Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
In Cloud Computing Last updated: March 3, 2022
Share on:
Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

Here we list out most of the common abbreviations/acronyms used in AWS and cloud computing.

I started learning AWS and came across a lot of acronyms, which I was not aware of, so I thought to put together the list here. As and when I learn the new one, I will add it here.

Have you started learning Cloud Computing yet?

A

AWSAmazon Web Services
Amazon ESAmazon Elasticsearch Service
AMIAmazon Machine Image
APIApplication Programming Interface
AIArtificial Intelligence
ACLAccess Control List
ALBApplication Load Balancer
 ARN Amazon Resource Name
AZAvailability Zone
ACMAWS Certificate Management
ASGAuto Scaling Group
AESAdvanced Encryption System
ADFSActive Directory Federation Service
AVXAdvanced Vector Extensions

B

BYOLBring Your Own License

C

CDNContent Delivery Network
CRCCyclic Redundancy Check
CLICommand Line Interface
CIDR Classless Inter-Domain Routing
CORS Cross Origin Resource Sharing
CRR Cross Region Replication
CI/CDContinuous Integration/Continuous Deployment

D

DMSDatabase Migration Service
DNSDomain Name System
DDoSDistributed Denial of Service
DoSDenial of Service
DaaSDesktop as-a-Service

E

EC2Elastic Compute Cloud
ECSEC2 Container Service
ECRElastic Container Registry
EFSElastic File System
EIElastic Inference
ENAElastic Network Adapter
EKSElastic Kubernetes Service
EBSElastic Block Store
EMRElastic MapReduce
ELBElastic Load Balancing
EFAElastic Fabric Adapter
 EIPElastic IP
 EDAElectronic Design Automation
ENIElastic Network Interface
ECUEC2 Compute Unit

F

FIFOFirst In First Out
FaaSFunction as-a-Service

H

HPCHigh-Performance Compute
HVMHardware Virtual Machine
 HTTP Hypertext Transfer Protocol
 HTTPS HTTP Secure
 HDK Hardware Development Kit

I

IAMIdentity & Access Management
iOTInternet Of Things
S3 IAS3 Infrequent Access
iSCSIInternet Small Computer Storage Interface
IOPSInput/Output Operation Per Second
 IGW Internet Gateway
 ICMP Internet Control Message Protocol
 IPInternet Protocol
 IPSecInternet Protocol Security
IaaSInfrastructure-as-a-Service

J

JSONJavaScript Object Notation

K

KMSKey Management Service
KVMKernel-based Virtual Machine

L

LBLoad Balancer
LCULoad Balancer Capacity Unit

M

MFAMulti-Factor Authentication
MSTSCMicrosoft Terminal Service Client
MPP Massive Parallel Processing
MITMMan in the Middle Attack
MPLSMulti Protocol Label Switching

N

NFSNetwork File System

NSName Server NAT Network Address Translation NVMe Non-Volatile Memory Express

O

OLTPOnline Transaction Processing
OLAPOnline Analytics Processing
OCIOpen Container Initiative

P

PCI DSSPayment Card Industry Data Security Standard
PVMPara Virtual Machine
PVParaVirtual
PaaSPlatform as a Service

R

RAIDRedundant Array of Independent Disk

RDSRelational Database Service
RRSReduced Redundancy Storage
RIReserved Instance
RAMRandom-access Memory
RIERuntime Interface Emulator

S

SSEServer Side Encryption

S3Simple Storage Service
S3 RTCS3 Replication Time Control
SRRSame Region Replication
SMSServer Migration Service
SWFSimple Workflow Service
SESSimple Email Service
SNSSimple Notification Service
SQSSimple Queue Service
SESSimple Email Service
SLAService Level Agreement
SSLSecure Socket Layer
SOAStart of Authority
SDKSoftware Development Kit
SSHSecure Shell
SARServerless Application Repository
SRDScalable Reliable Datagrams
SSOSingle Sign-On
SAMLSecurity Assertion Markup Language
SaaSSoftware-as-a-Service
SaaSSecurity-as-a-Service
SCPService Control Policies
SCAStorage Class Analysis
STSSecurity Token Service
SNIServer Name Indication

T

TTLTime To Live
TLSTransport Layer Security
TPMTrusted Platform Module
TMETotal Memory Encryption
TPMTechnical Program Manager
TPSTransaction Per Second
TCPTransmission Control Protocol

V

VPCVirtual Private Cloud
VMVirtual Machine
VTLVirtual Tape Library
VPNVirtual Private Network
VLANVirtual Local Area Network
VDIVirtual Desktop Infrastructure
VPGVirtual Private Gateway

W

WAFWeb Application Firewall
  • Chandan Kumar
    Author
    As the founder of Geekflare, I’ve helped millions to excel in the digital realm. Passionate about technology, I’m on a mission to explore the world and amplify growth for professionals and businesses alike.
Thanks to our Sponsors
More great readings on Cloud Computing
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Monday.com is an all-in-one work OS to help you manage projects, tasks, work, sales, CRM, operations, workflows, and more.
    Try Monday
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder