Skip to content

CLF-C02: Study Notes

Comprehensive study notes for the CLF-C02 AWS Certified Cloud Practitioner certification.

← Back to Overview | ← Objectives | Exam Tips →


Domain 1: Cloud Concepts (24%)

1.1: Benefits of the AWS Cloud

Six Advantages of Cloud Computing

  1. Trade Capital Expense for Variable Expense

    • No upfront data center costs
    • Pay only for what you consume
    • Lower variable costs due to economies of scale
  2. Benefit from Massive Economies of Scale

    • AWS achieves higher economies of scale
    • Lower pay-as-you-go prices
    • Hundreds of thousands of customers = lower costs
  3. Stop Guessing Capacity

    • Scale up or down as needed
    • No expensive idle resources
    • Access as much or as little as you need
  4. Increase Speed and Agility

    • New resources in minutes, not weeks
    • Experiment quickly and cost-effectively
    • Foster innovation
  5. Stop Spending Money Running and Maintaining Data Centers

    • Focus on your business, not infrastructure
    • Let AWS handle the heavy lifting
    • Redirect resources to revenue-generating activities
  6. Go Global in Minutes

    • Deploy applications in multiple Regions worldwide
    • Provide lower latency and better experience
    • Minimal cost

Why This Matters for the Exam

Questions often test your understanding of when each benefit applies. For example, "A company wants to reduce latency for global users" → Go global in minutes.


1.2: AWS Well-Architected Framework

The framework consists of 6 pillars:

1. Operational Excellence

  • Focus: Run and monitor systems to deliver business value
  • Key Concepts:
    • Perform operations as code (Infrastructure as Code)
    • Make frequent, small, reversible changes
    • Refine operations procedures frequently
    • Anticipate failure
    • Learn from operational events

Services: CloudFormation, Systems Manager, CloudWatch, AWS Config

2. Security

  • Focus: Protect information, systems, and assets
  • Key Concepts:
    • Implement strong identity foundation
    • Enable traceability
    • Apply security at all layers
    • Automate security best practices
    • Protect data in transit and at rest
    • Keep people away from data
    • Prepare for security events

Services: IAM, KMS, GuardDuty, Security Hub, WAF, Shield

3. Reliability

  • Focus: Ensure workloads perform intended functions correctly and consistently
  • Key Concepts:
    • Automatically recover from failure
    • Test recovery procedures
    • Scale horizontally
    • Stop guessing capacity
    • Manage change through automation

Services: Auto Scaling, Multi-AZ deployments, S3, Backup, CloudFormation

4. Performance Efficiency

  • Focus: Use computing resources efficiently
  • Key Concepts:
    • Democratize advanced technologies
    • Go global in minutes
    • Use serverless architectures
    • Experiment more often
    • Consider mechanical sympathy

Services: Lambda, Fargate, Aurora Serverless, CloudFront

5. Cost Optimization

  • Focus: Avoid unnecessary costs
  • Key Concepts:
    • Implement cloud financial management
    • Adopt consumption model
    • Measure overall efficiency
    • Stop spending on undifferentiated heavy lifting
    • Analyze and attribute expenditure

Services: Cost Explorer, Budgets, Trusted Advisor, Reserved Instances, Savings Plans

6. Sustainability

  • Focus: Minimize environmental impact
  • Key Concepts:
    • Understand your impact
    • Establish sustainability goals
    • Maximize utilization
    • Use managed services
    • Reduce downstream impact

Services: S3 Intelligent-Tiering, EC2 Auto Scaling, Lambda

Common Exam Trap

Don't confuse the 6 pillars of Well-Architected Framework with the 5 characteristics of cloud computing. They're different concepts!


1.3: Cloud Migration Strategies - The 7 Rs

StrategyDescriptionWhen to UseExample
RetireDecommission applicationsApp is no longer neededLegacy apps with low usage
RetainKeep in source environmentNot ready to migrateMainframe apps requiring refactoring
Rehost"Lift and shift"Quick migration, minimal changesMove VMs to EC2 as-is
RelocateMove to AWS without changesHypervisor-level migrationVMware Cloud on AWS
RepurchaseReplace with SaaSMove to cloud-native solutionMigrate from on-prem CRM to Salesforce
Replatform"Lift, tinker, and shift"Some cloud optimizationMove to RDS instead of self-managed DB
RefactorRe-architectMaximize cloud benefitsRedesign monolith to microservices

Exam Decision Pattern

  • Fastest migration → Rehost (lift and shift)
  • Minimal changes → Rehost or Relocate
  • Moderate optimization → Replatform
  • Maximum cloud benefits → Refactor
  • Replace commercial software → Repurchase

1.4: Cloud Economics

On-Premises vs. Cloud Costs

On-Premises (Fixed Costs):

  • ❌ Server hardware purchase
  • ❌ Data center real estate
  • ❌ Cooling and power
  • ❌ IT staff for maintenance
  • ❌ Over-provisioning for peak capacity

Cloud (Variable Costs):

  • ✅ Pay for what you use
  • ✅ Scale up/down as needed
  • ✅ No upfront investment
  • ✅ Operational expenditure (OpEx) not capital (CapEx)

AWS Pricing Models

ModelDescriptionUse CaseDiscount
On-DemandPay by hour/secondShort-term, unpredictable workloadsNone
Reserved Instances (RI)1 or 3 year commitmentSteady-state applicationsUp to 75%
Spot InstancesBid on spare capacityFault-tolerant, flexible workloadsUp to 90%
Savings PlansCommit to usage ($/hour)Flexible computeUp to 72%

Critical Exam Fact

Spot Instances can be interrupted with 2-minute notice. Never use for critical, time-sensitive workloads!


Domain 2: Security and Compliance (30%)

2.1: AWS Shared Responsibility Model

┌─────────────────────────────────────────┐
│      Customer Responsibility            │
│     (Security IN the cloud)             │
│                                          │
│  • Customer data                         │
│  • Platform, applications, IAM          │
│  • Operating system, network & firewall │
│  • Client-side encryption               │
│  • Server-side encryption (optional)    │
│  • Network traffic protection           │
└─────────────────────────────────────────┘
┌─────────────────────────────────────────┐
│       AWS Responsibility                 │
│     (Security OF the cloud)             │
│                                          │
│  • Hardware / AWS Global Infrastructure │
│  • Regions, AZs, Edge Locations         │
│  • Compute, storage, database, network  │
│  • Software (hypervisor, OS for managed)│
└─────────────────────────────────────────┘

Responsibility by Service Type

Service TypeAWS ResponsibilityCustomer Responsibility
Infrastructure (EC2)Hardware, hypervisor, physical securityOS, applications, data, network config, security groups
Container (RDS)OS patching, DB installation, hardwareDB credentials, user permissions, data, encryption settings
Abstract (S3, Lambda)Everything except...Data, access policies, encryption options

Exam Pattern

"Who manages OS patches?"

  • EC2 → Customer
  • RDS → AWS
  • Lambda → AWS (no OS to patch!)

2.2: Compliance and Governance

AWS Artifact

  • Purpose: Access AWS compliance reports
  • Features:
    • Download security and compliance documents
    • AWS ISO certifications
    • SOC reports
    • PCI reports

Key Compliance Programs

ProgramIndustryWhat It Covers
HIPAAHealthcareProtected Health Information (PHI)
PCI DSSPayment cardsCredit card data security
FedRAMPUS GovernmentFederal cloud security
GDPREUData privacy and protection
SOC 1/2/3GeneralService organization controls

Common Mistake

AWS provides infrastructure compliance, but you are responsible for how you use it. Example: S3 is HIPAA-eligible, but YOU must configure encryption and access controls properly.

Encryption

At Rest:

  • Data stored on disk
  • Services: S3, EBS, RDS
  • Tool: AWS KMS (Key Management Service)

In Transit:

  • Data moving between locations
  • Protocols: TLS/SSL, HTTPS
  • Services: CloudFront, ELB

2.3: Identity and Access Management (IAM)

Core IAM Concepts

Users: Individual people or applications

  • Each has unique credentials
  • Long-term access keys (avoid if possible)

Groups: Collection of users

  • Apply policies to multiple users
  • Users can belong to multiple groups
  • Cannot nest groups

Roles: Temporary credentials for services or users

  • No permanent credentials
  • Assumed by users, applications, or AWS services
  • Best practice for EC2, Lambda, etc.

Policies: JSON documents defining permissions

json
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": "s3:GetObject",
      "Resource": "arn:aws:s3:::my-bucket/*"
    }
  ]
}

Principle of Least Privilege

Do: Grant minimum permissions needed ❌ Don't: Give admin access by default

Example:

  • Developer needs S3 read access → Grant s3:GetObject only
  • Not s3:* (all S3 actions)
  • Not AdministratorAccess policy

Multi-Factor Authentication (MFA)

Types:

  1. Virtual MFA device (app on phone) - Most common
  2. Hardware MFA device (physical token)
  3. U2F security key (YubiKey)

Critical Exam Fact

Always enable MFA for root user. This is the #1 security best practice.

IAM Best Practices

  1. ✅ Enable MFA for root account
  2. ✅ Use roles instead of access keys
  3. ✅ Apply least privilege
  4. ✅ Rotate credentials regularly
  5. ✅ Use groups to assign permissions
  6. ✅ Monitor activity with CloudTrail

2.4: Security Services

AWS Shield

  • Purpose: DDoS protection
  • Shield Standard: Free, automatic protection
  • Shield Advanced: $3,000/month, advanced protection + DDoS response team

AWS WAF (Web Application Firewall)

  • Purpose: Protect web applications from common exploits
  • Features:
    • SQL injection protection
    • Cross-site scripting (XSS) protection
    • Rate limiting
    • Geo-blocking

Amazon GuardDuty

  • Purpose: Intelligent threat detection
  • How: Analyzes logs (VPC Flow, CloudTrail, DNS)
  • Detects: Cryptocurrency mining, suspicious API calls, compromised instances

AWS Security Hub

  • Purpose: Central security and compliance view
  • Features:
    • Aggregates findings from GuardDuty, Inspector, Macie
    • Compliance checks against standards (CIS, PCI DSS)
    • Prioritized security alerts

Decision Table: Which Security Service?

ScenarioService
Protect against DDoS attacksAWS Shield
Filter web traffic by rulesAWS WAF
Detect threats across AWS accountsAmazon GuardDuty
Central security dashboardAWS Security Hub
Encrypt dataAWS KMS
Discover sensitive data in S3Amazon Macie

Domain 3: Cloud Technology and Services (34%)

3.1: Deployment and Operations

Methods of Interacting with AWS

MethodUse CaseExample
AWS Management ConsoleVisual, browser-basedBest for beginners, exploring services
AWS CLICommand-line automationScripts, DevOps workflows
AWS SDKsProgrammatic accessApplication integration (Python, Java, etc.)
AWS CloudFormationInfrastructure as CodeDeploy entire environments with templates
AWS CDKIaC with programming languagesDefine infrastructure in TypeScript, Python

Cloud Deployment Models

ModelDescriptionExample
Cloud100% on AWSStartup with no on-premises infrastructure
HybridMix of AWS and on-premisesExtend on-prem datacenter with AWS for bursting
On-PremisesPrivate cloud (not AWS)Use AWS Outposts in your datacenter

3.2: AWS Global Infrastructure

Key Components

AWS Regions

  • Geographic area with multiple AZs
  • 30+ Regions worldwide
  • Choose based on:
    • ✅ Latency (proximity to users)
    • ✅ Compliance (data residency)
    • ✅ Service availability
    • ✅ Pricing

Availability Zones (AZs)

  • One or more discrete data centers
  • Each Region has 2-6 AZs
  • Connected with high-bandwidth, low-latency networking
  • Isolated for fault tolerance

Edge Locations

  • 400+ locations worldwide
  • Used by CloudFront (CDN)
  • Cache content closer to users
  • More locations than Regions

Exam Decision Pattern

  • Low latency for users → Deploy in Region closest to users
  • High availability → Deploy across multiple AZs
  • Fast content delivery → Use CloudFront edge locations
  • Data must stay in specific country → Choose appropriate Region

3.3: Compute Services

Amazon EC2 (Elastic Compute Cloud)

Instance Types (Remember the pattern):

FamilyPurposeExample Use Case
General Purpose (T, M)Balanced CPU/memoryWeb servers, dev environments
Compute Optimized (C)High CPUBatch processing, gaming servers
Memory Optimized (R, X)High RAMDatabases, caches
Storage Optimized (I, D, H)High I/OData warehouses, Hadoop
Accelerated Computing (P, G)GPUMachine learning, graphics

Purchasing Options:

  • On-Demand: Pay by hour/second
  • Reserved: 1 or 3 year commitment
  • Spot: Bid on spare capacity (up to 90% discount)
  • Dedicated Hosts: Physical server for compliance

AWS Lambda

Serverless compute service

  • No servers to manage
  • Pay only for compute time (per millisecond)
  • Automatic scaling
  • Event-driven

Use Cases:

  • ✅ Image processing when uploaded to S3
  • ✅ Real-time file processing
  • ✅ Data transformation
  • ✅ Backends for web/mobile apps

Limits:

  • ⚠️ Max execution time: 15 minutes
  • ⚠️ Max memory: 10 GB

Container Services

ServiceDescriptionWhen to Use
Amazon ECSAWS-native container orchestrationRun Docker containers on AWS
Amazon EKSManaged KubernetesAlready using Kubernetes
AWS FargateServerless containersDon't want to manage servers for containers

AWS Elastic Beanstalk

  • Platform as a Service (PaaS)
  • Deploy applications without managing infrastructure
  • Supports: Java, .NET, Node.js, Python, Ruby, Go, Docker
  • AWS handles: Capacity provisioning, load balancing, auto-scaling, monitoring

3.4: Database Services

Decision Table: Which Database?

RequirementServiceType
Traditional SQL databaseAmazon RDSRelational
MySQL/PostgreSQL compatible, serverlessAmazon AuroraRelational
NoSQL, millisecond latency at any scaleAmazon DynamoDBNoSQL
In-memory cache (Redis/Memcached)Amazon ElastiCacheCache
Data warehouse, analytics on petabytesAmazon RedshiftData warehouse
MongoDB-compatibleAmazon DocumentDBDocument DB
Graph databaseAmazon NeptuneGraph

Amazon RDS (Relational Database Service)

Supported Engines:

  • MySQL
  • PostgreSQL
  • MariaDB
  • Oracle
  • SQL Server
  • Amazon Aurora (MySQL/PostgreSQL compatible)

Benefits:

  • ✅ Automated backups
  • ✅ Automated patching
  • ✅ Multi-AZ for high availability
  • ✅ Read replicas for scalability

Multi-AZ vs Read Replicas:

FeatureMulti-AZRead Replicas
PurposeHigh availabilityRead scalability
SynchronousYesNo (asynchronous)
Can be in different RegionNoYes
Automatic failoverYesNo
Can queryNo (standby)Yes

Amazon DynamoDB

NoSQL database

  • Key-value and document storage
  • Millisecond latency at any scale
  • Serverless (auto-scaling)
  • Fully managed

Use Cases:

  • Gaming applications (leaderboards)
  • IoT applications
  • Mobile apps
  • Real-time bidding

3.5: Networking Services

Amazon VPC (Virtual Private Cloud)

Your own isolated network in AWS

Key Components:

  • Subnets: Segment your VPC
    • Public subnet: Has internet access
    • Private subnet: No direct internet access
  • Internet Gateway (IGW): Allows internet access
  • NAT Gateway: Allows private subnets to access internet (outbound only)
  • Route Tables: Control traffic routing
  • Security Groups: Virtual firewall for instances (stateful)
  • Network ACLs: Subnet-level firewall (stateless)

Exam Trap: Security Groups vs NACLs

FeatureSecurity GroupNetwork ACL
LevelInstanceSubnet
StatefulYes (return traffic auto-allowed)No (must explicitly allow return traffic)
RulesAllow rules onlyAllow and Deny rules
DefaultDeny all inboundAllow all traffic

Amazon Route 53

AWS DNS service

  • Register domain names
  • Route users to applications
  • Health checks

Routing Policies:

  • Simple: Single resource
  • Weighted: Distribute traffic across resources
  • Latency: Route to lowest latency
  • Failover: Active-passive failover
  • Geolocation: Route based on user location

Elastic Load Balancing (ELB)

Distribute traffic across multiple targets

Types:

  1. Application Load Balancer (ALB): HTTP/HTTPS (Layer 7)
  2. Network Load Balancer (NLB): TCP/UDP (Layer 4), ultra-low latency
  3. Gateway Load Balancer: Deploy 3rd-party virtual appliances

Amazon CloudFront

Content Delivery Network (CDN)

  • Cache content at edge locations
  • Reduce latency
  • DDoS protection
  • SSL/TLS encryption

3.6: Storage Services

Decision Table: Which Storage Service?

RequirementServiceType
Object storage, static websitesAmazon S3Object
Archival, long-term backupS3 GlacierObject (archive)
Block storage for EC2Amazon EBSBlock
Shared file storage (Linux)Amazon EFSFile
Shared file storage (Windows)Amazon FSxFile
Hybrid cloud storageAWS Storage GatewayHybrid

Amazon S3 (Simple Storage Service)

Object storage service

  • Store and retrieve any amount of data
  • 11 9's of durability (99.999999999%)
  • Buckets (containers) and objects (files)

Storage Classes:

ClassUse CaseCostRetrieval Time
S3 StandardFrequently accessed$$$$Immediate
S3 Intelligent-TieringUnknown/changing accessAutoImmediate
S3 Standard-IAInfrequent access$$$Immediate
S3 One Zone-IAInfrequent, non-critical$$Immediate
S3 Glacier Instant RetrievalArchive, immediate access$Milliseconds
S3 Glacier Flexible RetrievalArchive$Minutes to hours
S3 Glacier Deep ArchiveLong-term archive¢12+ hours

Exam Pattern

  • Frequently accessed → S3 Standard
  • Infrequent access → S3 Standard-IA
  • Archive, rarely accessed → Glacier
  • Cheapest archive → Glacier Deep Archive
  • Unknown access pattern → Intelligent-Tiering

Amazon EBS (Elastic Block Store)

Block storage for EC2 instances

  • Persistent storage (survives instance stop/start)
  • Attached to single EC2 instance
  • Snapshots for backup

Volume Types:

  • gp3/gp2 (SSD): General purpose
  • io2/io1 (SSD): High performance, databases
  • st1 (HDD): Throughput-optimized, big data
  • sc1 (HDD): Cold storage, infrequently accessed

Amazon EFS (Elastic File System)

Shared file storage

  • NFS protocol
  • Thousands of EC2 instances can access simultaneously
  • Elastic (grows/shrinks automatically)
  • Linux only

3.7: AI/ML and Analytics Services

AI/ML Services

ServicePurposeExample Use Case
Amazon SageMakerBuild, train, deploy ML modelsCustom ML models
Amazon RekognitionImage and video analysisDetect objects, faces in images
Amazon LexBuild conversational interfacesChatbots
Amazon PollyText-to-speechCreate voiceovers
Amazon TranscribeSpeech-to-textGenerate captions
Amazon TranslateLanguage translationTranslate text
Amazon ComprehendNatural language processingSentiment analysis

Analytics Services

ServicePurpose
Amazon AthenaQuery S3 data with SQL (serverless)
Amazon KinesisReal-time data streaming
AWS GlueETL service (extract, transform, load)
Amazon QuickSightBusiness intelligence dashboards
Amazon EMRBig data processing (Hadoop, Spark)

3.8: Other Important Services

Application Integration

ServicePurposePattern
Amazon SNSPub/sub messagingOne message to many subscribers
Amazon SQSMessage queuingDecouple application components
Amazon EventBridgeEvent busRoute events between services

Exam Pattern

  • Fan-out (1 to many) → SNS
  • Queue/buffer between services → SQS
  • Event-driven architecture → EventBridge

Developer Tools

  • AWS CodeCommit: Git repository
  • AWS CodeBuild: Build and test code
  • AWS CodeDeploy: Automated deployments
  • AWS CodePipeline: CI/CD orchestration

Domain 4: Billing, Pricing, and Support (12%)

4.1: Pricing Models

EC2 Pricing Comparison

ModelCommitmentDiscountFlexibilityUse Case
On-DemandNone0%HighShort-term, unpredictable
Reserved1-3 yearsUp to 75%LowSteady-state apps
SpotNoneUp to 90%Low (can be terminated)Fault-tolerant workloads
Savings Plans1-3 yearsUp to 72%MediumFlexible compute usage

Free Tier

Always Free:

  • Lambda: 1M requests/month
  • DynamoDB: 25 GB storage
  • SNS: 1M publishes
  • CloudWatch: 10 metrics

12 Months Free:

  • EC2: 750 hours/month (t2.micro or t3.micro)
  • S3: 5 GB storage
  • RDS: 750 hours/month

Trials:

  • SageMaker: 2 months
  • Redshift: 2 months

4.2: Cost Management Tools

AWS Cost Explorer

  • Purpose: Visualize and analyze costs
  • Features:
    • View costs by service, region, tag
    • Forecast future costs
    • Identify cost trends
    • Recommend Reserved Instances

AWS Budgets

  • Purpose: Set custom cost and usage budgets
  • Features:
    • Email alerts when threshold exceeded
    • Budget types: Cost, usage, Reserved Instance, Savings Plans
    • Multiple alert thresholds

AWS Cost and Usage Report

  • Most detailed cost data
  • Export to S3
  • Analyze in Athena or QuickSight

Consolidated Billing (AWS Organizations)

  • One bill for multiple accounts
  • Volume discounts apply across accounts
  • Share Reserved Instances and Savings Plans

Cost Optimization Strategies

  1. ✅ Use Reserved Instances for steady workloads
  2. ✅ Rightsize instances (don't over-provision)
  3. ✅ Use S3 Intelligent-Tiering
  4. ✅ Delete unused EBS volumes and snapshots
  5. ✅ Use Auto Scaling
  6. ✅ Leverage Spot Instances where appropriate

4.3: AWS Support Plans

PlanPriceUse CaseResponse TimeTechnical Support
BasicFreeAll customersN/ANone (forums only)
Developer$29+/monthTesting/development12-24 hoursBusiness hours email
Business$100+/monthProduction workloads1 hour (urgent)24/7 phone, email, chat
Enterprise On-Ramp$5,500+/monthProduction + mission-critical30 minutes24/7 + TAM access
Enterprise$15,000+/monthMission-critical15 minutes24/7 + dedicated TAM

TAM = Technical Account Manager (proactive guidance)

AWS Trusted Advisor

Automated best practice checks

5 Categories:

  1. Cost Optimization: Idle resources, Reserved Instance recommendations
  2. Performance: Over/under-utilized resources
  3. Security: MFA on root, public S3 buckets, security groups
  4. Fault Tolerance: EBS snapshots, Multi-AZ RDS
  5. Service Limits: Approaching service quotas

Access:

  • Basic/Developer: 7 core checks
  • Business/Enterprise: All checks + API access

Quick Reference: Key Service Limits

ServiceLimitCan Increase?
S3 bucket namesGlobally uniqueN/A
EC2 instances per region20 (default)Yes (request)
Lambda execution time15 minutes maxNo
Lambda memory10 GB maxNo
S3 object size5 TB maxNo
VPCs per region5 (default)Yes

← Back to Overview | ← Objectives | Exam Tips →

Study notes for personal learning and exam preparation