AWS Security Flashcards
What are the benefits of AWS Security?
Keep Your Data Safe – the AWS infrastructure puts strong safeguards in place to help.
Protect your privacy – All data is stored in highly secure AWS data centers.
Meet Compliance Requirements – AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed.
Save Money – cut costs by using AWS data centers. Maintain the highest standard of s security without having to manage your own facility.
Scale Quickly – security scales with your AWS Cloud usage. No matter the size of your business, the AWS infrastructure is designed to keep your data safe.
What is AWS Cloud Compliance?
AWS Cloud Compliance enables you to understand the robust controls in place at AWS to maintain security and data protection in the cloud.
As systems are built on top of AWS Cloud infrastructure, compliance responsibilities will be shared.
What are compliance programs are in AWS Security?
Compliance programs include:
Certifications / attestations.
Laws, regulations, and privacy.
Alignments / frameworks.
What is AWS Artifact?
AWS Artifact is your go-to, central resource for compliance-related information that matters to you.
What reports are available in AWS Artifact?
Reports available in AWS Artifact include:
- Service Organization Control (SOC) reports
- Payment Card Industry (PCI) reports
- Certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls.
What agreements are available in AWS Artifact?
Agreements available in AWS Artifact include the Business Associate Addendum (BAA) and the Nondisclosure Agreement (NDA).
What is Amazon GuardDuty?
Amazon GuardDuty offers threat detection and continuous security monitoring for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
Intelligent threat detection service.
Detects account compromise, instance compromise, malicious reconnaissance, and bucket compromise.
What services can GuardDuty monitor?
Continuous monitoring for events across:
AWS CloudTrail Management Events.
AWS CloudTrail S3 Data Events.
Amazon VPC Flow Logs.
DNS Logs.
What is AWS WAF?
AWS WAF is a web application firewall.
Protects against common exploits that could compromise application availability, compromise security, or consume excessive resources.
WAF lets you create rules to filter web traffic based on conditions that include IP addresses, HTTP headers and body, or custom URIs.
WAF makes it easy to create rules that block common web exploits like SQL injection and cross site scripting.
The rules are known as Web ACLs.
What is AWS Shield?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service.
Safeguards web application running on AWS with always-on detection and automatic inline mitigations.
Helps to minimize application downtime and latency.
Two tiers – Standard and Advanced.
What is AWS Key Management Service (AWS KMS)?
AWS Key Management Service gives you centralized control over the encryption keys used to protect your data.
You can create, import, rotate, disable, delete, define usage policies for, and audit the use of encryption keys used to encrypt your data.
What integrations does KMS have with other services?
AWS Key Management Service is integrated with most other AWS services making it easy to encrypt the data you store in these services with encryption keys you control.
AWS KMS is integrated with AWS CloudTrail which provides you the ability to audit who used which keys, on which resources, and when.
What can AWS KMS allow developers to easily do?
AWS KMS enables developers to easily encrypt data, whether through 1-click encryption in the AWS Management Console or using the AWS SDK to easily add encryption in their application code.
What is AWS CloudHSM?
AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.
With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs.
What library integrations does CloudHSM have?
CloudHSM offers you the flexibility to integrate with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.