This module covers the foundational concepts that underpin all AWS services. Everything else in this course builds on these ideas. A senior engineer who truly understands regions, availability zones, and pricing models will make better architecture decisions than someone who memorizes every service name but does not understand the underlying infrastructure. Understanding these concepts is essential for designing reliable, cost-effective architectures.What You’ll Learn:
AWS global infrastructure and how to choose regions
Availability Zones and designing for high availability
AWS pricing models and cost optimization strategies
A Region is a geographical area containing multiple data centers. Each region is completely independent and isolated from other regions.
┌─────────────────────────────────────────────────────────────────────────┐│ AWS Global Infrastructure (2025) │├─────────────────────────────────────────────────────────────────────────┤│ ││ 🌎 Americas (10 Regions) ││ ───────────────────────── ││ us-east-1 N. Virginia ⭐ Largest, most services ││ us-east-2 Ohio 💰 Lower cost alternative ││ us-west-1 N. California 🌉 West coast presence ││ us-west-2 Oregon 💰 Cost-effective, green energy ││ ca-central-1 Canada 🍁 Canadian data residency ││ sa-east-1 São Paulo 🇧🇷 South America ││ ││ 🌍 Europe, Middle East, Africa (10 Regions) ││ ────────────────────────────────────────── ││ eu-west-1 Ireland ⭐ Largest EU region ││ eu-west-2 London 🇬🇧 UK data residency ││ eu-central-1 Frankfurt 🇩🇪 GDPR compliance hub ││ eu-north-1 Stockholm 🌱 100% renewable energy ││ me-south-1 Bahrain 🏜️ Middle East ││ af-south-1 Cape Town 🌍 Africa ││ ││ 🌏 Asia Pacific (12 Regions) ││ ──────────────────────────── ││ ap-northeast-1 Tokyo ⭐ Largest APAC region ││ ap-northeast-2 Seoul 🇰🇷 South Korea ││ ap-southeast-1 Singapore 🌏 Southeast Asia hub ││ ap-southeast-2 Sydney 🦘 Australia/NZ ││ ap-south-1 Mumbai 🇮🇳 India ││ cn-north-1 Beijing 🇨🇳 China (separate partition) ││ │└─────────────────────────────────────────────────────────────────────────┘
Choose the region closest to your users for lowest latency
Compliance
Data residency laws may require specific regions (GDPR, HIPAA)
Service Availability
Not all services are available in all regions—check first
Pricing
Prices vary by region (us-east-1 is often cheapest)
# Decision matrix for region selectiondef choose_region(requirements): """ Priority order for choosing AWS region: 1. Compliance requirements (legal/regulatory) 2. Latency to primary users 3. Service availability 4. Pricing considerations """ # Example: E-commerce app for European customers if requirements.get('gdpr_required'): return 'eu-west-1' # Ireland - GDPR compliant if requirements.get('primary_users') == 'asia': return 'ap-southeast-1' # Singapore - APAC hub if requirements.get('cost_sensitive'): return 'us-east-1' # Usually cheapest return 'us-east-1' # Default - most services, largest
Pro Tip: us-east-1 (N. Virginia) is the oldest and largest AWS region. New services launch here first, but it’s also the most crowded. Consider us-east-2 (Ohio) for similar pricing with less congestion.
Each region has multiple Availability Zones (typically 3-6). Each AZ is one or more discrete data centers with redundant power, networking, and connectivity.
Edge Locations are AWS data centers designed to deliver content to end users with low latency. There are 400+ edge locations worldwide.Services using Edge Locations:
CloudFront (CDN) - Cache static and dynamic content
Route 53 (DNS) - Low-latency DNS resolution
AWS Global Accelerator - Optimized routing
Lambda@Edge - Run code at edge locations
┌────────────────────────────────────────────────────────────────────┐│ Edge Location Architecture │├────────────────────────────────────────────────────────────────────┤│ ││ User in Paris User in Tokyo ││ │ │ ││ ▼ ▼ ││ ┌──────────────┐ ┌──────────────┐ ││ │ Edge: Paris │ │ Edge: Tokyo │ ││ │ (< 10ms) │ │ (< 10ms) │ ││ └──────┬───────┘ └──────┬───────┘ ││ │ │ ││ │ Cache HIT? Serve locally │ ││ │ Cache MISS? Fetch origin │ ││ │ │ ││ └────────────────┬────────────────┘ ││ │ ││ ▼ ││ ┌─────────────────┐ ││ │ Origin Server │ ││ │ (us-east-1) │ ││ └─────────────────┘ ││ ││ Result: Users worldwide get < 50ms latency instead of 200ms+ ││ │└────────────────────────────────────────────────────────────────────┘
Understanding pricing is crucial for cost optimization — often 40-70% of cloud spend can be optimized. The biggest savings come not from clever discounting but from turning off resources you are not using and right-sizing instances that are over-provisioned. A senior engineer would say: “The cheapest instance is the one you don’t run.”
Use unused EC2 capacity for up to 90% off. Instances can be reclaimed with a 2-minute warning. The mental model: spot instances are like standby airline tickets — you get a massive discount because you are willing to be bumped if the flight fills up. The key to using spot successfully is designing for interruption: run stateless workloads, spread across multiple instance types and AZs, and save checkpoints frequently.
# Spot Instance Strategyclass SpotStrategy: """ When to use Spot Instances: ✅ Batch processing jobs ✅ CI/CD build workers ✅ Data analysis workloads ✅ Containerized microservices ✅ Distributed computing (Hadoop, Spark) When NOT to use Spot: ❌ Databases ❌ Stateful applications ❌ Single points of failure ❌ Applications that can't handle interruption """ def calculate_savings(self, on_demand_rate, spot_rate, hours): savings = (on_demand_rate - spot_rate) * hours percent_saved = ((on_demand_rate - spot_rate) / on_demand_rate) * 100 return { 'savings': savings, 'percent_saved': f"{percent_saved:.1f}%" }# Example: c5.xlarge# On-Demand: $0.17/hour# Spot: $0.051/hour (70% off!)# Monthly savings: ($0.17 - $0.051) * 720 = $85.68/instance
Spot Best Practice: Use Spot Fleet with multiple instance types and AZs to maximize availability and minimize interruptions.
AWS security is a shared responsibility between AWS and the customer. This is the single most important security concept in cloud computing — misunderstanding it is behind the majority of cloud security breaches. The analogy: AWS provides a secure building (locks on the doors, security guards, fire suppression), but if you leave your apartment door wide open, that is your problem, not the building’s. AWS secures the infrastructure; you secure what you put on it.
Q1: What's the difference between a Region and an Availability Zone?
Answer: A Region is a geographical area (e.g., us-east-1) containing multiple isolated data center clusters called Availability Zones. AZs are physically separated but connected by low-latency fiber. Regions are completely isolated from each other.Key Points:
Region = Geographic area (e.g., N. Virginia, Ireland)
AZ = One or more data centers within a region
AZs are connected via private fiber (< 2ms latency)
Regions are isolated for fault tolerance
Q2: When would you use Spot Instances vs Reserved Instances?
Answer:Spot Instances (up to 90% off):
Fault-tolerant, stateless workloads
Batch processing, CI/CD, data analysis
Can be interrupted with 2-minute notice
Reserved Instances (up to 72% off):
Steady-state, predictable workloads
Production databases, core application servers
Commitment of 1 or 3 years
Decision Framework: If your workload can handle interruption, use Spot. If it needs guaranteed capacity, use Reserved.
Q3: Explain the Shared Responsibility Model
Answer: AWS is responsible for security of the cloud (hardware, facilities, managed services infrastructure). Customers are responsible for security in the cloud (data, applications, IAM, network configuration).Example for EC2:
Objective: Set up your AWS account following security best practices.
1
Enable MFA on Root Account
Sign in as root user
Go to IAM → Security credentials
Enable virtual MFA or hardware MFA
2
Create IAM Admin User
Create IAM user with AdministratorAccess policy
Enable MFA for this user
Use this user for all future operations
3
Set Up Billing Alerts
Go to Billing → Budgets
Create a budget for $10 (or your limit)
Set email alerts at 50%, 80%, 100%
4
Enable CloudTrail
Go to CloudTrail
Create a trail in all regions
Store logs in S3 with encryption
5
Create Account Alias
Go to IAM → Dashboard
Create a custom alias for easier sign-in
Bookmark the new sign-in URL
Checkpoint: You should now have a secure AWS account with MFA, CloudTrail logging, and billing alerts. Never use the root account again except for the few tasks that require it.