AWS Flashcards

To learn and retain more about AWS

1
Q

What is an IAM role?

A

Entities you create and assign specific permissions to that are assumed by trusted identities such as workforce identities and applications to perform actions in AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IAM policy?

A

A policy is an object in AWS that, when associated with an entity or resource or role, defines their permissions. Most policies are stored in AWS as JSON documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IAM stand for?

A

AWS Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an IAM user?

A

An entity that you create in AWS representing the human user or workload or application that uses the IAM user to interact with AWS. A user in AWS consists of a name and credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a root user?

A

When you first create an Amazon Web Services (AWS) account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account. The root user has special privileges like the ability to enable MFA or close the aws account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you identify an IAM user?

A

• a freindly name (e.g. John)
• An ARN (an Amazon Resource Name)
• a unique identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How might an IAM role and IAM user interact?

A

You might assign a role with certain permissions to a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How might an IAM user be used?

A

Typically, to identify a human. It can also be used to ID an application, but using an IAM role is more appropriate for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can you assign an IAM role to an IAM user?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kinds of IAM policies are there?

A
  1. Identity based policies
  2. Resource based policies
  3. Permissions boundaries
  4. Organizations SCPs
  5. Access control lists
  6. Session policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are identity based IAM policies?

A

Identity-based policies are JSON permissions policy documents that control what actions an identity (users, groups of users, and roles) can perform, on which resources, and under what condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are resource based IAM policies?

A

Resource-based policies are JSON policy documents that you attach to a resource such as an Amazon S3 bucket. These policies grant the specified principal permission to perform specific actions on that resource and defines under what conditions this applies. Resource-based policies are inline policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are IAM permissions boundaries?

A

A permissions boundary is an advanced feature in which you set the maximum permissions that an identity-based policy can grant to an IAM entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are service control policies?

A

SCPs are JSON policies that specify the maximum permissions for an organization or organizational unit (OU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are access control lists?

A

Access control lists (ACLs) are service policies that allow you to control which principals in an account can access a resource.

They are more straightforward and less flexible than resource based policies, but they are easier to do .

They are largely deprecated and are limited: For example, you can grant permissions only to other AWS accounts; you cannot grant permissions to users in your account. You cannot grant conditional permissions, nor can you explicitly deny permissions. ACLs are suitable for specific scenarios. For example, if a bucket owner allows other AWS accounts to upload objects, permissions to these objects can only be managed using object ACL by the AWS account that owns the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are session policies?

A

Session policies are advanced policies that you pass as a parameter when you programmatically create a temporary session for a role or federated user.

17
Q

What is a principal in AWS?

A

A principal is a human user or workload that can make a request for an action or operation on an AWS resource.

18
Q

What is a workload in AWS?

A

A workload is a collection of resources and code that delivers business value, such as a customer-facing application or a backend process.

19
Q

What is a federated identity?

A

A federated identity is a user that can access secure AWS account resources with external identities. External identities can come from a corporate identity store (such as LDAP or Windows Active Directory) or from a third party (such as Login in with Amazon, Facebook, or Google). Federated identities don’t sign in with the AWS Management Console or AWS access portal. The type of external identity in use determines how federated identities sign in.

20
Q

What is the .aws/credentials file for?

A

It is a plaintext file used to define the following values for services or profiles: aws_access_key_id, aws_secret_access_key, aws_session_token , aws_token expiration

21
Q

What is the .aws/config file for?

A

It is used to further specify settings for profiles or services, like region and output (specifies output format of any command issued under this profile)

22
Q
A
23
Q

What is a control plane?

A

Control planes provide the administrative APIs used to create, read/describe, update, delete, and list (CRUDL) resources. For example, the following are all control plane actions: launching a new Amazon Elastic Compute Cloud (Amazon EC2) instance, creating an Amazon Simple Storage Service (Amazon S3) bucket, and describing an Amazon Simple Queue Service (Amazon SQS) queue. When you launch an EC2 instance, the control plane has to perform multiple tasks like finding a physical host with capacity, allocating the network interface(s), preparing an Amazon Elastic Block Store (Amazon EBS) volume, generating IAM credentials, adding the Security Group rules, and more. Control planes tend to be complicated orchestration and aggregation systems.

24
Q

Must you specify access policies on both the aws resource and the role?

A

It is not required, but it is safer.

25
Q

What is a data plane?

A

The data plane is what provides the primary function of the service. For example, the following are all parts of the data plane for each of the services involved: the running EC2 instance itself, reading and writing to an EBS volume, getting and putting objects in an S3 bucket, and Route 53 answering DNS queries and performing health checks.

Data planes are intentionally less complicated, with fewer moving parts compared to control planes, which usually implement a complex system of workflows, business logic, and databases.