AWS - Security Flashcards

1
Q

Shared Responsibility Model

A

The shared responsibility model outlines your responsibilities vs AWS’ when it comes to security and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Well-architected framework

A

the well-architected framework describes design principles and best practices for running workloads in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identity and Access Management (IAM)

A

IAM allows you to control access to your AWS services and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Web Application Firewall (waf)

A

WAF helps protect your web applications against common web attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shield

A

Shield is a managed Distributed Denial of Service (DDoS) protection service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Macie

A

Helps you discover and protect sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Config

A

allows you to assess, audit, and evaluate the configurations of your resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is GuardDuty

A

is an intelligent threat detection system that uncovers unauthorized behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Inspector

A

works with EC2 instances to uncover and report vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Artifact

A

offers on-demand access to AWS security and compliance reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cognito

A

helps you control access to mobile and web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Management Service (KMS)

A

allows you to generate and store encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CloudHSM

A

hardware security module (HSM) used to generate encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secrets Manager

A

allows you to manage and retrieve secrets (passwords or keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 Services provided by IAM

A

-Helps secure cloud resources
-define who has access
-define what you can do
-free global service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 identities

A

-root user
-individual users
-groups
-roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are 4 resources a identity can access?

A

-policies
-AWS managed policies
-Customer managed policies
-permissions boundaries

18
Q

what is authentication

A

where you present your identity and provide verification

19
Q

what is authorization

A

determines which services and resources the authenticated identity has access to

20
Q

principle of least privilege

A

involves giving a user minimum access required to get the job done

21
Q

what are groups

A

collection of IAM users that helps you apply common access controls to all group members

22
Q

are ec2 security groups the same as IAM user groups?

A

no, EC2 security groups act as firewalls while IAM groups are collections of users

23
Q

Roles

A

define access permissions and are temporarily assumed by an IAM user or service

24
Q

Policies

A

manage permissions for IAM users, groups, and roles by creation a policy document in JSON format and attaching it

25
Q

4 IAM best practices

A

1) enable MFA for privileged users
2) Implement strong password policies
3) Create individual users instead of using root
4) user roles for Amazon EC2 instances

26
Q

IAM credential report

A

lists all users in your account and status of their various credentials

27
Q

what is a firewall

A

prevent unauthorized access to your networks by inspecting incoming and outgoing traffic against security rules you’ve defined

28
Q

what are 3 things WAF protects against

A

-common attack patterns
-SQL injection
-cross-site scripting

29
Q

what is DDoS

A

ddos attack causes a traffic jam on a website or web application in an attempt to cause it to crash

30
Q

3 things to remember shield provides

A

-always on detection
-standard is free
-advanced is a paid service

31
Q

4 services shield advanced is supported on?

A

-cloudFront
-Route 53
-Elastic Load Balancing
-AWS Global Accelerator

32
Q

3 services Macie provides?

A

-uses machine learning
-evaluates s3 environment
-uncovers personally identifiable information (PII) data

33
Q

3 services config provides

A

-tracks configuration changes over time
-delivers configuration history file to S3
-notifications via simple notification service (SNS) of every configuration change

34
Q

3 services provided by guardDuty

A

-uses machine learning
-build-in detection for EC2, S3, and IAM
-review CloudTrail, VPC, Flow Logs, and DNS logs

35
Q

3 services inspector provides

A

-agent installed on EC2 instances
-reports vulnerabilities found
-checks access from the internet, remote root login, vulnerable software versions, etc

36
Q

3 services artifact provdies

A

-central repo for compliance reports from 3rd party auditors
-service organization controls (SoC) Reports
-payment card industry (PCI) reports

37
Q

3 services cognito provides

A

-provides authentication and authorization
-helps you manage users
-assists with user sign-up and sign-in

38
Q

4 points of KMS

A

(key management service)
-key generator
-store and control keys
-aws manages encryption keys
-automatically enabled for certain services

39
Q

3 points of cloudHSM

A

hardware security module
-dedicated hardware for security
-generate and manage your own encryption keys
-aws does not have access to your keys

40
Q

3 points of secrets manager

A

-rotate, manage, and retrieve secrets
-encrypt secrets at rest
-integrates with services like RDS, redshift, and documentDB