Sunday 2 April 2023

SAP Security Interview Questions and Answers

 

  • Fiori and HANA DB

  • 1.       What is different type of deployment model? - hub vs Embedded
  • 2.       Types of Apps in Fiori? - Fact vs analysis vs Navigation
  • 3.       What are groups and catalogue?
  • 4.       T-code to activate services in Fiori? /N/IWFND/MAINT_SERVICE
  • 5.       What is BPC and its type? standard and Embedded
  • 6.       Mandatory Basic services to load Fiori Launchpad? Page, builder and interoop
  • 7.       What is front end and backend services name? - iwsg(front) and iwsv(back)
  • 8.       What are diff type of role in HANA? -Design time and run time
  • 9.       Diff type of HANA privileges?
  • 10.   What is imp of checking grant role checkbox?
  • 11.   What is diff BW on HANA and Bw4HANA?
  • 12.   Why has SAP provided Spaces and Pages concept over Group and Catalogue?
  • 13.   What is the main advantage of using Spaces and Pages in Fiori? 

  • BI Security -
  • 1.       What is different level of access in hierarchy type characteristics?
  • 2.       Table for analysis auth?
  • 3.       What is Colon (:) and Hash (#) in AA?
  • 4.       Diff Auth object to execute query in BW? -  S_RS_COMP, S_RA_COMP1, A_RS_FOLD
  • 5.       Auth Object to Restrict Query access? S_RS_AUTH
  • 6.       step by step BI security? - https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security

  • ECC Security-
  • 1.       What is diff between su24 and su25?
  • 2.       Steps of su25?
  • 3.       Custom T-code creation process?
  • 4.       Auth objects used for table access.
  • 5.       Monthly activities to perform in system
  • 6.       Difference between S_PROGRAM and S_DEVELOP
  • 7.       Critical Auth object in security? S_ADMIN_FCD (Spool admin), S_DATASET (OS file)
  • S_DEVELOP (Debug access), S_USER_GRP, S_USER_AUTH, S_USER_PRO
  • 8.       Background job auth objects? S_BTCH_ADM, S_BTCH_NAM, S_BTCH_JOB
  • 9.       how to delete a role?
  • 10.   Difference between Data/Enabler role vs Task Role?
  • 11.   Imp tables for derived, composite and single roles?
  • 12.   What happen if we transport role along with user assignment? If user exist/not exist in receiver
  • 13.   What is difference between composite role and business Role
  • 14.   What are the audit activities u know
  • 15.   How to find user email id in ECC
  • 16.   What are diff types of licenses SAP Grant
  • 17.   What is diff between user group in address and group tab in SU01?
  • 18.   What is diff in SUIM for searching T-code in Transaction and Auth object using S_Tcode?
  • 19.   What is the use of personalization tab
  • 20.   What is diff between role and profile
  • 21.   What are different colour code in PFCG
  • 22.   diff modes of PFCG? - when they used
  • 23.   Diff type of Org fields in SAP
  • 24.   t-code to create custom T-code? - SE93
  • 25.   T-code to Transport? and how transport works in SAP? Data Files and Co-files
  • 26.   Type of Transport request? - Custom, Workbench, TOC

  • GRC
  • 1.       Critical action vs critical permission
  • 2.       What is risk? And its type
  • 3.       Diff stages of MSMP? And how it flows
  • 4.       Where to keep the notification mgs? Se61
  • 5.       What are fields present in end user personalization?
  • 6.       What are diff types of GRC Sync jobs
  • 7.       Max number of functions for a risk in GRC?5
  • 8.       How to make/process for custom risk in GRC?
  • 9.       What is diff between centralize and decentralize FFID
  • 10.   Advantage and disadvantage of types of FFID
  • 11.   How to make sure if user is not login with FFID in plugin system
  • 12.   What is Remediation and Mitigation
  • 13.   How to set the mitigation controller/ID? assign to Risk
  • 14.   What are FFowner, FF controller, FFusers
  • 15.   What are diff FF Parameter
  • 16.   What is diff between FF id based and Role based
  • Miscellaneous-
  • http://basisandsecurity.blogspot.com/2015/07/sap-security-interview-questions-and.html
Will Add further on this-

Friday 31 March 2023

BW 7.4 To BW/4HANA Security Auth Conversion Steps In Details (Remote Conversion)


1.    Objective

With SAP BW/4HANA, SAP has re-architected its solution for modern data warehousing processes that the ever-increasing digitization of the world demands. Re-architecting a solution that has been growing over the past 20 years and has, at points, evolved into different data structures and architectures means that we also have to decide on one data structure and architecture as we move forward. This is the only way that we can prepare the solution for increased simplicity and faster innovation cycles.

The purpose of this document is to explain the end-to-end Authorization conversion process with which you can transition from your existing SAP Business Warehouse to the next-generation data warehouse solution: SAP BW/4HANA.

2.    Description

SAP provides three paths for the conversion from SAP BW to SAP BW/4HANA, the so-called “In-place Conversion”, “Remote Conversion”, and “Shell Conversion”.

The Remote Conversion approach enables you to move whole data flow or transfer only selected data flows including the data from SAP BW 7.3 with any DB to a new installation of SAP BW/4HANA. You are able decide whether you want to build a clean system, leave old and unused objects behind, and reduce unnecessary layers of your data warehouse. If applicable, the Remote Conversion process includes a Unicode conversion. Carve-out scenarios are also supported.

The Remote Conversion is available for SAP BW 7.3 and later releases. Among other ad- vantages, this approach only includes objects that will remain relevant going forward and saves you the effort of converting your database. It thus represents the chance to build a clean system, leave old and unused objects behind while migrating to SAP BW/4HANA system.

      The simplification of object types in SAP BW/4HANA has an impact on authorization objects. When converting a SAP BW system to a SAP BW/4HANA, authorizations for object types that are not available in SAP BW/4HANA (like Info Cubes) must be replaced by authorizations for corresponding object types (like ADSO).  

3.    Transfer Cockpit (RSB4HCONV)

The Authorization Transfer Tool uses the existing roles in your system. It will create copies of these roles while preserving original ones. Conversion rules for authorization objects are then applied on top of these role copies. After the conversion of objects using the Scope Transfer Tool, both original and created roles will be assigned to the users. After confirmation of authorization object conversion and a successful system conversion to SAP BW/4HANA, you can then remove original roles manually.

Any required actions on the authorization objects can be carried out only after the transfer of their corresponding SAP BW objects is done in the system via the BW/4HANA transfer toolbox. (especially for object types adjust and replace). The transfer of the SAP BW object must be done usi7ng the Scope Transfer Tool. The transfer runs will provide the information required to adjust or replace the authorization objects in the selected roles:

·       Mapping of new names and types of converted Info Providers, transformations, etc.

·       Names of additional Info Providers created (e.g., Composite Provider for Datastore objects (advanced) with navigational attributes)

4.    System Landscape   

 

Sender system Name

BW 7.4

Receiver system Name

BW4HANA

Target OS version

SLES 15 Sp01

Hana DB version (Target DB)

HANA 2.0 SP05 Rev 53

Source System Application

NETWEAVER 7.4

Target System Application

BW/4HANA 2.0 SP08

 

5.    Prerequisite

5.1.   Understanding Sender System

User Master data details to be exported in excel to replicate in Target Sandbox from Sender system like user address data, user role mapping sheet, list of analysis authorizations

To execute the object conversion process using the BW/4HANA transfer toolbox (transaction RSB4HTRF), SAP recommend adding few authorization objects and values as in reference note 2383530.This SAP template role will be required in all BW systems in the landscape as the BW/4HANA conversion needs to be executed.

Master Role will contain all DMIS related Authorization that is requires in Sender system environment for running BW4HANA Cockpit Once implemented, please assign only to project team members responsible for the conversion of the BW objects.

The SAP template role details in present in note 2280336. For our project we have created custom role below 

5.2.   SAP BW/4HANA Conversion Cockpit Execution Users

SAP BW/4HANA Conversion Cockpit Execution user access required for the SAP BW/4HANA Conversion Cockpit. This is a composite role for execution expert users with complete project administration authorizations. It contains the authorizations required in source environment by project Team members 

5.3.   Communication RFC User

The SAP BW/4HANA Conversion Cockpit does not come with fixed destinations or usernames. An RFC destination from the original SAP BW system and target SAP BW/4HANA system needs to be created using process tree step “Define RFC Destination”. Users in RFC destinations need to have the require authorizations in sender and target as specified in the Excel

5.4.   SAPOSS Connection User

SAP BW needs to open SAP connection to connect to SAP for that creation of SAPOSS User id and Role as per suggestion given by SAP in sender. Refer link http://wiki.scn.sap.com/wiki/x/EQlSGQ for details Auth required.

5.5.   Delta Authorizations required in BW4 Environment

Several Delta Authorizations created as part of migration activity in Target environment that is required by developer to work for the scope collection and remediation task. These are created based on the requirement from BW and BPC project admin Team.

5.6.1       BW4HANA Modeler Role

The BW/4HANA Modeler connects source systems, model’s data flows, performs data transfer processes, and schedules process chains. This takes place in the development system.

The BW/4HANA Modeler role has the following authorizations:

         Create/change/delete data flows, Info Objects, Info Providers (Datastore object, Composite Provider, Open ODS view), transformations, data transfer processes and process chains in the BW Modeling tools and on the back end

         Administration of Info Providers

         Execute data transfer processes

         Schedule process chains

         Transport objects on existing transport requests

5.6.2       ABAP Developer role

The role is required to use the BW Modeling Tools. Role that contains all authorizations to display and browse ABAP development objects. it is mainly used by BW and BPC folks for Remediation purpose in the Target Environment. This role can only be assigned to folks involving in Remediation.

5.6.3       BW/BPC Delta Auth Role

There are several Authorizations which are not present in Modeler either in BW support maintenance and those are required as part of migration for Scope collection, Migration and Remediation Purpose of BW/BPC Developer. Those all authorizations are collected in BW delta role and BPC Delta Role which will finally merge in Modeler role for BW and BPC respectively

6.    Preparing Transfers of Standard Authorizations

            6.1 Conversion Rules of Authorization Objects

Conversion from SAP BW to SAP BW/4HANA also requires conversion of authorization objects, SAP have defined four types of actions that need to be applied for respective authorization objects impacted by the conversion process using the BW/4HANA transfer toolbox and the migration to BW/4HANA:

·       Assume – Nothing to do. Authorizations will continue to work after conversion

·       Adjust – Check and adapt values of authorization objects

·       Replace – Change authorization object and adapt its values

·       Obsolete – Not needed/supported authorization object that should be remove

SAP NOTE 2468657 shows the authorizations objects used in SAP BW and not available in SAP BW/4HANA. The SAP BW/4HANA Transfer Cockpit provides an Authorization Transfer Tool to automate the transfer of existing security roles

            6.2 Copy Principle

The Authorization Transfer Tool uses already existing roles in your system. It will create copies of these roles while preserving original ones. Conversion rules for authorization objects are then applied on top of these role copies. After the conversion of objects using the Scope Transfer Tool, both original and created roles will be assigned to the users. After confirmation of authorization object conversion and a successful system conversion to SAP BW/4HANA, you can remove original roles.


              

7.    HANA DB Privileges

When a user accesses the SAP HANA database using a client interface (for example, ODBC, JDBC, or HTTP), his or her ability to perform database operations on database objects is determined by the privileges that he or she has been granted.

All the privileges granted to a user, either directly or indirectly through roles, are combined. This means that whenever a user tries to access an object, the system performs an authorization check on the user, the user's roles, and directly granted privileges. It is not possible to explicitly deny privileges. This means that the system does not need to check all the user's privileges. As soon as all requested privileges have been found, the system skips further checks and grants access. Several privilege types are used in SAP HANA (system, object, analytic, package, and application)

8.    Realization

 

8.1  Transport Analysis Auth And Roles

Transport the user master data from Sender system – Sender systems new target sandbox BW/4HANA along with user assignment.

8.2  Validating Analysis Authorizations and Roles

Check and confirm if all Auth Relevant Characteristics and roles exist in Target Environment also make sure all AA is activated in Target system.

8.3  Standard Transfer Auth

Execute program RS_B4HTAU_CREATE_RUN for creation of run Id and execution of Standard Transfer Authorizations using SE38

8.4  Run Id

Create a Run ID (Reciever_RUNID1) run id is a name for bunch of roles we need to convert at a same time


8.5  Suffix settings

Perform the initial setting for user assignment and the suffix to be used for newly created roles. Here we have used BW4 as suffix for new roles

8.6  Original Roles

Select and upload original roles (SAP BW Roles) that needs to be converted. Below are the roles       



8.7  Execute the Initial run

For each role, a new mapping name is created, and the role is scanned for authorization objects with defined “assume” or “obsolete” rules.



8.8  BW Object Migration

Wait for the BW team for completion of the BW/4HANA object migration before starting Delta Execution

8.9  Execute Delta Run

After the successful transfer of objects using the Scope Transfer Tool, the transfer of standard authorizations must be completed using a delta run.

The system will retrieve the details of related scope transfer runs and scan the original roles for authorization objects with defined “adjust” or “replace” rules. Authorization objects with “replace” rule are checked for conflicts. Then the roles copies are adjusted according to the defined rules.



8.10                Generate Target Roles

The system will generate the new roles and offers the possibility assign them to the same users as the corresponding original roles. the newly created roles with Suffix B4H in Target BW/4HANA system.



8.11                Review the prepared mapped roles and authorizations

Review and compare the roles which are newly created vs the once present in sender BW system. Also check and confirm the necessary actions have been taken on objects in SAP Note 2468657

Once the complete system is converted to SAP BW/4HANA, you should delete the original roles (they are inconsistent anyway, since they contain obsolete authorization objects).

8.12                 Enhancement 

Adjust the newly created BW objects (Info Providers) in Analysis Authorization manually in converted security BW4Hana support roles.

Once the complete system is converted to SAP BW/4HANA, you should delete the original roles (they are inconsistent anyway, since they contain obsolete authorization objects).

9.    Finalization

All the SECURITY activities for Remote Conversion have been captured in this document.

10. References

SAP BW4HANA 2.0 Conversion Guide and Experience

https://help.sap.com/doc/999ae5f8c578402dab1fea94fa4599f9/2.0/en-US/SAP_BW4HANA_20_Conversion_Guide.pdf

 

 Please Comment for feedback :)


Saturday 28 January 2023

S4HANA Migration Security Authorization Steps Summary And Trick To Remember For Interview

 SUMMARY STEPS for S4HANA MIGRATION

1) Select Migration Approach - To decide which approach is selected 

Basically there can 3 approaches- 

a) System Conversion (aka “Brownfield-Approach”) or Inplace conversion

b) New Implementation (aka “Greenfield-Approach”) or  Shell conversion

c) Selective Data Transition to SAP S/4HANA or Remote conversion


2) Define Scope Of Upgrade - creating sow's showcasing inclusion of Fiori and HANA-DB


3) Backup Roles Before Executing Su25 - this step most useful for Inplace conversion


4) Consensus/Agreement -  Document for process design proposals.

Includes how to handle Dual maintenance Activities and Parallel run , there should be process to adapt the new BW4 roles and authorization present while having existing system working(mostly in case of Remote Conversion)


5) Simplification List - you can get it from SAP Note . List showcasing details of all the auth changes going to happen in S4HANA


6) Review Table - PRGN2_CORR2, Prog - PROFGEN_CORR_REPORT_2 and the table ABLM_BLACKLIST for the changes in the release


7) SU24_AUTO_REPAIR - Execute program to repair inconsistencies between su21 and su24 for  authorizations fields


8) Timestamp - Execute report Su25_INITIALIZE_TSTMP to initialize timestamp logic for su25


9) SU25 Upgrade - Perform security upgrade using T-code su25


10) Review Output of Su25 -Step 2b and 2d and decide weather to accept new transaction codes or continue with old 


11) Su25 - Step 2c - Adjust Authorizations in role directly in step 2C or using PFCG


12) Transport Role - Create transport for su24 changes using su25- step 3


Finally Create transport of Roles 

To remember above steps remember - AS BCS TS TS 2BDC T

A-approach, S- scope, B- backup, C- consensus, S- simplification list, T- table, S- su24 repair

T- timestamp, S-su25,2b-2d-2c, T- transport


Please comment and provide your valuable feedback if you like my post


Thursday 30 December 2021

AWS Services Summary

Name of the Service

Definition

Artifact

AWS Artifact is a resource for compliance-related information. It provides on-demand access to AWS’ security and compliance reports and select online agreements

Athena

Amazon Athena is an interactive query service that makes it easy to analyze data in Amazon S3 using standard SQL.

Bootstrapping

Bootstrapping is the execution of automated actions to services such as EC2 and RDS. This is typically in the form of scripts that run when the instances are launched.

Budgets

AWS Budgets gives you the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed)

Certificate Manager"

AWS Certificate Manager" service is used for creating SSL/TLS certificates for use with HTTPS connections.

Cloud Directory

Amazon Cloud Directory enables you to build flexible cloud-native directories for organizing hierarchies of data along multiple dimensions.

Cloud Formation

AWS CloudFormation provides a common language for you to model and provision AWS and third party application resources in your cloud environment.Infrastructure as a Code

Cloud9

"AWS Cloud9" is a cloud-based integrated development environment (IDE) that lets you write, run, and debug your code with just a browser

CloudFormation

AWS CloudFormation" is used to deploy resources through code, as a service, it does not include preconfigured servers.

CloudHSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

CloudTrail

AWS CloudTrail is a web service that records activity made on your account and delivers log files to an Amazon S3 bucket. CloudTrail is for auditing whereas CloudWatch is for performance monitoring.

CloudWatch

Amazon CloudWatch" : service performs performance monitoring

CloudWatch Logs

Amazon CloudWatch Logs lets you monitor and troubleshoot your systems and applications using your existing system, application and custom log files

Code Commit

CodeCommit is a fully-managed source control service that hosts secure Git-based repositories. It makes it easy for teams to collaborate on code in a secure and highly scalable ecosystem.

Code Deploy

"AWS CodeDeploy is a deployment service that automates application deployments to Amazon EC2 instances, on-premises

CodeStar"

CodeStar" enables you to quickly develop, build, and deploy applications on AWS. AWS CodeStar provides a unified user interface, enabling you to easily manage your software development activities in one place.

Comprehend

Amazon Comprehend identifies the language of the text; extracts key phrases, places, people, brands, or events; understands how positive or negative the text is; analyzes text using tokenization and parts of speech; and automatically organizes a collection of text files by topic.

Containers

Containers are packaged software that runs in a Docker image. Services such as Amazon ECS and Fargate can run Docker containers.

Cost Explorer

AWS Cost Explorer is a free tool that allows you to view charts of your costs

Cross-Region Replication

S3 Cross-Region Replication is used for copying data between regions, not into AWS. It is also unsuitable for moving such as huge amount of data.

Database Migration Service

AWS Database Migration Service is used to migrate databases to AWS quickly and securely. The source database remains fully operational during the migration, minimizing downtime to applications that rely on the database. The AWS Database Migration Service can migrate data to and from most widely used commercial and open-source databases.

Database Migration Service (DMS)

AWS Database Migration Service (DMS) helps you migrate databases to AWS quickly and securely

Direct Connect

AWS Direct Connect provides a low-latency, high bandwidth connection to connect customer on-premise environments with the AWS cloud which allows them to create a “hybrid” cloud architecture.

DynamoDB

Amazon DynamoDB is fully managed and can be scaled without incurring downtime. DynamoDB scales horizontally and it does so seamlessly.

EBS volume

An EBS volume is a block storage device that is most similar to a virtual hard disk in the cloud as when attached to an instance it appears as a local disk that can have an operating system installed on or be formatted and used for any other local storage purpose.

Ec2 Dedicated host

Is a physical server with EC2 instance capacity full dedicated for your use. Dedicated hosts allow you to use existing per socket, per core, Per VM software licenses

Elastic Beanstalk

 AWS Elastic Beanstalk  can be used to quickly deploy and manage applications in the AWS Cloud.

Elastic Block Store (EBS)

Amazon Elastic Block Store (EBS) is a block-based storage system that provides a “virtual hard disk in the cloud”. You can back up your EBS volumes using snapshots which are point-in-time copies of the data.

Elastic Compute Cloud (EC2)

The Amazon Elastic Compute Cloud (EC2) provides elastic web-scale computing in the cloud allowing you to deploy instances running the Windows and Linux operating systems.

Elastic Container Registry (ECR)

Amazon Elastic Container Registry (ECR) is a fully-managed Docker container registry that makes it easy for developers to store, manage, and deploy Docker container images

Elastic Container Service

Amazon Elastic Container Service (ECS) is a highly scalable, high performance container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances.

Elastic File Storage (EFS) filesystem

"Amazon Elastic File Storage (EFS) filesystem is an EFS filesystem is mounted over the NFS protocol which is a file-level protocol. Therefore, it is a network filesystem

Elastic File System (EFS)

Amazon Elastic File System (EFS) provides an NFS filesystem for usage by EC2 instances. Amazon Elastic File System allows you to connect hundreds or thousands of EC2 instances concurrently and is accessed using the file-level NFS protocol.

Elastic IP address

An Elastic IP address is a static IPv4 address designed for dynamic cloud computing. An Elastic IP address is associated with your AWS account. With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the address to another instance in your account.

Elastic Map Reduce (EMR)

Amazon Elastic Map Reduce (EMR) provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances.

Elastic Transcoder

Amazon Elastic Transcoder is a highly scalable, easy to use and cost-effective way for developers and businesses to convert (or “transcode”) video and audio files from their source format into versions that will playback on devices like smartphones, tablets and PCs.

ElastiCache

Amazon ElastiCache offers fully managed Redis and Memcached database services.

Elasticsearch

Amazon Elasticsearch Service is a fully managed service that makes it easy for you to deploy, secure, operate, and scale Elasticsearch to search, analyze, and visualize data in real-time. Elasticsearch is based on open source software.

Glacier Deep Archive

Amazon S3 Glacier Deep Archive is a  storage class  suited to archival and takes several hours to restore data.

Glue"

AWS Glue"  is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics.

Golden Images

Golden Images are snapshots of pre-configured EBS volumes that can be used to launch new instances. You do this using Amazon Machine Images (AMIs).

GuardDuty

Amazon GuardDuty offers threat detection and continuous security monitoring for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.

Identity and Access Management (IAM)

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely

Inspector

"Using AWS Inspector" is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS.

Interntet Gateway

Horizontally scaled, redundant, and highly available VPC Component that allows communications between instances in your VPC and the internet.

IOT Core

Lets connected devices easily and securely interact with cloud applications.

Key Management Service (KMS)

AWS Key Management Service (KMS) gives you centralized control over the encryption keys used to protect your data.

Kinesis

Amazon Kinesis makes it easy to collect, process, and analyze real-time, streaming data so you can get timely insights and react quickly to new information.

LightSail

AWSLightSail provides preconfigured virtual private servers (instances) that include everything required to deploy and application or create a database. LightSail includes everything you need to launch your project quickly – a virtual machine, SSD-based storage, data transfer, DNS management, and a static IP.

Machine Images (AMI)

Amazon Machine Images (AMI) store configuration information for Amazon EC2 instances.

Macie

Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect sensitive data in AWS.

Managed Services

AWS Managed Services manages the daily operations of your AWS infrastructure in alignment with ITIL processes. AWS Managed Services provides a baseline integration with IT Service Management (ITSM) tools such as the ServiceNow platform.

Neptune

Amazon Neptune is a fast, reliable, fully-managed graph database service that makes it easy to build and run applications that work with highly connected datasets. With Amazon Neptune, you can create sophisticated, interactive graph applications that can query billions of relationships in milliseconds.

Object Life Cycle Management

Allows you to set rules to automatically transfer objects between different storage classes at defined time intervals

OpsWorks

AWS OpsWorks is a configuration management service that provides managed instances of Chef and Puppet. Chef and Puppet are automation platforms that allow you to use code to automate the configurations of your servers. OpsWorks lets you use Chef and Puppet to automate how servers are configured, deployed, and managed across your Amazon EC2 instances or on-premises compute environments,

Organizations

AWS organizations allow you to consolidate multiple AWS accounts into an organization that you create and centrally manage. Each paying account is an independent entity and is not able to access resources of other accounts in the Organization. The billing is performed centrally on the root account in the AWS Organization

Personal Health Dashboard

AWS Personal Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that may impact you.

Personal Health Dashboard

AWS Personal Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that may impact you. While the Service Health Dashboard displays the general status of AWS services, Personal Health Dashboard gives you a personalized view into the performance and availability of the AWS services underlying your AWS resources.

QuickSight

Amazon QuickSight is a fast, cloud-powered business intelligence service that makes it easy to deliver insights to everyone in your organization.

RedShift

 Amazon RedShift is a data warehouse. With a data warehouse you load data from other databases such as transactional SQL databases and run analysis. You can analyze data using SQL and Business Intelligence tools.

Rekognition

Amazon Rekognition makes it easy to add image and video analysis to your applications. You just provide an image or video to the Rekognition API, and the service can identify the objects, people, text, scenes, and activities, as well as detect any inappropriate content.

Reserved Instance

Reserved Instances (RI) provide a significant discount (up to 72%) compared to On-Demand pricing and provide a capacity reservation when used in a specific Availability Zone. The following types of RI are available:Standard RIs: These provide the most significant discount (up to 75% off On-Demand) and are best suited for steady-state usage  :Convertible RIs: These provide a discount (up to 54% off On-Demand) and the capability to change the attributes of the RI as long as the exchange results in the creation of Reserved Instances of equal or greater value. Like Standard RIs, Convertible RIs are best suited for steady-state usage.

Route53 Health Check

Monitor the health and performance of your web applications , web server and other resources.

S3 Event Notifications

Amazon S3 Event Notifications is a feature that notifies you when certain events happen in your S3 buckets

S3 One Zone-IA

S3 One Zone-IA is for data that is accessed less frequently, but requires rapid access when needed. Unlike other S3 Storage Classes which store data in a minimum of three Availability Zones (AZs), S3 One Zone-IA stores data in a single AZ and costs 20% less than S3 Standard-IA.....S3 One Zone-IA is ideal for customers who want a lower-cost option for infrequently accessed data but do not require the availability and resilience of S3 Standard or S3 Standard-IA........It’s a good choice for storing secondary backup copies of on-premises data or easily re-creatable data. You can also use it as cost-effective storage for data that is replicated from another AWS Region using S3 Cross-Region Replication.

Secrets Manager

AWS Secrets Manager" service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

Security Token Service (STS)

AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users.

Service Catalog

AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures

Shield

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service.

Simple Queue Service (Amazon SQS)

Amazon Simple Queue Service (Amazon SQS) is a web service that gives you access to message queues that store messages waiting to be processed. SQS offers a reliable, highly-scalable, hosted queue for storing messages in transit between computers. SQS is used for distributed/decoupled application.

Snowball

WS Snowball you can move up to 80TB per device. AWS call this a “petabyte-scale data transfer service”.

Snowmobile

With AWS Snowmobile you can move 100PB per snowmobile. AWS call this an “Exabyte-scale data transfer service”.

SNS

 Amazon SNS is used for building and integrating loosely-coupled, distributed applications.

SWF

Amazon SWF helps developers build, run, and scale background jobs that have parallel or sequential steps. You can think of Amazon SWF as a fully-managed state tracker and task coordinator in the Cloud.

Systems Manager

 AWS Systems Manager gives you visibility and control of your infrastructure on AWS. Systems Manager provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.

tag

A tag is a label that you assign to an AWS resource. Each tag consists of a key and an optional value, both of which you define. Tags enable you to categorize your AWS resources in different ways, for example, by purpose, owner, or environment

Transcribe

Amazon Transcribe is an automatic speech recognition (ASR) service that makes it easy for developers to add speech-to-text capability to their applications

Transfer Acceleration

S3 Transfer Acceleration is meant speed up uploads to Amazon S3 but would not be used for exabytes of data.

Transit Gateway

AWS Transit Gateway is used to connect Amazon Virtual Private Clouds (VPCs) and on-premises networks to a single gateway for connecting multiple VPCs and on-premises networks.

Trusted Advisor

AWS Trusted Advisor is an online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment.

WAF is a web application firewall

AWS WAF is a web application firewall that protects against common exploits that could compromise application availability, compromise security or consume excessive resources.

Workflow automation

Workflow automation is a process or orchestrating automated actions. This is associated with services such as Chef and Puppet or AWS OpsWorks.

X-Ray

AWS X-Ray helps developers analyze and debug production, distributed applications, such as those built using a microservices