Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

💪 25% OFF on ALL Reviewers to Start Your 2026 Strong with our New Year, New Skills Sale!

Amazon CloudFront

Amazon CloudFront

Last updated on December 23, 2025

Amazon CloudFront Cheat Sheet

A global content delivery network (CDN) that speeds up the distribution of your static, dynamic, and streaming web content through a worldwide network of edge locations. CloudFront routes users to the edge location with the lowest latency for optimal performance.

Key Highlights

  • Speeds up static and dynamic content delivery

  • Supports HTTP, HTTPS, WebSocket, and gRPC

  • Regional edge caches for less-popular content

  • Integrates with Lambda@Edge, CloudFront Functions, MediaPackage, MediaStore, ALB, and custom origins

  • HIPAA eligible service

  • Supports TLS 1.2, TLS 1.3, TLSv1.2_2025, TLSv1.3_2025, mutual TLS, and post-quantum key exchange algorithms

  • Pay-per-use with free tier and flat-rate pricing plans

AWS Training Amazon Cloudfront

How CloudFront Delivers Content

  • Origin servers: S3 bucket, MediaPackage, MediaStore container, ALB, Lambda function URL, EC2, or custom HTTP server

  • Distributions: Define which origins CloudFront uses and how content is delivered

  • Edge locations: CloudFront caches content at global edge locations

  • Routing: User requests go to the lowest-latency edge location

Features

Content Delivery & Caching

  • Objects cached for 24 hours by default (configurable via TTLs)

  • Tutorials dojo strip
  • Cache invalidation before expiration

  • Query string and header-based caching

  • Automatic gzip compression for supported file types

  • Origin Groups for primary/secondary failover

  • Preconfigured standard distribution settings

  • Multi-tenant distribution support for reusable configurations

Traffic & Access Management

  • Cache behaviors: Path pattern matching, origin selection, query string and header forwarding, HTTPS enforcement, signed URLs and cookies

  • Origin request policies: AWS-managed or custom policies, includes HostHeaderOnly

  • Networking & addressing: Anycast static IPs, dual-stack IPv4/IPv6, BYOIP via IPAM, IPv6 origin requests for custom origins, public CloudFront endpoints IPv6 support, VPC origin sharing across accounts

  • TLS & protocols: TLS 1.2, TLS 1.3, TLSv1.2_2025, TLSv1.3_2025, post-quantum (PQ) key exchange algorithms

Customization & Edge Compute

  • Lambda@Edge: Modify requests/responses, advanced logging controls, supports Node.js 22 and Python 3.13

  • CloudFront Functions: Lightweight edge logic; supports hostHeader, sni, allowedCertificateNames, originOverrides, CBOR Web Tokens (CWT), additional helper methods

  • Media Quality-Aware Resiliency (MQAR): Automatically selects the best-quality streaming origin

Amazon CloudFront Monitoring

  • Billing reports: High-level view of CloudFront activity across AWS

  • Usage reports: Aggregate by hour, day, or month with visual charts

  • CloudFront console reports: Cache Statistics, Popular Objects, Top Referrers, Usage, Viewers

  • AWS Config: Tracks configuration changes and evaluates compliance

  • Amazon CloudWatch: Requests, latency, error rates, CloudFront Function throttling

  • AWS CloudTrail: Captures CloudFront API calls (global service support required)

  • Server-Timing header: Measures performance from CloudFront to viewers

  • CloudFront-Viewer-TLS header: Shows TLS version and cipher used

  • Advanced access logging: Standard logging (v2), real-time logs, CMCD fields, connection-id for mutual TLS

  • CORS support: Wildcard access-control headers

  • Header-based identification: Configure header order and count to identify viewers

Amazon CloudFront Security

  • Layered protection: CloudFront + AWS Shield + AWS WAF + Route 53 (network & application-layer DDoS)

  • HTTPS / SSL/TLS: Enforced by default; advanced SSL features enabled

  • Geo-restriction: Allowlist or blocklist countries

  • Access controls: Custom HTTP headers for ALB restrictions, OAC for S3, MediaPackage, Lambda URLs, Field-Level Encryption for sensitive data

  • AWS-managed prefix lists: Restrict origin access to CloudFront IP ranges

  • Response headers policy: Remove or modify headers before sending to viewers

  • Mutual TLS (viewer): Viewer authentication with connection logging

Use Cases

  • Reduce operational overhead via centralized console and reusable distribution settings

  • Optimize performance with edge caching and dynamic routing

  • Protect content, APIs, and applications with layered security

  • Deliver high-quality media using MQAR, origin failover, and CloudFront Functions

  • Customize and monetize SaaS applications with Lambda@Edge and CloudFront Functions

Distributions & Origin Settings

  • Up to 25 origins per distribution

  • Supports:

    • Static and dynamic content

    • Video-on-demand

    • Live streaming

  • Configurable per-path cache behaviors

  • Custom domains with wildcard support (*.example.com)

  • Base path mappings for versioning and traffic migration

  • Custom error pages and error caching

  • Geographic restrictions per distribution

Amazon CloudFront Pricing

  • Charge for storage in an S3 bucket

  • Charge for serving objects from edge locations

  • Data Transfer Out: Charges apply for data transfer out to viewers

  • HTTP/HTTPS Requests

  • Invalidation Requests

  • Dedicated IP Custom SSL certificates associated with a CloudFront distribution

  • Additional surcharge for HTTPS requests with field-level encryption enabled

Compliance

  • PCI DSS validated

  • HIPAA eligible

  • SOC compliant

Free Amazon CloudFront Tutorials on YouTube:

https://www.youtube.com/user/AmazonWebServices/search?query=CloudFront

Amazon CloudFront-related Cheat Sheets:

Note: If you are studying for the AWS Certified Advanced Networking Specialty exam, we highly recommend that you take our AWS Certified Advanced Networking – Specialty Practice Exams and read our Advanced Networking Specialty exam study guide.

AWS Certified Advanced Networking Specialty Practice Exams

Validate Your Knowledge

Question 1

An online customer portal is hosted in an Amazon ECS cluster behind an Application Load Balancer. The portal is set as the origin of a CloudFront Web distribution to deliver the dynamic and static content to users in low-latency. A Cloud Engineer was assigned to configure CloudFront to communicate with your origin using HTTP or HTTPS, based on the protocol of the viewer request.

What should the Engineer implement to complete this task?

    Free AWS Courses
  1. Set the Origin Protocol policy of the CloudFront distribution to Match Viewer.
  2. Set the Origin Protocol policy of the CloudFront distribution to HTTP and HTTPS.
  3. Set the Viewer Protocol policy of the CloudFront distribution to HTTP and HTTPS.
  4. Set the Viewer Protocol policy of the CloudFront distribution to Match Viewer.

 

 

 

 

Correct Answer: 1

For web distributions, you can configure CloudFront to require that viewers use HTTPS to request your objects so that connections are encrypted when CloudFront communicates with viewers. You also can configure CloudFront to use HTTPS to get objects from your origin so that connections are encrypted when CloudFront communicates with your origin.

In CloudFront, there are 3 options that you can choose as the value for your Origin Protocol Policy:

  1. HTTP Only
  2. HTTPS Only
  3. Match Viewer.

For HTTP Only, CloudFront solely uses HTTP to access the origin. For HTTPS Only, CloudFront uses only HTTPS to access the origin and for Match Viewer, CloudFront communicates with your origin using HTTP or HTTPS, depending on the protocol of the viewer request. CloudFront caches the object only once even if viewers make requests using both HTTP and HTTPS protocols.

Take note that the term “Viewer” in CloudFront basically means the requestor or the client that sends the request. Therefore, the name: “MatchViewer” basically means that CloudFront is simply matching the protocol being used by the viewer.

Hence, the correct answer is: Set the Origin Protocol policy of the CloudFront distribution to Match Viewer.

The option that says: Set the Origin Protocol policy of the CloudFront distribution to HTTP and HTTPS is incorrect because this is not a valid value for the Origin Protocol policy. The HTTP and HTTPS type is only valid with the Viewer Protocol policy.

The option that says: Set the Viewer Protocol policy of the CloudFront distribution to HTTP and HTTPS is incorrect because you have to use the Origin Protocol policy and not Viewer Protocol.

The option that says: Set the Viewer Protocol policy of the CloudFront distribution to Match Viewer is incorrect because the Match Viewer type is only applicable if you are using an Origin Protocol policy.

References:
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-cloudfront-to-custom-origin.html

Note: This question was extracted from our AWS Certified Advanced Networking Specialty Practice Exams.

 

 

Question 2

A company wants to launch its online shopping website to give customers an easy way to purchase the products they need. The proposed setup is to host the application on an AWS Fargate cluster, utilize a Load Balancer to distribute traffic between the Fargate tasks, and use Amazon CloudFront for caching and content delivery. The company wants to ensure that the website complies with industry best practices and should be able to protect customers from common “man-in-the-middle” attacks for e-commerce websites such as DNS spoofing, HTTPS spoofing, or SSL hijacking.

Which of the following configurations will provide the MOST secure access to the website?

  1. Register the domain name on Route 53 and enable DNSSEC validation for all public hosted zones to ensure that all DNS requests have not been tampered with during transit. Use AWS Certificate Manager (ACM) to generate a valid TLS/SSL certificate for the domain name. Configure the Application Load Balancer with an HTTPS listener to use the ACM TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront.
  2. Register the domain name on Route 53. Use a third-party DNS provider that supports the import of the customer-managed keys for DNSSEC. Import a 2048-bit TLS/SSL certificate from a third-party certificate service to AWS Certificate Manager (ACM). Configure the Application Load Balancer with an HTTPS listener to use the imported TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront.
  3. Use Route 53 for domain registration. Use a third-party DNS service that supports DNSSEC for DNS requests that use the customer-managed keys. Use AWS Certificate Manager (ACM) to generate a valid 2048-bit TLS/SSL certificate for the domain name and configure the Application Load Balancer HTTPS listener to use this TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront.
  4. Register the domain name on Route 53. Since Route 53 only supports DNSSEC for registration, host the company DNS root servers on Amazon EC2 instances running the BIND service. Enable DNSSEC for DNS requests to ensure the replies have not been tampered with. Generate a valid certificate for the website domain name on AWS ACM and configure the Application Load Balancers HTTPS listener to use this TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront.

 

 

 

 

Correct Answer: 1

Amazon now allows you to enable Domain Name System Security Extensions (DNSSEC) signing for all existing and new public hosted zones, and enable DNSSEC validation for Amazon Route 53 Resolver. Amazon Route 53 DNSSEC provides data origin authentication and data integrity verification for DNS and can help customers meet compliance mandates, such as FedRAMP.

When you enable DNSSEC signing on a hosted zone, Route 53 cryptographically signs each record in that hosted zone. Route 53 manages the zone-signing key, and you can manage the key-signing key in AWS Key Management Service (AWS KMS). Amazon’s domain name registrar, Route 53 Domains, already supports DNSSEC, and customers can now register domains and host their DNS on Route 53 with DNSSEC signing enabled. When you enable DNSSEC validation on the Route 53 Resolver in your VPC, it ensures that DNS responses have not been tampered with in transit. This can prevent DNS Spoofing.

AWS Certificate Manager is a service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks. AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates. Using a valid SSL Certificate for your application load balancer ensures that all requests are encrypted on transit as well as protection against SSL hijacking.

CloudFront supports Server Name Indication (SNI) for custom SSL certificates, along with the ability to take incoming HTTP requests and redirect them to secure HTTPS requests to ensure that clients are always directed to the secure version of your website.

Therefore, the correct answer is: Register the domain name on Route 53 and enable DNSSEC validation for all public hosted zones to ensure that all DNS requests have not been tampered with during transit. Use AWS Certificate Manager (ACM) to generate a valid TLS/SSL certificate for the domain name. Configure the Application Load Balancer with an HTTPS listener to use the ACM TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront. 

The option that says: Register the domain name on Route 53. Use a third-party DNS provider that supports the import of the customer-managed keys for DNSSEC. Import a 2048-bit TLS/SSL certificate from a third-party certificate service to AWS Certificate Manager (ACM). Configure the Application Load Balancer with an HTTPS listener to use the imported TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront is incorrect. Although this is possible, you don’t have to rely on a third-party DNS provider as Route 53 supports DNSSEC signing. Also, ACM can secure a 2048-bit TLS/SSL Certificate for free so you don’t have to buy certificates from other providers.

The option that says: Use Route 53 for domain registration. Use a third-party DNS service that supports DNSSEC for DNS requests that use the customer-managed keys. Use AWS Certificate Manager (ACM) to generate a valid 2048-bit TLS/SSL certificate for the domain name and configure the Application Load Balancer HTTPS listener to use this TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront is incorrect. This is also possible, but you don’t have to rely on a third-party DNS provider as Amazon Route 53 already supports DNSSEC signing.

The option that says: Register the domain name on Route 53. Since Route 53 only supports DNSSEC for registration, host the company DNS root servers on Amazon EC2 instances running the BIND service. Enable DNSSEC for DNS requests to ensure the replies have not been tampered with. Generate a valid certificate for the website domain name on AWS ACM and configure the Application Load Balancers HTTPS listener to use this TLS/SSL certificate. Use Server Name Identification and HTTP to HTTPS redirection on CloudFront is incorrect as this solution is no longer recommended. This setup was previously used as a workaround when DNSSEC signing was not supported natively yet in Amazon Route 53.

References:
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/domain-configure-dnssec.html
https://docs.aws.amazon.com/acm/latest/userguide/acm-services.html
https://aws.amazon.com/about-aws/whats-new/2020/12/announcing-amazon-route-53-support-dnssec/
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-viewers-to-cloudfront.html

Note: This question was extracted from our AWS Certified Solutions Architect Professional Practice Exams.

 

 

For more AWS practice exam questions with detailed explanations, visit the Tutorials Dojo Portal:

Tutorials Dojo AWS Practice Tests

Amazon CloudFront Cheat Sheet References:
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide
https://aws.amazon.com/cloudfront/features/
https://aws.amazon.com/cloudfront/pricing/
https://aws.amazon.com/cloudfront/faqs/

Learn AWS with our PlayCloud Hands-On Labs

$2.99 AWS and Azure Exam Study Guide eBooks

tutorials dojo study guide eBook

New AWS Generative AI Developer Professional Course AIP-C01

AIP-C01 Exam Guide AIP-C01 examtopics AWS Certified Generative AI Developer Professional Exam Domains AIP-C01

Learn GCP By Doing! Try Our GCP PlayCloud

Learn Azure with our Azure PlayCloud

FREE AI and AWS Digital Courses

FREE AWS, Azure, GCP Practice Test Samplers

Subscribe to our YouTube Channel

Tutorials Dojo YouTube Channel

Follow Us On Linkedin

Written by: Jon Bonso

Jon Bonso is the co-founder of Tutorials Dojo, an EdTech startup and an AWS Digital Training Partner that provides high-quality educational materials in the cloud computing space. He graduated from Mapúa Institute of Technology in 2007 with a bachelor's degree in Information Technology. Jon holds 10 AWS Certifications and is also an active AWS Community Builder since 2020.

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, YouTube, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!

View Our AWS, Azure, and GCP Exam Reviewers Check out our FREE courses

Our Community

~98%
passing rate
Around 95-98% of our students pass the AWS Certification exams after training with our courses.
200k+
students
Over 200k enrollees choose Tutorials Dojo in preparing for their AWS Certification exams.
~4.8
ratings
Our courses are highly rated by our enrollees from all over the world.

What our students say about us?