<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Priyank Bagad</title>
    <description>The latest articles on Forem by Priyank Bagad (@priyankbagad).</description>
    <link>https://forem.com/priyankbagad</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1277682%2F40278656-829d-4011-9d81-dc2101c96fa6.jpeg</url>
      <title>Forem: Priyank Bagad</title>
      <link>https://forem.com/priyankbagad</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/priyankbagad"/>
    <language>en</language>
    <item>
      <title>IAM Best Practices &amp; Shared Responsibility Model</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Tue, 20 Feb 2024 10:38:48 +0000</pubDate>
      <link>https://forem.com/priyankbagad/iam-best-practices-shared-responsibility-model-11gm</link>
      <guid>https://forem.com/priyankbagad/iam-best-practices-shared-responsibility-model-11gm</guid>
      <description>&lt;h3&gt;
  
  
  IAM Guidelines &amp;amp; Best Practices
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Don't use the root account except for AWS account setup.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;One physical user = One AWS user&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Assign users to group and assign permissions to groups&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a strong password policy&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use and enforce the use of Multi Factor Authentication (MFA)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create and use Roles for giving permissions to AWS Services&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use Access Keys for Programmatic Access (CLI/SDK)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Audit permissions of your account using IAM Credentials Report &amp;amp; IAM Access Advisor&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Never share IAM user &amp;amp; Access Keys&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Shared Responsibility Model for IAM
&lt;/h3&gt;

&lt;p&gt;In AWS, the Shared Responsibility Model is a crucial concept that defines the division of security responsibilities between AWS and its customers. Specifically for IAM, here's how the shared responsibility model applies: &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. AWS Responsibility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Infrastructure (global network security)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configuration and vulnerability analysis&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Compliance validation&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Customer Responsibility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Users, Groups, Roles, Policies management and monitoring&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enable MFA on all accounts&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rotate all your keys often&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use IAM tools to apply appropriate permissions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Analyze access patterns &amp;amp; review permissions.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>IAM Roles and Security Tools Overview</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Tue, 20 Feb 2024 05:27:59 +0000</pubDate>
      <link>https://forem.com/priyankbagad/iam-roles-and-security-tools-overview-39dh</link>
      <guid>https://forem.com/priyankbagad/iam-roles-and-security-tools-overview-39dh</guid>
      <description>&lt;h3&gt;
  
  
  IAM Roles for AWS Services:
&lt;/h3&gt;

&lt;p&gt;IAM roles are a vital component of AWS security, enabling you to delegate access to AWS resources securely. Here’s what you need to know:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Definition&lt;/strong&gt;: IAM roles are entities with permissions to perform tasks in AWS. They are not associated with a specific user but are assumed by entities such as AWS services, EC2 instances, or users from another AWS account.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Key Concepts&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Trust Policy&lt;/strong&gt;: Specifies who or what can assume the role.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Permissions Policy&lt;/strong&gt;: Defines the permissions granted to the role.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Role Session&lt;/strong&gt;: When a role is assumed, it creates a temporary session with temporary security credentials.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Use Cases&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Granting EC2 instances access to other AWS services without embedding credentials.&lt;/li&gt;
&lt;li&gt;Enabling AWS Lambda functions to access specific resources.&lt;/li&gt;
&lt;li&gt;Facilitating cross-account access between AWS accounts.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Best Practices&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Follow the principle of least privilege.&lt;/li&gt;
&lt;li&gt;Regularly review and update IAM roles.&lt;/li&gt;
&lt;li&gt;Use IAM policy conditions for granular control.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  IAM Security Tools:
&lt;/h3&gt;

&lt;p&gt;AWS offers several security tools to enhance IAM security and protect against unauthorized access:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;IAM Access Analyzer&lt;/strong&gt;: Analyzes resource policies to help administrators identify and fix unintended access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Policy Simulator&lt;/strong&gt;: Allows you to test and validate IAM policies to ensure they grant the intended permissions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Credential Report&lt;/strong&gt;: Provides a detailed list of all users and their associated credentials, helping administrators monitor and manage IAM users effectively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Organizations&lt;/strong&gt;: Enables centralized management of multiple AWS accounts, allowing you to apply IAM policies across all accounts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Single Sign-On (SSO)&lt;/strong&gt;: Simplifies IAM management by providing single sign-on access to multiple AWS accounts and business applications using existing corporate credentials.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Security Hub&lt;/strong&gt;: Provides a comprehensive view of security alerts and compliance status across AWS accounts, including IAM-related findings.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>cloudpractitioner</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>AWS Essentials: Access Keys, CLI Commands, and SDK Mastery</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Sun, 18 Feb 2024 14:41:37 +0000</pubDate>
      <link>https://forem.com/priyankbagad/aws-essentials-access-keys-cli-commands-and-sdk-mastery-2a5</link>
      <guid>https://forem.com/priyankbagad/aws-essentials-access-keys-cli-commands-and-sdk-mastery-2a5</guid>
      <description>&lt;p&gt;In the realm of cloud computing, Amazon Web Services (AWS) stands tall as a pioneer, offering a vast array of services to cater to diverse business needs. Whether you're managing infrastructure, deploying applications, or analyzing data, AWS provides a robust ecosystem to support your endeavors. Central to interacting with AWS programmatically are access keys, the AWS Command Line Interface (CLI), and Software Development Kits (SDKs). In this guide, we'll delve into these essential components, exploring their functionalities, best practices, and how they streamline AWS operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Understanding AWS Access Keys&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
AWS access keys serve as credentials for accessing AWS programmatically, enabling users to interact with AWS services via APIs, CLI, or SDKs. There are two types of access keys:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Access Key ID:&lt;/strong&gt;&lt;/em&gt; A unique identifier for an AWS user or programmatic access entity.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Secret Access Key:&lt;/em&gt;&lt;/strong&gt; A secure token used alongside the access key ID for authentication.&lt;br&gt;
Access keys are crucial for security and access management in AWS. It's imperative to safeguard them and adhere to best practices, including:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Rotating Access Keys:&lt;/em&gt;&lt;/strong&gt; Regularly rotate access keys to mitigate the risk of unauthorized access.&lt;br&gt;
Restricting Permissions: Assign minimal necessary permissions to access keys to follow the principle of least privilege.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Avoiding Hardcoding Keys:&lt;/strong&gt;&lt;/em&gt; Refrain from hardcoding access keys in source code or scripts to prevent inadvertent exposure.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;AWS Command Line Interface (CLI):&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
The AWS CLI is a unified tool that provides a command-line interface for managing AWS services. It offers a convenient way to interact with AWS without requiring extensive programming knowledge. Some key features of the AWS CLI include:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Ease of Installation:&lt;/strong&gt;&lt;/em&gt; The AWS CLI is easy to install and configure on various operating systems.&lt;br&gt;
Comprehensive Command Set: It offers a broad range of commands to interact with different AWS services, facilitating automation and scripting.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Integration with IAM:&lt;/strong&gt;&lt;/em&gt; The AWS CLI seamlessly integrates with AWS Identity and Access Management (IAM), allowing users to manage access keys and permissions.&lt;br&gt;
To get started with the AWS CLI, users need to install it on their local machine, configure access keys, and then begin executing commands to manage AWS resources efficiently.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;AWS SDKs&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
AWS SDKs provide language-specific APIs for interacting with AWS services programmatically. They offer developers a higher level of abstraction compared to the CLI, allowing for seamless integration of AWS functionalities into applications. Key benefits of AWS SDKs include:&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Language Support:&lt;/strong&gt;&lt;/em&gt; AWS SDKs are available for various programming languages, including Python, Java, JavaScript, .NET, and more, catering to diverse development environments.&lt;br&gt;
Feature Parity: SDKs ensure feature parity with AWS services, enabling developers to leverage the full spectrum of AWS capabilities within their applications.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Error Handling and Retry Logic:&lt;/em&gt;&lt;/strong&gt; SDKs come equipped with error handling mechanisms and built-in retry logic, enhancing the resilience of applications interacting with AWS services.&lt;br&gt;
Developers can integrate AWS SDKs into their applications by including the respective SDK dependencies, configuring access keys, and leveraging the provided APIs to interact with AWS services seamlessly.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudcomputing</category>
      <category>cloudpractitioner</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Double Down on Security: IAM MFA in AWS</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Sun, 18 Feb 2024 14:25:58 +0000</pubDate>
      <link>https://forem.com/priyankbagad/double-down-on-security-iam-mfa-in-aws-4p4a</link>
      <guid>https://forem.com/priyankbagad/double-down-on-security-iam-mfa-in-aws-4p4a</guid>
      <description>&lt;p&gt;&lt;strong&gt;Identity and Access Management (IAM) Multi-Factor Authentication (MFA)&lt;/strong&gt; in Amazon Web Services (AWS) is a crucial security feature that adds an extra layer of protection to your AWS resources. In today's digital landscape, where cyber threats are constantly evolving, traditional username and password authentication alone may not be sufficient to protect sensitive data and resources from unauthorized access. MFA addresses this vulnerability by requiring users to provide additional verification beyond their credentials, typically in the form of a temporary authentication code.&lt;/p&gt;

&lt;p&gt;IAM MFA works by prompting users to provide a second form of authentication, usually a one-time password (OTP) generated by a hardware or software token, in addition to their regular username and password. This means that even if an attacker manages to steal or guess a user's credentials, they would still need access to the secondary authentication method to gain entry.&lt;/p&gt;

&lt;p&gt;Enabling IAM MFA can significantly enhance the security posture of your AWS environment, particularly for privileged accounts with access to sensitive data or critical infrastructure. By implementing MFA, organizations can effectively mitigate the risk of unauthorized access, data breaches, and other security incidents.&lt;/p&gt;

&lt;p&gt;To enable IAM MFA in AWS, administrators can simply navigate to the IAM console, select the user for whom they want to enable MFA, and follow the prompts to set up the additional authentication method. Users can choose between various MFA options supported by AWS, including virtual MFA devices, hardware MFA devices, or SMS-based MFA.&lt;/p&gt;

&lt;p&gt;Once enabled, users will be required to provide their MFA code in addition to their regular credentials whenever they attempt to access AWS resources. This adds an extra layer of security without significantly impacting user experience, as the authentication process remains relatively seamless.&lt;/p&gt;

&lt;p&gt;In conclusion, IAM MFA is a critical security feature in AWS that helps protect against unauthorized access and strengthens overall security posture. By implementing MFA, organizations can bolster their defenses and reduce the risk of security breaches and data loss in their AWS environments.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloudpractitioner</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>Understanding AWS Identity and Access Management (IAM)</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Sun, 11 Feb 2024 16:01:31 +0000</pubDate>
      <link>https://forem.com/priyankbagad/understanding-aws-identity-and-access-management-iam-2oom</link>
      <guid>https://forem.com/priyankbagad/understanding-aws-identity-and-access-management-iam-2oom</guid>
      <description>&lt;p&gt;**Identity and Access Management (IAM) **in AWS is a crucial global service that enables you to securely control access to AWS services and resources. Root account created by default, shouldn't be used or shared. It allows you to manage users, groups, and roles to define who can access specific resources and what actions they can perform within your AWS environment.&lt;br&gt;
In AWS Identity and Access Management (IAM), users can be grouped together for easier management of permissions and access control. Grouping users allows administrators to assign common permissions to multiple users simultaneously, streamlining the process of managing access within an organization. Users don't have to belong to a group, and user can belong to multiple groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM Permissions :&lt;/strong&gt;&lt;br&gt;
IAM permissions in AWS define what actions users, groups, and roles can perform on AWS resources. These permissions are governed by policies, which are JSON documents that specify the actions allowed or denied and the resources to which those permissions apply. In AWS, you apply least privilege principle: don't give more permissions than a user needs.  &lt;/p&gt;

</description>
      <category>iam</category>
      <category>aws</category>
      <category>cloudcomputing</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>Navigating the AWS Landscape: Understanding Regions, Availability Zones, and Points of Presence for Optimal Cloud Performance!</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Sun, 11 Feb 2024 07:28:14 +0000</pubDate>
      <link>https://forem.com/priyankbagad/navigating-the-aws-landscape-understanding-regions-availability-zones-and-points-of-presence-for-optimal-cloud-performance-54a4</link>
      <guid>https://forem.com/priyankbagad/navigating-the-aws-landscape-understanding-regions-availability-zones-and-points-of-presence-for-optimal-cloud-performance-54a4</guid>
      <description>&lt;p&gt;Amazon Web Services (AWS) operates a global infrastructure that spans multiple geographic regions, availability zones, and points of presence. Let's break down each of these components:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1) AWS Regions:&lt;/strong&gt;&lt;br&gt;
AWS regions are physical locations around the world where AWS clusters data centers. Each region is designed to be completely isolated from other regions, both in terms of network connectivity and power supply. AWS regions are further divided into availability zones. Example : "&lt;em&gt;US East (Northern Virginia)&lt;/em&gt;," commonly referred to as "&lt;em&gt;us-east-1&lt;/em&gt;"&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;How do you choose an AWS Region?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Compliance with data government &amp;amp; legal requirements (Data never leaves a region without your explicit permission)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Proximity to customer (Reduced Latency)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Available service within a region (New services &amp;amp; new features aren't available in every region)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pricing (Varies region to region)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2) AWS Availability Zones:&lt;/strong&gt;&lt;br&gt;
Availability zones are distinct locations within an AWS region that are engineered to be isolated from failures in other availability zones. They are connected through low-latency links, but each availability zone is physically separate, typically housed in different data centers. Deploying applications across multiple availability zones ensures high availability and fault tolerance. It provides redundancy in case of failures within a single zone. For instance, in the AWS US East (Northern Virginia) region (us-east-1), an example of an availability zone could be "us-east-1a". &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3)AWS Points of Presence (PoPs):&lt;/strong&gt;&lt;br&gt;
AWS Points of Presence are edge locations where AWS has infrastructure to improve the performance and availability of services for end-users. These PoPs primarily consist of Amazon CloudFront edge locations, which are used for content delivery network (CDN) services to cache and deliver content closer to users, reducing latency and improving user experience. AWS also operates other types of PoPs for services like AWS Direct Connect, which provides private connectivity between customer data centers and AWS infrastructure.&lt;/p&gt;

&lt;p&gt;In summary, AWS regions provide the foundation for AWS services and are comprised of multiple availability zones for fault tolerance and high availability. Points of Presence enhance the performance and availability of AWS services by bringing them closer to end-users through edge locations, primarily for content delivery and network connectivity.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudcomputing</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>Unveiling the Power of Cloud Computing: Characteristics, Types, Advantages , and Problem-Solving Capabilities!</title>
      <dc:creator>Priyank Bagad</dc:creator>
      <pubDate>Sat, 10 Feb 2024 17:29:53 +0000</pubDate>
      <link>https://forem.com/priyankbagad/unveiling-the-power-of-cloud-computing-characteristics-types-advantages-and-problem-solving-capabilities-1ad3</link>
      <guid>https://forem.com/priyankbagad/unveiling-the-power-of-cloud-computing-characteristics-types-advantages-and-problem-solving-capabilities-1ad3</guid>
      <description>&lt;p&gt;&lt;strong&gt;Cloud computing&lt;/strong&gt; refers to the delivery of computing services—including servers, storage, databases, networking, software, and more—over the internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale. Rather than owning and maintaining physical data centers and servers, cloud computing allows individuals and organizations to access computing resources on a pay-as-you-go basis, scaling up or down as needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Characteristics of Cloud Computing :&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
1) On demand self service.&lt;br&gt;
2) Broad network access.&lt;br&gt;
3) Multi-tenancy and resource pooling.&lt;br&gt;
4) Rapid elasticity and scalability&lt;br&gt;
5) Measured Service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;There are different types of cloud computing services:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Infrastructure as a Service (IaaS):&lt;/em&gt; Offers virtualized computing resources over the internet, providing virtual machines, storage, and networking.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Platform as a Service (PaaS):&lt;/em&gt; Provides a platform allowing customers to develop, run, and manage applications without dealing with infrastructure management.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Software as a Service (SaaS):&lt;/em&gt; Delivers software applications over the internet on a subscription basis, eliminating the need for users to install and maintain software locally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Advantages of Cloud Computing:&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
1) Shift from CAPEX to OPEX.&lt;br&gt;
2) Cloud computing allows resources to be scaled up or down based on demand. This means that organizations can easily adjust their computing resources to accommodate changes in workload without having to invest in and manage physical infrastructure.&lt;br&gt;
3) Cloud computing follows a pay-as-you-go model, where users only pay for the resources they consume. This eliminates the need for large upfront investments in hardware and allows organizations to optimize their spending based on actual usage.&lt;br&gt;
4) Increased speed and agility.&lt;br&gt;
5) Stop spending money running &amp;amp; maintaining data centers.&lt;br&gt;
6) Go global in minutes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Problems solved by the Cloud :&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
1)Flexibility 2)Cost effectiveness 3)Scalability 4)Elasticity 5) High-availability &amp;amp; Fault Tolerance 6) Agility&lt;/p&gt;

</description>
      <category>cloudcomputing</category>
      <category>aws</category>
      <category>cloudpractitioner</category>
    </item>
  </channel>
</rss>
