;

&lt;p&gt;Config doesn't &lt;em&gt;prevent&lt;/em&gt; changes (that's IAM and SCPs). It records and evaluates them.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;📋 Exam trigger words&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;"audit resource changes over time" · "compliance rules" · "who changed this resource" · "configuration history" → &lt;strong&gt;Config&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  🛡️ Shield + WAF — Three Guards, Three Completely Different Jobs
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Shield Standard
&lt;/h3&gt;

&lt;p&gt;The free bouncer at the door. Stops the most common brute-force network floods (L3/L4). Always on, you do nothing, costs nothing.&lt;/p&gt;

&lt;h3&gt;
  
  
  Shield Advanced
&lt;/h3&gt;

&lt;p&gt;The paid security team with specialists. Handles sophisticated DDoS including application-layer attacks — think HTTP floods that look like real traffic. You also get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A dedicated &lt;strong&gt;DDoS Response Team&lt;/strong&gt; you can actually call&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost protection&lt;/strong&gt; if an attack causes runaway scaling costs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-time attack visibility&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Protects exactly &lt;strong&gt;5 resource types&lt;/strong&gt; — EC2, ELB, CloudFront, Route 53, Global Accelerator. API Gateway, Lambda, Elastic Beanstalk? Not covered.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;🧠 Mnemonic — Shield Advanced's 5 protected resources&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;strong&gt;E&lt;/strong&gt;very &lt;strong&gt;E&lt;/strong&gt;lastic &lt;strong&gt;C&lt;/strong&gt;loud &lt;strong&gt;R&lt;/strong&gt;uns &lt;strong&gt;G&lt;/strong&gt;lobally&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;EC2 · ELB · CloudFront · Route 53 · Global Accelerator&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  WAF — A Completely Different Animal
&lt;/h3&gt;

&lt;p&gt;WAF doesn't care about flood volume. It reads the &lt;em&gt;content&lt;/em&gt; of HTTP/HTTPS requests and blocks based on rules you write:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Specific IPs or IP ranges&lt;/li&gt;
&lt;li&gt;SQL injection patterns&lt;/li&gt;
&lt;li&gt;Requests from specific countries&lt;/li&gt;
&lt;li&gt;AWS Managed Rules (pre-built OWASP Top 10, bot protection, etc.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Attaches to: &lt;strong&gt;CloudFront, ALB, API Gateway, AppSync&lt;/strong&gt; — not EC2 directly.&lt;/p&gt;




&lt;h2&gt;
  
  
  🚧 WAF vs NACLs vs Security Groups
&lt;/h2&gt;

&lt;p&gt;All block traffic. Completely different jobs.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;WAF&lt;/th&gt;
&lt;th&gt;NACLs&lt;/th&gt;
&lt;th&gt;Security Groups&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Layer&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;L7 (HTTP/HTTPS content)&lt;/td&gt;
&lt;td&gt;L3/L4 (IP, port)&lt;/td&gt;
&lt;td&gt;L3/L4 (IP, port)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Reads&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;URL, headers, body, cookies&lt;/td&gt;
&lt;td&gt;IP address, port&lt;/td&gt;
&lt;td&gt;IP address, port&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Lives on&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CloudFront / ALB / API Gateway&lt;/td&gt;
&lt;td&gt;VPC subnet boundary&lt;/td&gt;
&lt;td&gt;EC2 instance&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Rules&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Allow/block by content&lt;/td&gt;
&lt;td&gt;Allow AND deny&lt;/td&gt;
&lt;td&gt;Allow only&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Stateful?&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;—&lt;/td&gt;
&lt;td&gt;❌ Stateless&lt;/td&gt;
&lt;td&gt;✅ Stateful&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;💡 The one-liner&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;WAF = what's &lt;em&gt;inside&lt;/em&gt; the request. NACLs + Security Groups = &lt;em&gt;where&lt;/em&gt; it comes from and on what port. Separate tools, separate problems, often used together.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  💾 EBS vs EFS vs S3 — How Does Your App See the Storage?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  EBS — Elastic Block Store
&lt;/h3&gt;

&lt;p&gt;Acts like a hard drive plugged into your EC2 instance. One instance, one AZ. Your OS formats and mounts it. Data persists after stop.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;🧠 Think: &lt;em&gt;"My server's hard drive"&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  EFS — Elastic File System
&lt;/h3&gt;

&lt;p&gt;Acts like a shared network drive. Multiple EC2 instances across multiple AZs can mount it simultaneously. Auto-scales, no capacity to manage.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;🧠 Think: &lt;em&gt;"Shared folder that all my servers can access"&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  S3 — Simple Storage Service
&lt;/h3&gt;

&lt;p&gt;Not a file system — an object store. You don't mount it, you call an API (PUT, GET). Flat blobs with URL keys. Massive scale, globally accessible, cheap.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;🧠 Think: &lt;em&gt;"A giant bucket of files accessible over the internet"&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;📋 Quick pick&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Temp files on one server → &lt;strong&gt;EBS&lt;/strong&gt; · Shared config files across servers → &lt;strong&gt;EFS&lt;/strong&gt; · User photos accessible anywhere → &lt;strong&gt;S3&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  ⚡ Instance Store — The One Everyone Forgets (And It's the Fastest)
&lt;/h2&gt;

&lt;p&gt;Every EC2 host machine has real physical disks attached to it. Instance Store lets your instance use those disks directly — no network hop, just raw disk. EBS &lt;em&gt;feels&lt;/em&gt; local but still goes over the network. That's why Instance Store wins on speed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The catch:&lt;/strong&gt; data only exists while the instance runs. Stop it, terminate it, or if the hardware fails — gone. Not a debate, just gone.&lt;/p&gt;

&lt;p&gt;It's included in the EC2 instance price — no extra charge.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;📋 Exam trigger words&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;"fault-tolerant" · "can handle failures" · "distributed architecture" · "highest I/O performance" · "lowest latency storage" → &lt;strong&gt;Instance Store&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  💰 Cost &amp;amp; Usage Report — The Billing Data Firehose
&lt;/h2&gt;

&lt;p&gt;Think of it as a massive CSV delivered to an S3 bucket with every single charge broken down by hour, resource, tag, and account. The most granular billing data AWS produces — built for analysts and BI tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Billing tools ranked by detail level:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Pricing Calculator  →  estimate before you build (no real data)
Budgets             →  set thresholds, get alerts
Cost Explorer       →  charts/graphs of actual spend, up to 13 months back
Cost &amp;amp; Usage Report →  raw data firehose, most detailed of all ⬅ this one
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;📋 Exam trigger words&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;"detailed cost breakdown per resource" · "feed billing data into a BI tool" → &lt;strong&gt;Cost &amp;amp; Usage Report&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  🔐 All Five Security Services — Cleanly Separated
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Service&lt;/th&gt;
&lt;th&gt;One job&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Shield&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Protects against DDoS volume attacks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;WAF&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Reads HTTP content and blocks bad web requests&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;GuardDuty&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ML-powered threat detection — watches logs, finds suspicious behavior&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inspector&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Scans your EC2/containers for known software vulnerabilities (CVEs)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Macie&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Finds sensitive data (PII, credentials) hiding in your S3 buckets&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;🧠 GuardDuty vs Inspector — the most common mix-up&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;strong&gt;GuardDuty&lt;/strong&gt; watches &lt;em&gt;behavior&lt;/em&gt; — someone is &lt;em&gt;doing&lt;/em&gt; something suspicious. Reactive/detective.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;strong&gt;Inspector&lt;/strong&gt; looks at what's &lt;em&gt;installed&lt;/em&gt; — this software &lt;em&gt;has&lt;/em&gt; a known vulnerability. Proactive/preventive.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;strong&gt;Macie&lt;/strong&gt; trigger: any question mentioning "PII" or "sensitive data in S3" → it's Macie, every time.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;p&gt;&lt;em&gt;That's the whole picture. Bookmark it, share it, argue with it in the comments.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
