AWS Organizations allows you to consolidate multiple AWS accounts into one organization that can be centrally managed.
AWS Organizations allows you to automate AWS account creation and management and to provision resources with AWS CloudFormation Stacksets
AWS security services policies and management can help you maintain a secure environment
Access to AWS resources and services can be controlled by the government
Centrally manage policies across multiple AWS account accounts
Audit your environment to ensure compliance
With consolidated billing, you can view and manage your costs.
Configure AWS services across multiple accountsCloudFormation
Developers and system administrators have an easy way to manage and create a collection of AWS resources.
You can update, delete, or modify resources in a controlled, predictable, and orderly fashion. This is similar to applying version control to AWS infrastructure code.
CloudFormation Template is an architecture diagram in JSON format. Stack is the final result of that diagram. It is actually provisioned
Templates can be used to consistently set up resources across multiple regions.
Optional version number of the template file format
A list of optional template parameters (input values provided at stack creation time).
Optional output values, such as public IP addresses, can be provided using the Fn.:GetAtt function
An optional list of data table used to lookup static configuration value for e.g. AMI names per AD
Chef & Puppet Integration supports deployment and configuration right down to the application layer
Bootstrap scripts can be used to install files, packages, and services on EC2 instances. Simply describe them in the CF template
Automatic rollback on errors feature is enabled by default. This will cause all AWS resources that CF successfully created for a stack to be deleted up to the point that an error occurred.
Provides a WaitCondition resource that blocks the creation of additional resources until a completion signal from an external source is received
Allows the DeletionPolicy attribute of templateretain resources to be defined to preserve resources such as S3 even after stack removal
Snapshot to backup resources such as RDS after stack deletion
To indicate that a resource is created following another, use the DependsOn attribute
AWS CloudFormation’s Service role is an IAM role that allows AWS CloudFormation access to resources in a stack for the user’s account.
Nested stacks allow you to separate reusable, common components into dedicated templates. You can mix and match different templates, but use nested stacks for a single, unified stack
CloudFormation’s proposed changes to a stack are summarized in Change Sets.
Drift detection allows you to determine if a stack’s actual configuration is different or has drifted from its expected configuration.
Termination protection prevents a stack accidentally being deleted.
Stack policy can prevent unintentional updates or deletions of stack resources during a stack upgrade.
Developers can quickly deploy and manage their applications in AWS cloud.
Automated handling of the deployment details for capacity provisioning, load balancer, auto-scaling, and application health monitoring
CloudFormation supports ElasticBeanstalk
Provisions resources to support a web application that handles HTTP(S), or
a web application that handles background-processing (worker) tasks
Supports Out of the BoxApache Tomcat Java applications
Apache HTTP Server for PHP Applications
Apache HTTP server for Python apps
Nginx and Apache HTTP Server fo
AWS Management Tools Cheat sheet