AWS - Security Flashcards
Shared Responsibility Model
The shared responsibility model outlines your responsibilities vs AWS’ when it comes to security and compliance
Well-architected framework
the well-architected framework describes design principles and best practices for running workloads in the cloud.
Identity and Access Management (IAM)
IAM allows you to control access to your AWS services and resources
Web Application Firewall (waf)
WAF helps protect your web applications against common web attacks.
Shield
Shield is a managed Distributed Denial of Service (DDoS) protection service
Macie
Helps you discover and protect sensitive data
Config
allows you to assess, audit, and evaluate the configurations of your resources.
what is GuardDuty
is an intelligent threat detection system that uncovers unauthorized behavior
Inspector
works with EC2 instances to uncover and report vulnerabilities
Artifact
offers on-demand access to AWS security and compliance reports.
Cognito
helps you control access to mobile and web applications
Key Management Service (KMS)
allows you to generate and store encryption keys
CloudHSM
hardware security module (HSM) used to generate encryption keys.
Secrets Manager
allows you to manage and retrieve secrets (passwords or keys)
4 Services provided by IAM
-Helps secure cloud resources
-define who has access
-define what you can do
-free global service
4 identities
-root user
-individual users
-groups
-roles
what are 4 resources a identity can access?
-policies
-AWS managed policies
-Customer managed policies
-permissions boundaries
what is authentication
where you present your identity and provide verification
what is authorization
determines which services and resources the authenticated identity has access to
principle of least privilege
involves giving a user minimum access required to get the job done
what are groups
collection of IAM users that helps you apply common access controls to all group members
are ec2 security groups the same as IAM user groups?
no, EC2 security groups act as firewalls while IAM groups are collections of users
Roles
define access permissions and are temporarily assumed by an IAM user or service
Policies
manage permissions for IAM users, groups, and roles by creation a policy document in JSON format and attaching it