AWS 22, 23, 24 Flashcards

1
Q

What indicates that a YAML file is a SAM template?

A

There needs to be a Transform Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Cognito User Pool?

A

Create a serverless database of users for your web & mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cognito User Pools integrates with what two services natively?

A

API Gateway and Application Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cognito Identity Pools?

A

Allows us to grant temporary access to AWS resources to users that we do not want to give IAM access to. Either because of size or security concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cognito Identity Pools allow for unauthenticated guest access, true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Cognito Identity Pools work with Cognito User Pools?

A

Users will reach out to Cognito User Pools which will either reach out to an Internal DB of users or Federated login options;
CUP will return a token;
Users will send token to CIP;
CIP will validate with CUP and get temp creds with STS and return the credentials;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between standard vs express step functions?

A

Standard workflow has a maximum duration of 1 year and express step functions have and express workflow of 5 minutes;
Express is cheaper;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AWS STS?

A

Allows you to grant and temporarily access AWS resources (up to 1 hour)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you don’t know what user or role you are using, what call can you make with STS?

A

GetCallerIdentity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do we define in IAM roles who can assume the role?

A

The Principal element in the role’s trust policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What temporary security credentials are returned when you use STS AssumeRole?

A

Access key ID, secret access key, and a security token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What call do we make to STS to get credentials once logged in with MFA?

A

GetSessionToken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when an IAM principal makes an API request to S3 with a bucket policy?

A

The union of the IAM Policy and the S3 Bucket Policy is examined; an explicit deny on the S3 Bucket Policy overrules everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An EC2 instance does not have an allowance to access an S3 bucket but the S3 bucket does allow the EC2 instance contact on the bucket policy. What is the outcome?

A

The EC2 instance will be able to access the S3 bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can we make sure that a user can give an AWS service a role?

A

We use IAM PassRole and define what we can pass to a service; however, we must have a trust policy on that role which allows it to be given to be used by the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the use of Asymmetric keys in KMS?

A

Used for encryption outside of AWS by users who can’t call KMS API

17
Q

Up to what sizse limit for data can KMS encrypt per call?

A

4KB;

If data is greater than 4 KB, we use envelope encryption

18
Q

Which API allows us to use the envelope encryption technique?

A

GenerateDataKey API

19
Q

We have reached our KMS request quota. What should we do?

A

If it is a temporary or only happens a few times, implement an exponential backoff strategy. If it happens a lot, we can reach out to the API or support and increase the request quota

20
Q

How do we force SSL for S3 bucket?

A

Create an S3 bucket policy that has a DENY when condition aws:SecureTransport = false

21
Q

Why would you choose Secrets Manager over SSM Parameter Store?

A

Secrets manager is usually used for RDS and can rotate secrets;
Secrets manager costs more money;
In Secrets Manager KMS encryption is mandatory;

22
Q

We would like to audit the values of an encryption value over time. What should we use?

A

Parameter store

23
Q

How to encrypt existing CloudWatch logs?

A

Encrypt them with the associate-kms-key API call

24
Q

AWS Certificate Manager loads SSL certificates on what integrations?

A

Load Balancers (including EB)
CloudFront distributions
APIs on API Gateways