AWS Identity and Access Management (IAM) | Permissions Flashcards

1
Q

How do I delete a service-linked role?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

You can delete a service-linked role from the IAM console. Choose Roles in the navigation pane, choose the service-linked role that you want to delete, and choose Delete role. (Note: For Amazon Lex, you must use the Amazon Lex console to delete the service-linked role.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do permissions work?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Access control policies are attached to users, groups, and roles to assign permissions to AWS resources. By default, IAM users, groups, and roles have no permissions; users with sufficient permissions must use a policy to grant the desired permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do I assign permissions using a policy?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

To set permissions, you can create and attach policies using the AWS Management Console, the IAM API, or the AWS CLI. Users who have been granted the necessary permissions can create policies and assign them to IAM users, groups, and roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are managed policies?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Managed policies are IAM resources that express permissions using the IAM policy language. You can create, edit, and manage separately from the IAM users, groups, and roles to which they are attached. After you attach a managed policy to multiple IAM users, groups, or roles, you can update that policy in one place and the permissions automatically extend to all attached entities. Managed policies are managed either by you (these are called customer managed policies) or by AWS (these are called AWS managed policies). For more information about managed policies, see Managed Policies and Inline Policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do I create a customer managed policy?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

You can use the visual editor or the JSON editor in the IAM console. The visual editor is a point-and-click editor that guides you through the process of granting permissions in a policy without requiring you to write the policy in JSON. You can create policies in JSON by using the CLI and SDK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do I assign commonly used permissions?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

AWS provides a set of commonly used permissions that you can attach to IAM users, groups, and roles in your account. These are called AWS managed policies. One example is read-only access for Amazon S3. When AWS updates these policies, the permissions are applied automatically to the users, groups, and roles to which the policy is attached. AWS managed policies automatically appear in the Policies section of the IAM console. When you assign permissions, you can use an AWS managed policy or you can create your own customer managed policy. Create a new policy based on an existing AWS managed policy, or define your own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do group-based permissions work?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Use IAM groups to assign the same set of permissions to multiple IAM users. A user can also have individual permissions assigned to them. The two ways to attach permissions to users work together to set overall permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between assigning permissions using IAM groups and assigning permissions using managed policies?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Use IAM groups to collect IAM users and define common permissions for those users. Use managed policies to share permissions across IAM users, groups, and roles. For example, if you want a group of users to be able to launch an Amazon EC2 instance, and you also want the role on that instance to have the same permissions as the users in the group, you can create a managed policy and assign it to the group of users and the role on the Amazon EC2 instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are IAM policies evaluated in conjunction with Amazon S3, Amazon SQS, Amazon SNS, and AWS KMS resource-based policies?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

IAM policies are evaluated together with the service’s resource-based policies. When a policy of any type grants access (without explicitly denying it), the action is allowed. For more information about the policy evaluation logic, see IAM Policy Evaluation Logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can I use a managed policy as a resource-based policy?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Managed policies can only be attached to IAM users, groups, or roles. You cannot use them as resource-based policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do I set granular permissions using policies?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Using policies, you can specify several layers of permission granularity. First, you can define specific AWS service actions you wish to allow or explicitly deny access to. Second, depending on the action, you can define specific AWS resources the actions can be performed on. Third, you can define conditions to specify when the policy is in effect (for example, if MFA is enabled or not).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can I easily remove unnecessary permissions?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

To help you determine which permissions are needed, the IAM console now displays service last accessed data that shows the hour when an IAM entity (a user, group, or role) last accessed an AWS service. Knowing if and when an IAM entity last exercised a permission can help you remove unnecessary permissions and tighten your IAM policies with less effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can I grant permissions to access or change account-level information (for example, payment instrument, contact email address, and billing history)?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Yes, you can delegate the ability for an IAM user or a federated user to view AWS billing data and modify AWS account information. For more information about controlling access to your billing information, see Controlling Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who can create and manage access keys in an AWS account?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Only the AWS account owner can manage the access keys for the root account. The account owner and IAM users or roles that have been granted the necessary permissions can manage access keys for IAM users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can I grant permissions to access AWS resources owned by another AWS account?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

Yes. Using IAM roles, IAM users and federated users can access resources in another AWS account via the AWS Management Console, the AWS CLI, or the APIs. See Manage IAM Roles for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a policy look like?

Permissions

AWS Identity and Access Management (IAM) | Security, Identity & Compliance

A

The following policy grants access to add, update, and delete objects from a specific folder, example_folder, in a specific bucket, example_bucket.

{

“Version”:”2012-10-17”,

“Statement”:[

{

“Effect”:”Allow”,

“Action”:[

“s3:PutObject”,

“s3:GetObject”,

“s3:GetObjectVersion”,

“s3:DeleteObject”,

“s3:DeleteObjectVersion”

],

“Resource”:”arn:aws:s3:::example_bucket/example_folder/*”

}

]

}