Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

🧑‍💻 AWS Foundation Sale - Certified Cloud & AI Practitioner Mock Exams for only $12.99 each!

Amazon Route 53

Amazon Route 53

Last updated on December 23, 2025

Amazon Route 53 Cheat Sheet

  • Highly available, scalable DNS web service for domain registration, DNS routing, and health checking.
  • Supports hybrid DNS via Resolver endpoints for on-premises integration and private VPC DNS.
  • Alias records route traffic to AWS resources such as CloudFront, S3, App Runner, VPC Lattice, OpenSearch Service, and ELB.
  • DNS Firewall blocks malicious domains and protects against threats like DNS tunneling and DGA.
  • Supports DNS over HTTPS (DoH) for encrypted DNS queries.
  • Route 53 Profiles enable cross-account DNS management and centralized administration.
  • Supports IPv4/IPv6 dual-stack endpoints for hybrid architectures.

Key Features

  • Resolver
    • Answers DNS queries for VPC domain names.
    • Supports inbound/outbound endpoints, forwarding, delegation, and split-view DNS.
    • Performs recursive lookups for public domains.
    • ResolverEndpointCapacityStatus provides metrics on endpoint utilization.
    • Cross-account DNS management with Route 53 Profiles.
  • Traffic Flow
    • Visual editor to create routing policies using geolocation, geoproximity (with bias), weighted, latency-based, failover, and multivalue routing.
  • Routing Options
    • Simple, Failover, Geolocation, Geoproximity, Latency, Weighted, Multivalue, IP-based.
  • Private DNS
    • Supports private hosted zones with VPC associations and health checks.
  • DNS Failover & Health Checks
    • Monitor endpoints via HTTP, HTTPS, TCP, and string matching.
    • Failover types: Active-Active, Active-Passive.
    • Weighted records can participate in failover.
    • CloudWatch metrics and CloudTrail logging.
  • Domain Registration
    • Register or transfer domains; automatic DNS configuration.
    • DNSSEC signing supported.
    • Automatic renewal; creates hosted zone with four name servers.
  • Tutorials dojo strip
  • Resolver DNS Firewall & Advanced Security
    • Block malicious domains; allow trusted domains via allowlists.
    • Findings sent to Security Hub CSPM; EventBridge enables real-time alerts.
  • Logging & Monitoring
    • Resolver query logging to CloudWatch or EventBridge.
    • Health check metrics via CloudWatch; Route 53 dashboard displays domain registration, transfer, and expiration status.
  • New Record Types / Features
    • HTTPS, SSHFP, SVCB, TLSA.
    • IPv4/IPv6 dual-stack endpoints.
    • DNS over HTTPS (DoH).
    • Accelerated recovery for resilient DNS continuity.

Routing & Traffic Flow / Service-Specific Configurations

  • Alias Records
    • Can be used at the zone apex; free for AWS resources.
    • Supports CloudFront, OpenSearch, VPC Lattice, App Runner, S3 website endpoints.
  • CNAME Records
    • Cannot be used at zone apex; may incur query charges.
  • Traffic Policies
    • Assign resources, define routing logic, and create policy records in hosted zones.
    • Supports geoproximity biasing, multivalue routing, weighted, failover, latency, and geolocation.
  • VPC Resolver Forwarding
    • Forward queries between VPCs and on-premises networks.
    • Supports inbound/outbound delegation for private hosted zones.
  • Examples
    • Weighted routing: 70% to us-east-1, 30% to eu-west-1.
    • Failover routing: Primary EC2 active; secondary active only if primary fails.
    • Geoproximity biasing: Traffic from US biased toward US-based endpoints.

AWS Training Amazon Route 53

Hosted Zones / Resources

  • Public Hosted Zone
    • Routes internet traffic to AWS resources.
  • Private Hosted Zone
    • Routes traffic within VPCs; requires enableDnsHostnames and enableDnsSupport.
    • Supports health check association for failover, weighted, multivalue, latency, and geolocation records.
    • Split-view DNS allows different responses for VPC vs on-premises queries.
  • Automatic NS and SOA records; each zone includes four unique name servers (delegation set).
  • Interface VPC endpoints can be associated to Route 53 Profiles.

Route 53 Health Checks

  • How it works

AWS Training Amazon Route 53

    • Specify the endpoint: IP address or domain name.
    • Choose protocol: HTTP, HTTPS, or TCP.
    • Set request interval (how often Route 53 sends requests).
    • Define failure threshold (number of consecutive failures before unhealthy).
    • Optional: monitor other health checks.
    • Optional: monitor CloudWatch alarms for broader status criteria.
  • Failover & Routing
    • Failover types: Active-Active, Active-Passive.
    • Weighted records can participate in failover.
    • Supports geolocation, latency, and multivalue routing integrations.
  • Monitoring & Metrics
    • Health check metrics available via CloudWatch; integration with CloudTrail logs for auditing.
    • Supports up to 500 health check metrics per CloudWatch namespace and 100 health checks per account.

Know the Following Concepts

  • Domain Registration Concepts: domain name, registrar, registry, reseller, TLD.
  • DNS Concepts: Alias record, DNS query, DNS resolver, Private DNS, Hosted zone, Name servers, Record, Routing policy, Subdomain, TTL.
  • Health Checking Concepts: DNS failover, endpoint, health check.

Routing Policies

  • Simple routing policy – route internet traffic to a single resource that performs a given function for your domain. You can’t create multiple records that have the same name and type, but you can specify multiple values in the same record, such as multiple IP addresses.
  • Failover routing policy – use when you want to configure active-passive failover.
  • Geolocation routing policy – use when you want to route internet traffic to your resources based on the location of your users.
  • Geoproximity routing policy – use when you want to route traffic based on the location of your resources and, optionally, shift traffic from resources in one location to resources in another.
    • You can also optionally choose to route more traffic or less to a given resource by specifying a value, known as a bias. A bias expands or shrinks the size of the geographic region from which traffic is routed to a resource.
    • The effect of changing the bias for your resources depends on a number of factors, including the following:
      • The number of resources that you have.
      • How close the resources are to one another.
      • The number of users that you have near the border area between geographic regions.
  • Latency routing policy – use when you have resources in multiple locations and you want to route traffic to the resource that provides the best latency.
  • IP-based routing policy – use when you want to route traffic based on your users’ locations, and know where the IP address or traffic is coming from. 
  • Multivalue answer routing policy – use when you want Route 53 to respond to DNS queries with up to eight healthy records selected at random.
  • Weighted routing policy – use to route traffic to multiple resources in proportions that you specify.
  • When you register a domain or transfer domain registration to Route 53, it configures the domain to renew automatically. The automatic renewal period is typically one year, although the registries for some top-level domains (TLDs) have longer renewal periods.
  • When you register a domain with Route 53, it creates a hosted zone that has the same name as the domain, assigns four name servers to the hosted zone, and updates the domain to use those name servers.

Records

  • Create records in a hosted zone. Records define where you want to route traffic for each domain name or subdomain name. The name of each record in a hosted zone must end with the name of the hosted zone.
  • Alias Records
    • Route 53 alias records provide a Route 53–specific extension to DNS functionality. Alias records let you route traffic to selected AWS resources. They also let you route traffic from one record in a hosted zone to another record.
    • You can create an alias record at the top node of a DNS namespace, also known as the zone apex.
  • CNAME Record
    • You cannot create an alias record at the top node of a DNS namespace using a CNAME record.
  • Alias records vs CNAME records

CNAME Records

Alias Records

You can’t create a CNAME record at the zone apex.

You can create an alias record at the zone apex. Alias records must have the same type as the record you’re routing traffic to.

Route 53 charges for CNAME queries.

Route 53 doesn’t charge for alias queries to AWS resources.

A CNAME record redirects queries for a domain name regardless of record type.

Route 53 responds to a DNS query only when the name and type of the alias record matches the name and type in the query.

A CNAME record can point to any DNS record that is hosted anywhere.

An alias record can only point to selected AWS resources or to another record in the hosted zone that you’re creating the alias record in.

A CNAME record appears as a CNAME record in response to dig or Name Server (NS) lookup queries.

An alias record appears as the record type that you specified when you created the record, such as A or AAAA.

  • You can use IAM policy conditions to grant users fine-grained access to updating resource record sets.
  • You can also combine any of the granular permissions to create permissions.

Supported DNS Record Types

  • A Record Type – the value for an A record is an IPv4 address in dotted decimal notation.
  • AAAA Record Type – the value for an AAAA record is an IPv6 address in colon-separated hexadecimal format.
  • CAA Record Type – lets you specify which certificate authorities (CAs) are allowed to issue certificates for a domain or subdomain.
  • CNAME Record Type – a CNAME Value element is the same format as a domain name.
  • DS Record Type – represents key tag, algorithm, digest type, and digest of the zone key.
  • MX Record Type – each value for an MX record actually contains two values, priority and domain name.
  • NAPTR Record Type – converts one value to another or replaces one value with another.
  • NS Record Type – identifies the name servers for the hosted zone. The value for an NS record is the domain name of a name server.
  • PTR Record Type – is the same format as a domain name.
  • SOA Record Type – provides information about a domain and the corresponding Amazon Route 53 hosted zone.
  • SPF Record Type – a list of all authorized hostnames or IP addresses that are allowed to send an email on behalf of your domain.
  • SRV Record Type – represents priority, weight, port, and domain name.
  • TXT Record Type – contains text information for sources outside your domain.
  • Geoproximity routing supports bias values to shift traffic distribution.
  • Multivalue answer routing returns several healthy records for client side load balancing.

DNS Domain Name Format

  • Names of domains, hosted zones, and records consist of a series of labels separated by dots, which can be up to 63 bytes long. The total length of a domain name cannot exceed 255 bytes, including the dots.
  • You can create hosted zones and records that include * in the name.

Using Traffic Flow to Route DNS Traffic

  • You use the visual editor to create a traffic policy. A traffic policy includes information about the routing configuration that you want to create:
    • the routing policies that you want to use
    • resources that you want to route DNS traffic to, such as the IP address of each EC2 instance and the domain name of each ELB load balancer.
  • Create a policy record where you specify the hosted zone in which you want to create the configuration that you defined in your traffic policy. It’s also where you specify the DNS name that you want to associate the configuration with.

Use Cases

  • Hybrid architectures needing unified DNS across cloud and on premises.
  • Global apps routing traffic by latency or location.
  • Security workloads needing domain blocklists with DNS Firewall.

Route 53 Resolvers

  • Resolver answers DNS queries for VPC domain names such as domain names for EC2 instances or ELB load balancers, and performs recursive lookups against public name servers for all other domain names.
  • DNS resolvers on your network can forward DNS queries to Resolver in a specified VPC. You can also configure Resolver to forward queries that it receives from EC2 instances in your VPCs to DNS resolvers on your network.
  • Resolver is regional.
  • An inbound endpoint specifies the VPC that queries pass through on the way from your network to Resolver.
  • To forward DNS queries that originate on EC2 instances in one or more VPCs to your network, you create an outbound endpoint and one or more rules.
  • Route 53 Resolver DNS Firewall is a managed firewall that lets you block DNS queries made from known malicious domains and allow queries from trusted domains. This is achieved through the use of “blocklists” and “allowlists”.

Route 53 Health Checks and DNS Failover

  • Each health check that you create can monitor one of the following:
    • The health of a specified resource, such as a web server
    • The status of other health checks
    • The status of an Amazon CloudWatch alarm
  • Each health checker evaluates the health of the endpoint based on two values:
    • Response time
    • Whether the endpoint responds to a number of consecutive health checks that you specify (the failure threshold)
  • Types of health checks
    • HTTP and HTTPS health checks – Route 53 must be able to establish a TCP connection with the endpoint within four seconds. In addition, the endpoint must respond with an HTTP status code of 2xx or 3xx within two seconds after connecting.
    • TCP health checks – Route 53 must be able to establish a TCP connection with the endpoint within ten seconds.
    • HTTP and HTTPS health checks with string matching – Route 53 must be able to establish a TCP connection with the endpoint within four seconds, and the endpoint must respond with an HTTP status code of 2xx or 3xx within two seconds after connecting. After a Route 53 health checker receives the HTTP status code, it must receive the response body from the endpoint within the next two seconds.
  • Health-checking features to route traffic only to the healthy resources:
    • Check the health of EC2 instances and other resources (non-alias records)
    • Evaluate the health of an AWS resource (alias records)
  • Two types of failover configurations
    • Active-Active Failover – all the records that have the same name, the same type, and the same routing policy are active unless Route 53 considers them unhealthy. Use this failover configuration when you want all of your resources to be available the majority of the time.
    • Active-Passive Failover – use this failover configuration when you want a primary resource or group of resources to be available the majority of the time and you want a secondary resource or group of resources to be on standby in case all the primary resources become unavailable. When responding to queries, Route 53 includes only the healthy primary resources.
  • To create an active-passive failover configuration with one primary record and one secondary record, you just create the records and specify Failover for the routing policy.
  • To configure active-passive failover with multiple resources for the primary or secondary record, create records with the same name, type, and routing policy for your primary resources. If you’re using AWS resources that you can create alias records for, specify Yes for Evaluate Target Health.
  • You can also use weighted records for active-passive failover, with caveats.
  • You can configure Amazon Route 53 to log information about the queries that Route 53 receives. Query logging is available only for public hosted zones.

Authentication and Access Control

  • Authenticate with IAM before allowing to perform any operation on Route 53 resources.
  • Free AWS Courses
  • Every AWS resource is owned by an AWS account, and permissions to create or access a resource are governed by permissions policies. A permissions policy specifies who has access to what.

Amazon Route 53 Monitoring

  • The Route 53 dashboard provides detailed information about the status of your domain registrations, including:
    • Status of new domain registrations
    • Status of domain transfers to Route 53
    • List of domains that are approaching the expiration date
  • You can use Amazon CloudWatch metrics to see the number of DNS queries served for each of your Route 53 public hosted zones. With these metrics, you can see at a glance the activity level of each hosted zone to monitor changes in traffic.
  • You can monitor your resources by creating Route 53 health checks, which use CloudWatch to collect and process raw data into readable, near real-time metrics.
  • Log API calls with CloudTrail

Amazon Route 53 Pricing

  • A hosted zone is charged at the time it’s created and on the first day of each subsequent month. To allow testing, a hosted zone that is deleted within 12 hours of creation is not charged, however, any queries on that hosted zone will still incur charges.
  • Billion queries / month
  • Queries to Alias records are provided at no additional cost to current Route 53 customers when the records are mapped to the following AWS resource types:
    • Elastic Load Balancers
    • Amazon CloudFront distributions
    • AWS Elastic Beanstalk environments
    • API Gateways
    • VPC endpoints
    • Amazon S3 buckets that are configured as website endpoints
  • Traffic flow policy record / month
  • Pricing for domain names varies by Top Level Domain (TLD)

Amazon Route 53 Tutorials on YouTube:
https://www.youtube.com/user/AmazonWebServices/search?query=Route+53

Note: If you are studying for the AWS Certified Advanced Networking Specialty exam, we highly recommend that you take our AWS Certified Advanced Networking – Specialty Practice Exams and read our Advanced Networking Specialty exam study guide.

AWS Certified Advanced Networking Specialty Practice Exams

Validate Your Knowledge

Question 1

A company is building its customer web portal in multiple EC2 instances behind an Application Load Balancer. The portal must be accessible on www.tutorialsdojo.com as well as on its tutorialsdojo.com root domain.

How should the Network Engineer set up Amazon Route 53 to satisfy this requirement?

  1. Set up an Alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.
  2. Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.
  3. Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create an Alias A record that points to the ALB.
  4. Set up a non-alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.

Correct Answer: 1

Amazon Route 53 alias records provide a Route 53–specific extension to DNS functionality. Alias records let you route traffic to selected AWS resources, such as CloudFront distributions and Amazon S3 bucket. They also let you route traffic from one record in a hosted zone to another record.

Unlike a CNAME record, you can create an alias record at the top node of a DNS namespace, also known as the zone apex. For example, if you register the DNS name tutorialsdojo.com, the zone apex is tutorialsdojo.com. You can’t create a CNAME record for tutorialsdojo.com, but you can create an alias record for tutorialsdojo.com that routes traffic to www.tutorialsdojo.com.

When Route 53 receives a DNS query for an alias record, Route 53 responds with the applicable value for that resource:

A CloudFront distribution – Route 53 responds with one or more IP addresses for CloudFront edge servers that can serve your content.

An Elastic Beanstalk environment – Route 53 responds with one or more IP addresses for the environment.

An ELB load balancer – Route 53 responds with one or more IP addresses for the load balancer.

An Amazon S3 bucket that is configured as a static website – Route 53 responds with one IP address for the Amazon S3 bucket.

Another Route 53 record in the same hosted zone – Route 53 responds as if the query is for the record that is referenced by the alias record.

Hence, the correct answer is: Set up an Alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.

The option that says: Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB is incorrect. Although the configuration for the subdomain is correct, you still can’t create a CNAME record for the root domain or zone apex. You have to set up an Alias A record instead.

The option that says: Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create an Alias A record that points to the ALB is incorrect because you can’t create a CNAME record for the root domain or zone apex. The subdomain configuration is technically correct because you can set up an Alias A record for your subdomain in Route 53. The issue here is the use of a CNAME record in the zone apex.

The option that says: Set up a non-alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB is incorrect because a non-alias A Record can only accept IP addresses and not the DNS name of the ALB.

References:
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/routing-to-elb-load-balancer.html

Note: This question was extracted from our AWS Certified Advanced Networking Specialty Practice Exams.

Question 2

A Network Engineer has been tasked to protect the company’s publicly accessible online customer portal and to secure the clients’ sensitive financial information. Hackers must be prevented from intercepting DNS queries and from replacing the actual IP addresses of the website with unauthorized IP addresses in the DNS resolvers. The solution should protect the users from being routed to the IP addresses provided by the attackers in the spoofed response that could potentially direct them to fake or phishing websites.

What should the Engineer do to satisfy this requirement?

  1. Enable Domain Name System Security Extensions (DNSSEC) in Amazon Route 53.
  2. Enable Server Name Indication (SNI) in Amazon Route 53.
  3. Set up a private hosted zone in Amazon Route 53 and launch a BIND DNS Server.
  4. Set up Perfect Forward Secrecy (PFS) using Diffie-Hellman (DH) group 2 to prevent DNS spoofing.

Correct Answer: 1

Attackers sometimes hijack traffic to Internet endpoints such as web servers by intercepting DNS queries and returning their own IP addresses to DNS resolvers in place of the actual IP addresses for those endpoints. Users are then routed to the IP addresses provided by the attackers in the spoofed response, for example, to fake websites.

You can protect your domain from this type of attack, known as DNS spoofing or a man-in-the-middle attack, by configuring Domain Name System Security Extensions (DNSSEC), a protocol for securing DNS traffic.

When you configure DNSSEC for your domain, a DNS resolver establishes a chain of trust for responses from intermediate resolvers. The chain of trust begins with the TLD registry for the domain (your domain’s parent zone) and ends with the authoritative name servers at your DNS service provider. Not all DNS resolvers support DNSSEC. Resolvers that don’t support DNSSEC don’t perform any signature or authenticity validation.

Hence, the correct answer is: Enable Domain Name System Security Extensions (DNSSEC) in Amazon Route 53.

The option that says: Enable Server Name Indication (SNI) in Amazon Route 53 is incorrect because this feature is primarily used to support multiple TLS certificates for your web applications and not for protecting against DNS Spoofing or man-in-the-middle attacks.

The option that says: Set up a private hosted zone in Amazon Route 53 and launch a BIND DNS Server is incorrect because a private hosted zone is just a container that holds information about how you want Amazon Route 53 to respond to DNS queries for a specific domain and its subdomains within one or more VPCs. 

The option that says: Set up Perfect Forward Secrecy (PFS) using Diffie-Hellman (DH) group 2 to prevent DNS spoofing is incorrect because this is simply a feature that provides additional safeguards against the eavesdropping of encrypted data through the use of a unique random session key.

References:

https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/domain-configure-dnssec.html
https://aws.amazon.com/route53/faqs/

Note: This question was extracted from our AWS Certified Advanced Networking Specialty Practice Exams.

For more AWS practice exam questions with detailed explanations, visit the Tutorials Dojo Portal:

Tutorials Dojo AWS Practice Tests

Amazon Route 53 Cheat Sheet References:

https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/Welcome.html
https://aws.amazon.com/route53/features/
https://aws.amazon.com/route53/pricing/

🧑‍💻 AWS Foundation Sale – Certified Cloud & AI Practitioner Mock Exams for only $12.99 each!

Tutorials Dojo portal

Learn AWS with our PlayCloud Hands-On Labs

$2.99 AWS and Azure Exam Study Guide eBooks

tutorials dojo study guide eBook

New AWS Generative AI Developer Professional Course AIP-C01

AIP-C01 Exam Guide AIP-C01 examtopics AWS Certified Generative AI Developer Professional Exam Domains AIP-C01

Learn GCP By Doing! Try Our GCP PlayCloud

Learn Azure with our Azure PlayCloud

FREE AI and AWS Digital Courses

FREE AWS, Azure, GCP Practice Test Samplers

Subscribe to our YouTube Channel

Tutorials Dojo YouTube Channel

Follow Us On Linkedin

Written by: Jon Bonso

Jon Bonso is the co-founder of Tutorials Dojo, an EdTech startup and an AWS Digital Training Partner that provides high-quality educational materials in the cloud computing space. He graduated from Mapúa Institute of Technology in 2007 with a bachelor's degree in Information Technology. Jon holds 10 AWS Certifications and is also an active AWS Community Builder since 2020.

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, YouTube, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!

View Our AWS, Azure, and GCP Exam Reviewers Check out our FREE courses

Our Community

~98%
passing rate
Around 95-98% of our students pass the AWS Certification exams after training with our courses.
200k+
students
Over 200k enrollees choose Tutorials Dojo in preparing for their AWS Certification exams.
~4.8
ratings
Our courses are highly rated by our enrollees from all over the world.

What our students say about us?