4. IAM + AWS CLI Flashcards

1
Q

What error will you get if you try to ssh into an instance with a new keypair?

A

Permissions 0644 for ‘.pem’ are too open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you fix new keypair permissions?

A

chmod 0400 .pem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the default security group traffic rules?

A

All inbound traffic is blocked by default. All outbound traffic is authorized by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One IAM Role per ___?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If your application is not accessible (timeout), what is the cause?

A

Security group issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If your application gives a “connection refused” error, what is the cause?

A

Application error or application is not launched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What credential types are supported by IAM for CodeCommit?

A
  1. Git credentials
  2. SSH Keys
  3. AWS Access Keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What service should you use to “help identify the unused roles”?

A

Access Advisor feature on IAM console

To help identify the unused roles, IAM reports the last-used timestamp that represents when a role was last used to make an AWS request. Your security team can use this information to identify, analyze, and then confidently remove unused roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What service “helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity”?

A

IAM Access Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What service “provides you real-time guidance to help you provision your resources following AWS best practices on cost optimization, security, fault tolerance, service limits, and performance improvement”?

A

AWS Trusted Advisor

AWS Trusted Advisor is an online tool that provides you real-time guidance to help you provision your resources following AWS best practices on cost optimization, security, fault tolerance, service limits, and performance improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What service “automatically assesses applications for exposure, vulnerabilities, and deviations from best practices”?

A

Amazon Inspector

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of policy should you use to “define which principal entities (accounts, users, roles, and federated users) can assume the role”

A

Trust policy

Trust policies define which principal entities (accounts, users, roles, and federated users) can assume the role. An IAM role is both an identity and a resource that supports resource-based policies. For this reason, you must attach both a trust policy and an identity-based policy to an IAM role. The IAM service supports only one type of resource-based policy called a role trust policy, which is attached to an IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you grant a user access to the AWS Billing and Cost Management Service?

A

By default, IAM users do not have access to the AWS Billing and Cost Management console. You or your account administrator must grant users access. You can do this through the following steps:

  1. Activating IAM user access to the Billing and Cost Management console
  2. Attaching an IAM policy to your users
  3. Activate IAM user access for IAM policies to take effect (you only need to activate IAM user access once)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IAM Policies define what _____ can and cannot do.

A

IAM Policies define what Users, Groups, and Roles can and cannot do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What “acts as a virtual firewall for your EC2 instances to control incoming and outgoing traffic”?

A

Security Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you use to “define the maximum permissions for account members of an organization or organizational unit?”

A

AWS Organizations Service Control Policy (SCP)

Use an AWS Organizations Service Control Policy (SCP) to define the maximum permissions for account members of an organization or organizational unit (OU). SCPs limit permissions that identity-based policies or resource-based policies grant to entities (users or roles) within the account, but DO NOT grant permissions.

17
Q

What “defines the maximum permissions that the identity-based policies can grant to an entity, but does not grant permissions?”

A

Permissions boundary

Permissions boundary is a managed policy that is used for an IAM entity (user or role). The policy defines the maximum permissions that the identity-based policies can grant to an entity, but does not grant permissions.

18
Q

What is a “cross-account permissions policy that grants permissions to the specified principal”?

A

ACL

Use ACLs to control which principals in other accounts can access the resource to which the ACL is attached. ACLs are similar to resource-based policies, although they are the only policy type that does not use the JSON policy document structure. ACLs are cross-account permissions policies that grant permissions to the specified principal.