5 - Securing Your AWS Resources Flashcards
Why is application and infrastructure security important in cloud deployments?
It is critically important to protect assets from catastrophic data breaches.
What role does IAM play in AWS security?
IAM controls authentication and authorization for access to resources.
What are the components of IAM that help manage access?
- Users
- Groups
- Roles
- Federated identities
What is the recommended best practice for protecting the root user?
Create a complex password and implement multifactor authentication.
What are the risks of using the root user for regular tasks?
Compromised root credentials can lead to data theft or unauthorized charges.
What does multifactor authentication (MFA) add to account security?
A second layer of security requiring a temporary digital token.
Fill in the blank: The _______ is the user identity generated when an AWS account is created.
root user
What is the purpose of a password policy in IAM?
To enforce minimum complexity for all user passwords.
True or False: Password expiration is recommended by recent security thinking.
False
How can AWS users authenticate programmatic access?
Using access keys.
What is the industry-standard tool for encrypting remote login sessions?
Secure Shell (SSH) protocol.
What should you do with the private key of an SSH key pair?
Download it securely and avoid exposing it publicly.
What is the principle of least privilege in IAM?
Assign only the permissions necessary for users to perform their tasks.
What happens when you create a new IAM user?
You can assign specific permissions and access types.
What is the benefit of using IAM groups?
To manage permissions for multiple users efficiently.
How do IAM groups simplify permission management?
Users inherit permissions from the group they are attached to.
What is a recommended action to take for the root user’s security?
Lock down the root user and use IAM users for daily tasks.
What should you avoid when creating passwords?
Easy-to-guess passwords and password reuse.
Fill in the blank: A strong password should include _______.
uppercase and lowercase characters, numbers, and symbols.
What is the first step in protecting your root user?
Set a high-quality password.
What is the function of access keys in AWS?
To authenticate programmatic and command-line access.
When should access keys ideally be assigned?
To users with limited system access necessary for their jobs.
What should be done with access keys associated with the root account?
Delete them.
What is the process to create a new SSH key pair?
Select the Key Pairs link from the EC2 Dashboard.