Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
In Cloud Computing Last updated: March 3, 2022
Share on:
Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

Here we list out most of the common abbreviations/acronyms used in AWS and cloud computing.

I started learning AWS and came across a lot of acronyms, which I was not aware of, so I thought to put together the list here. As and when I learn the new one, I will add it here.

Have you started learning Cloud Computing yet?


AWSAmazon Web Services
Amazon ESAmazon Elasticsearch Service
AMIAmazon Machine Image
APIApplication Programming Interface
AIArtificial Intelligence
ACLAccess Control List
ALBApplication Load Balancer
 ARN Amazon Resource Name
AZAvailability Zone
ACMAWS Certificate Management
ASGAuto Scaling Group
AESAdvanced Encryption System
ADFSActive Directory Federation Service
AVXAdvanced Vector Extensions


BYOLBring Your Own License


CDNContent Delivery Network
CRCCyclic Redundancy Check
CLICommand Line Interface
CIDR Classless Inter-Domain Routing
CORS Cross Origin Resource Sharing
CRR Cross Region Replication
CI/CDContinuous Integration/Continuous Deployment


DMSDatabase Migration Service
DNSDomain Name System
DDoSDistributed Denial of Service
DoSDenial of Service
DaaSDesktop as-a-Service


EC2Elastic Compute Cloud
ECSEC2 Container Service
ECRElastic Container Registry
EFSElastic File System
EIElastic Inference
ENAElastic Network Adapter
EKSElastic Kubernetes Service
EBSElastic Block Store
EMRElastic MapReduce
ELBElastic Load Balancing
EFAElastic Fabric Adapter
 EIPElastic IP
 EDAElectronic Design Automation
ENIElastic Network Interface
ECUEC2 Compute Unit


FIFOFirst In First Out
FaaSFunction as-a-Service


HPCHigh-Performance Compute
HVMHardware Virtual Machine
 HTTP Hypertext Transfer Protocol
 HDK Hardware Development Kit


IAMIdentity & Access Management
iOTInternet Of Things
S3 IAS3 Infrequent Access
iSCSIInternet Small Computer Storage Interface
IOPSInput/Output Operation Per Second
 IGW Internet Gateway
 ICMP Internet Control Message Protocol
 IPInternet Protocol
 IPSecInternet Protocol Security


JSONJavaScript Object Notation


KMSKey Management Service
KVMKernel-based Virtual Machine


LBLoad Balancer
LCULoad Balancer Capacity Unit


MFAMulti-Factor Authentication
MSTSCMicrosoft Terminal Service Client
MPP Massive Parallel Processing
MITMMan in the Middle Attack
MPLSMulti Protocol Label Switching


NFSNetwork File System

NSName Server NAT Network Address Translation NVMe Non-Volatile Memory Express


OLTPOnline Transaction Processing
OLAPOnline Analytics Processing
OCIOpen Container Initiative


PCI DSSPayment Card Industry Data Security Standard
PVMPara Virtual Machine
PaaSPlatform as a Service


RAIDRedundant Array of Independent Disk

RDSRelational Database Service
RRSReduced Redundancy Storage
RIReserved Instance
RAMRandom-access Memory
RIERuntime Interface Emulator


SSEServer Side Encryption

S3Simple Storage Service
S3 RTCS3 Replication Time Control
SRRSame Region Replication
SMSServer Migration Service
SWFSimple Workflow Service
SESSimple Email Service
SNSSimple Notification Service
SQSSimple Queue Service
SESSimple Email Service
SLAService Level Agreement
SSLSecure Socket Layer
SOAStart of Authority
SDKSoftware Development Kit
SSHSecure Shell
SARServerless Application Repository
SRDScalable Reliable Datagrams
SSOSingle Sign-On
SAMLSecurity Assertion Markup Language
SCPService Control Policies
SCAStorage Class Analysis
STSSecurity Token Service
SNIServer Name Indication


TTLTime To Live
TLSTransport Layer Security
TPMTrusted Platform Module
TMETotal Memory Encryption
TPMTechnical Program Manager
TPSTransaction Per Second
TCPTransmission Control Protocol


VPCVirtual Private Cloud
VMVirtual Machine
VTLVirtual Tape Library
VPNVirtual Private Network
VLANVirtual Local Area Network
VDIVirtual Desktop Infrastructure
VPGVirtual Private Gateway


WAFWeb Application Firewall
  • Chandan Kumar
    As the founder of Geekflare, I’ve helped millions to excel in the digital realm. Passionate about technology, I’m on a mission to explore the world and amplify growth for professionals and businesses alike.
Thanks to our Sponsors
More great readings on Cloud Computing
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • is an all-in-one work OS to help you manage projects, tasks, work, sales, CRM, operations, workflows, and more.
    Try Monday
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder