Welcome to AWS Services Demo!

Glacier
AWS Glacier used for archive storage
Athena
AWS Athena used for quering objects in S3
DynamoDB
AWS DynamoDB full managed NoSQL database
DynamoDB
AWS DynamoDB full managed NoSQL database
Lambda Authorizers
Lambda Authorizers is used to control access to your API methods
Amazon Redshift
Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud.
Long polling
Eliminate empty responses by allowing Amazon SQS to wait until a message is available in a queue before sending a response. Unless the connection times out, the response to the ReceiveMessage request contains at least one of the available messages, up to the maximum number of messages specified in the ReceiveMessage action.
AWS Secrets Manager
AWS Secrets Manager is an AWS service that makes it easier for you to manage secrets. Secrets can be database credentials, passwords, third-party API keys, and even arbitrary text.
IAM Access Analyzer
It helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity. This lets you identify unintended access to your resources and data, which is a security risk.
Trust policy
- Trust policies define which principal entities (accounts, users, roles, and federated users) can assume the role. An IAM role is both an identity and a resource that supports resource-based policies. For this reason, you must attach both a trust policy and an identity-based policy to an IAM role.
VPC Flow Logs
VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC
Security Groups
Security Groups are stateful, so allowing inbound traffic to the necessary ports enables the connection. Network ACLs are stateless, so you must allow both inbound and outbound traffic
Access Advisor feature on IAM console
- To help identify the unused roles, IAM reports the last-used timestamp that represents when a role was last used to make an AWS request. Your security team can use this information to identify, analyze, and then confidently remove unused roles..

AWS Services