AWS Cloud Overview, IAM, & AWS CLI Flashcards

1
Q

AWS Region

A

cluster of data centers

💡 TIP: Most AWS services are region-scoped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to choose an AWS Region?

A
  • 🔐 Compliance with data governance & legal requirements: data never leaves a region without your explicit permission
  • 📍 Proximity to customers: reduced latency
  • Available services within a Region: new services & features are NOT available in every region
  • 💰 Pricing: priving varies region to region & transparent on service pricing page
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Availability Zone (AZ)

A

one or more discrete data centers with redundant power, networking, & connectivity

usually 3, min is 3, max is 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some benefits of Availability Zones (AZs)?

A
  • AZs are separate from each others, so that they’re isolated from disasters
  • AZs are connected with high bandwidth, ultra-low latency networking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Points of Presence (Edge Locations)

A

content is delivered to end users with lower latency

Amazon has 400+ Points of Presence in 90+ cities across 40+ countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM

A

Identity & Access Management;
Global service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Root account

A

created by default;
should NOT be used or shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM User

A

IAM Identity to represent people within your organization;
can be grouped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM User Group

A

group of IAM users;
only contain users, NOT other groups

users don’t have to belong to group & user can belong to multiple groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM Policy

A

JSON documents that define a set of permissions for making requests to AWS services and can be used by IAM Users, User Groups, & IAM Roles

💡 TIP: Apply the least privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM Policy Structure

A
  • Version: policy language version, always include “2012-10-17”
  • Id: identifier for the policy (optional)
  • Statement: one or more individual statements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM Policy Statement Structure

A
  • Sid: identifier for the statement (optional)
  • Effect: whether the statement allows or denies access (i.e. Allow, Deny)
  • Principal: account/user/role to which this policy applied to
  • Action: list of actions this policy allows or denies (i.e. s3:GetObject)
  • Resource: list of resources to which the actions applied to
  • Condition: conditions for when this policy is in effect (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Managed Policy

A

standalone policy that is created and adminstered by AWS
(i.e. IAMReadOnlyAccess)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inline Policy

A

policy created for a single IAM identity (a user, group, or role)

💡 TIP: If a policy could apply to more than one entity, it’s better to use. a managed policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multi Factor Authentication (MFA)

A

password you know + security device you own

✨ Best Practice: Root Accounts & IAM users (at a minimum) should be protected with MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main benefit of MFA?

A

if a password is stolen or hacked, the account is not compromised

17
Q

How can users access AWS?

3 ways

A
  • AWS Management Console: protected by password + MFA
  • AWS Command Line Interface (CLI):
  • AWS Softwarde Developer Kit (SDK): for code; protected by access keys

✨ Best Practice: Access Keys are secret, just like a password. Don’t share them

Access Key ID ~= username, Secret Access Key ~= password

18
Q

AWS Command Line Interface (CLI)

A

tool that enables you to interact with AWS services using commands in your command-line shell (i.e. terminal)

alternative to using AWS Management Console

19
Q

AWS Software Development Kit (SDK)

A

language specific APIs (set of librariers) that enable you to access & manage AWS services programatically;
embedded within your application

20
Q

IAM Role

A

IAM Identity that defines a set of permissions for making requests to AWS services, and will be used by an AWS service
(i.e. EC2 Instance Roles, Lambda Function Roles)

21
Q

What IAM Security Tools does AWS provide?

A
  • IAM Credentials Report (account-level)
  • IAM Access Advisor (user-level)
22
Q

IAM Credentials Report

A
  • account-level
  • report that lists all your account’s users & status of their various credentials
23
Q

IAM Access Advisor

A
  • user-level
  • shows the service permissions granted to a user & when those services were last accessed

💡TIP: Helpful information to audit and revise policies (i.e. least priviledge principle)

24
Q

What are some IAM User & Group best practices?

A
  • Don’t use the root account except for AWS account setup
  • One physical user = One AWS user
  • Assign users to groups & assign permissions to groups
  • Create a strong password policy
  • Use & enforce the use of Multi Factor Authentication (MFA)
25
Q

What are some IAM Permissions & Security best practices?

A
  • Create & use Roles for giving permissions to AWS services
  • Use Access keys for Programmatic access (CLI/SDK)
  • Audit permissions of your account using IAM Credentials Report & IAM Access Advisor
  • NEVER share IAM users & Access Keys
  • Grant least privilege
26
Q

AWS CloudShell

A

browser-based shell in the AWS Management Console to securely interact with your AWS services (via the AWS CLI);
Not available in all regions

alternative to using the AWS CLI via your local terminal