Application Security Flashcards
firewall
prevent unauthorized access to your networks by inspecting incoming and outgoing traffic against security rules you’ve defined.
WAF
Web Application Firewall
- helps protect your web applications against common web attacks
- protects against SQL injection
- protects against cross-site scripting attacks
Where are some areas you can deploy WAF to?
- the load balancer in front of EC2
- Cloud Front as part of your CDN solution
DDoS
Distributed Denial of Service
-hacker uses bots to send large quantity of requests, causing a traffic jam on a website or web
application in an attempt to cause it to crash.
Shield
a managed Distributed Denial of Service (DDoS) protection service
What are differences between Shield Standard and Shield Advanced
Standard: free, protect against most common attacks
Advanced: additional fee, advanced attack protection, real-time notifications via CloudWatch, 24/7 expert support to assist while an attack is happening
Which services is Shield Advanced supported on?
- Route 53
- Cloud Front
- Elastic Load Balancing
- AWS Global Accelerator
Macie
helps find sensitive PII data stored on S3 (credit cards, social security numbers, passport numbers)
Config
allows you to assess, audit, and evaluate the configurations of your resources - track config changes over time - delivers config history file to S3 - view network, OS, system updates, etc.
Guard Duty
an intelligent threat detection system that uncovers unauthorized behavior - uses machine learning - built-in detection for EC2, D3 and IAM - Reviews CloudTrail, VPC Flow Logs, and DNS logs
Inspector
installed on EC2 instances
- built in rules check access from the internet, remote root login, vulnerable software versions, etc
- prioritizes vulnerabilities by level of severity
Artifact
offers on-demand access to a central repository for your security and compliance reports.
- 3rd party compliance testing reorts
Service Organization Controls
- Payment Card Industry (PCI) reports, etc.
KMS
Key Management Service
- AWS manages your keys for you
use case for KMS
create encrypted Amazon EBS volumes
CloudHSM
a Hardware Security Module used to generate encryption keys
- dedicated hardware for security
- AWS does not have access to your keys
- helps you meet compliance requirements for data security