MCY 612 Cloud Security Assignment 2: VPC

MCY 612 Cloud Security Assignment 2: VPC

You have learned the security group in the cloud computing class and learned the NACL (Network Access Control List) in this module. The security group and the NACL are two security mechanisms. They can control network traffic. In the discussion assignment, you have studied the differences between the security group and the NACL. Before this assignment, please make sure to complete the discussion assignment. In this assignment, you will give an example to show one difference between the security group and the NACL. An architecture diagram, a visual representation that maps out your AWS implementation, is a good way to communicate your example. You will draw an architecture diagram to show how you implement your example. You will implement your example with AWS CLI commands.

Requirements

  1. You need to clearly describe an example, which shows one difference between the security group and the NACL.
  2. You need to draw an AWS architecture diagram to illustrate how you implement the example. You need to draw the diagram with an official collection of AWS architecture icons at https://aws.amazon.com/architecture/icons/.
  3. You need to implement your example with AWS CLI.

Report

For this assignment, you need to turn in a report in a word document to the Canvas. The report must include all of the sections listed below.

  1. Title Page (5 points) containing the title of the assignment, your name, the name of the class, your instructor’s name, and the date the assignment was submitted.
  2. Introduction (10 points) Describe your example in words and an architecture diagram.
  3. Materials (5 points) List all materials used in the assignment, including AWS CLI, VM, EC2 images, security group, NACL, VPC, your AWS Access Key ID, and your AWS Secret Access Key (Note: you only need to show the last five characters of your AWS Access Key ID and the last five characters of your AWS Secret Access Key. For example, the AWS Access Key ID is *********AMPLE.).
  4. Methods (45 points) Describe the steps completed during your investigation. Be sufficiently detailed so that anyone could read this section and duplicate your efforts. You need to provide all your CLI commands and their outputs.
  5. Testing (20 points) Show your CLI implementation in the method section is correct. Describe the testing steps. Be sufficiently detailed so that anyone could understand your testing.
  6. Conclusion (10 points) A short summary of the assignment, including its purpose and the meaning of your results.
  7. References (5 points) List any references that you used during the course of your assignment.