AWS - mód 2 - IAM Flashcards

1
Q

What is IAM?

A

Helps you control access to AWS resources securely. You control who is authenticated (logged in) and authorized (has permissions) to use resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM Resources - Shared Access to your AWS account.

A

You can grant permission to others to administer and use resources in your AWS account without having to share your password or access key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Resources - Granular Permissions

A

You can grant different permissions to different people for different resources. For example, you can allow some users to have full access to Amazon Elastic Compute Cloud (AmazonEC2), Amazon Simple Storage Service (AmazonS3), Amazon DynamoDB, Amazon Redshift, and other AWS services. For other users, you can allow read-only access to just a few S3 buckets, or permission to administer just a few EC2 instances, or to access your billing information but nothing else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM Resources - Secure access to AWS resources for applications that run on Amazon EC2.

A

You can use IAM features to securely provide credentials to applications running on EC2 instances. These credentials provide permissions for your application to access other AWS resources. Examples include S3 buckets and Dynamo DB tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM Resources - Multi-factor authentication (MFA).

A

You can add multi-factor authentication to your account and individual users for extra security. With MFA, you or your users must provide not only a password or access key to work with your account, but also a code from a specially configured device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM Resources - Federation of identities.

A

You can allow users who already have passwords elsewhere—for example, on your corporate network or at an Internet identity provider—to gain temporary access to your AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM Resources - Identity Information for Warranty

A

If you use AWS CloudTrail, you receive log records that include information about who made resource requests in your account. This information is based on IAM Identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM Resources - Identity Information for Warranty

A

IAM supports the processing, storage, and transmission of credit card data made by a merchant or service provider if it has been validated as compliant with the Payment Card Industry (PCI) Data Security Standard (DSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM - Terms - Resources

A

User, group, role, policy, identity provider, and objects that are stored in IAM. Just like other AWS services, you can add, edit, and remove IAM resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM - Terms - Identities

A

IAM resource objects are used to identify and group. You can attach a policy to an IAM identity. This includes users, groups, and roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM - Terms - Entities

A

The IAM resource objects that AWS uses for authentication. This includes IAM users, federated users, and assumed IA roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM - Terms - Principal

A

A principal is a person or application that can make a request for an action or operation on an AWS resource. The principal authenticates as the root user of the AWS account or an IAMentity to make requests to AWS. As a best practice, do not use your root user credentials for your day-to-day work. Instead, create IAM entities (users and roles). programmatic to allow an application to access your AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Request

A

When a principal tries to use the AWS Management Console, AWS API, or AWS CLI, it sends a request to AWS. The request includes the following information:
Actions (or operations) - The actions or operations that the principal wants to perform. This can be an action in the AWS Management Console, an operation in AWSCLI, or an AWSAPI.
Resources - The AWS resource object on which the actions or operations are performed.
Principal - The person or application that used an entity (user or role) to send the request. Information about the principal includes the policies associated with the entity used by the principal to log in.
Environment data - Information about the IP address, user agent, SSL Enabled status, or time of day.
Resource data - Data related to the resource being requested. This may include information such as the DynamoDB table name or an AmazonEC2 instance.
AWS gathers the request information into a request context, which is used to evaluate and authorize the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication

A

The principal must be authenticated (signed into AWS) using its credentials to send a request to AWS. Some services, such as Amazon S3 and AWS STS, allow few requests from anonymous users. However, they are the exception to the rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

You must also have authorization (permission) to complete
your request. During authorization, AWS uses values from the request context to check the policies that apply to the request. It then uses the policies to determine whether to allow or deny the request. Most policies are stored in AWS as JSON documents and specify permissions for principal entities. There are several types of policies that can affect whether a request is authorized. To give your users permissions to access resources For AWS in your own accounts, you only need identity-based policies. Resource-based policies are popular for granting cross-account access. The other types of policies are advanced resources and should be used with caution.
AWS checks each policy that applies to the context of your request. If a single permissions policy includes a denied action, AWS denies the entire request and stops evaluation. This is called an explicitdeny. Because requests are denied by default, AWS authorizes your request only if all parts of your request are allowed by the applicable permissions policies. The evaluation logic for a request in a single account follows these general rules:
By default, all requests are denied. (In general, requests made using the AWS account’s root user credentials for resources in the account are always allowed.)
An explicit permission in any permissions policy (identity-based or resource-based) would override this default.
The existence of Organizations SCP, IAM Permissions boundary, or a session policy overrides permission. If one or more of these policy types exist, all of them must allow the request. Otherwise, it is implicitly denied.
An explicit denial in any policy overrides any permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Actions or operations

A

After your request is authenticated and authorized, AWS approves the actions or operations in your request. Operations are defined by a service and include things that you can do to a resource, such as view, create, edit, and delete. For example, IAM supports approximately 40 actions for a user resource, including the following actions:
Create User
Delete User
Get User
Update User
To allow a principal to perform an operation, you must include the necessary actions in a policy that applies to the affected principal or resource

17
Q

Root user

A

Unique login identity that has full access to all AWS resources in the account.

18
Q

IAM user

A

Unique sign-in identity that has AWS Identity and Access Management (IAM) user is an entity that is created to represent a person or application that you use to interact with AWS. An AWS user consists of a name and credentials. An IAM user with administrator permissions is not the same thing as the root user of the AWS account.

19
Q

Federation

A

Identity federation is a system of trust between two parties with the aim of authenticating users and transmitting the information necessary to authorize their access to resources.

20
Q

Groups

A

An IAM group is a collection of IAM users. Groups allow you to specify permissions for multiple users, which can make it easier to manage permissions for those users.

21
Q

Policy

A

A policy is an object in AWS that, when associated with an identity or resource, defines its permissions. For example, if a policy allows the GetUser action, a user with that policy can get user information from the AWS Management Console, AWS CLI, or AWS API

22
Q

Which action from a policy can retrieve user information by Console, AWS CLI or API AWS?

A

GetUser

23
Q

Which user is created when you create your account at AWS?

A

Root User

24
Q

Which set of resources are under IAM?

A

Users, Groups, Roles and Policies