AWS Security Flashcards

For the AWS Certified Solutions Architect—Associate exam prep. Increase understanding about AWS security services and functions, such as encryption, account management, permissions, gateways, and more.

1
Q

Identity & Access Management (IAM)

A

Global service that secures any data in the AWS IAM database across AWS regions.

Control who is authenticated and authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS Organizations

A

Centrally manage multiple AWS accounts. Includes ability to:
* Consolidate billing & manage costs
* Control access and permissions
* Share resources
* Audit for compliance
* Integrate with AWS IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual Private Cloud (VPC)

What security is available for a VPC? (8 answers)

A

A virtual network dedicated to an AWS account. You can specify its IP address range, add subnets, gateways, and security groups.

Security Available:
* Create subnets in multiple AZs
* Security groups (control traffic to and from an instance)
* Network Access Control Lists (ACLs—control network traffic to and from a subnet)
* Amazon GuardDuty (detects threats to your accounts, data, workloads, etc.)
* Use IAM to manage access to your AWS resources
* Use VPC Flow Logs to monitor the IP traffic
* Use AWS Network Firewall to filter inbound and outbound VPC traffic
* Use Network Access Analyzer to identify unintended network access

Note: A subnet is a range of IP adresses in your VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS WAF (Web Application Firewall)

What does it do and which services can you use it with?

A

Protects web apps and APIs from attacks by:
1. Monitoring, managing, allowing, blocking, and responding to web requests
2. Creating custom rules to block common attack patterns
3. Automating rule creation

You can use WAF with:
* Amazon CloudFront
* API Gateway
* Application Load Balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site-to-Site VPN

A

A hybrid service for connecting on-premise networks and AWS. It uses IPSec to create encrypted tunnels.

Has a maximum throughput of 1.25 GBps. Relies on internet connection. Many resources have quota limitations that can’t be increased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS PrivateLink

A

The service to expose your VPC to other VPC resources. It provides a private connection between a VPC and specific AWS services on a separate VPC.

Doesn’t touch the internet.

Better than VPC peering for scaling.

Use VPC peering to communicate with other VPCs and interact with ALL their services as though on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the best practices for securing AWS accounts?

7 Answers

A
  1. Multi-factor authentication
  2. Limit root user account usage
  3. Use IAM groups, users, roles, and policies, with least-priviledge access
  4. Regularly rotate access keys
  5. Use strong password policies
  6. Use CloudTrail for logging
  7. Encrypt data in transit and at rest
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS Security Token Service

A

A web service that allows users to request temporary security credentials for AWS resources. Used in tandem with IAM.

The credentials include an access key, secret access key, and token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When should you hard-code credentials into your application?

A

Never

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between resource, identity, permission, and service control policies?

How are they evaluated when there are overlapping allow and deny rules?

A

Permission policies are split into two categories:
1. Identity policies that are attached to a user, group, or role.
John Doe can read and write Resource A
2. Resource policies that are attached to a resource like S3, SQS, DynamoDB, etc.
Resource A:
John Doe: Read, Write &
Jane Doe: Deny Access

Service control policies define the max permissions for an organization or individual. They don’t actually grant permissions; they serve as a filter on the permissions that can be used.

When there are conflicting policies:
1. AWS defaults to DENY when there are no policy rules. This is true for all types of policies
2. If there’s an explicit DENY in any of the policies, AWS denies the request
3. If there are no explicit DENYs, AWS looks at the SCPs (service control policies)
4. If there are no SCPs, AWS looks at the resource policies
5. Lastly, if there are no resource policies, AWS looks at the identity policies

(Note that for complicated evaluations, there are two additional steps to the logic: permission boundaries and session policies.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which resources and services provide traceability?

Three answers

A
  1. AWS CloudTrail
  2. AWS CloudWatch
  3. AWS Organizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a default and custom VPC, and how is their security configured?

A

Default VPCs are automatically created for you if you have an AWS account. It comes with a default subnet in each AZ, an internet gateway, and a default security group.

Default VPC is the chosen VPC whenever you launch an instance without allocating a subnet.

Custom VPCs simply require manual creation and configuration. You must provision each of your resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the resiliency type for a VPC?

(Global, zonal, or regional)

A

Regional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the resiliency type for a subnet?

(Global, zonal, or regional)

A

Zonal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a NAT gateway?

How do you set one up?

A

NAT gateways allow private subnet instances in a VPC to access the internet, while preventing the internet from connecting to the instances.

You set on up through the VPC console. You must assign an elastic IP address to the NAT gateway and configure it in a public subnet. Make sure your private subnet route table includes the NAT gateway for all internet routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a security group?

How do you set one up? When would you need one?

A

Stateful (changes to inbound rules automatically apply to outbound rules).

A virtual firewall that controls the incoming and outgoing traffic of your EC2 instances. It determines what traffic is allowed based on rules like source IP and port number.

It’s recommended to create a security group whenever you create an EC2 instance. It can also isolate your different applications.

An instance can have multiple security groups. This is in contrast with Network ACLs, which can only have ONE per subnet.

Note: when you create a VPC, it comes with a default security group.

Default: Inbound traffic denied, outbound allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Network Access Control list?

Securing Application Tier

A

Stateless (changes to inbound rules are NOT applied to outbound rules).

A subnet-level security that allows and blocks traffic. Applies to all applications within the subnet.

A subnet can only have ONE NACL. This is in contrast with a security group, which can have multiple for one instance.

Default: All inbound and outbound traffic allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a route table?

A

Rules that direct network traffic in a VPC.

A subnet can only be associated with one route. However, multiple subnets can be associated with the same route.

Traffic is usually directed to the most specific route that matches their traffic (known as the longest prefix match).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is VPC peering?

A

Allows seperate VPCs to communicate with each other, as though on the same network.

It doesn’t touch the internet, making it more secure. Doesnt require a VPN, and can work across different AWS accounts and/or regions.

You can’t create a VPC peering connection between VPCs that have matching or overlapping IPv4 or IPv6 CIDR blocks.

Note: Peering has a 125 connection limit.

Use PrivateLink for connecting your VPC to specific resources in another VPC. PrivateLink is more scalable and less complex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are transit gateways?

A

A hybrid resource to connect a VPC to an on-premise network. Simple, scalable, and secure. All traffc is automatically encrypted.

Has a max bandwith per connection of 1.25 Gbps. Also tends to be more expensive than direct peering options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are VPN connections?

What are the VPN types?

A

A secure, encrypted tunnel created by Amazon Web Services (AWS) that allows you to connect your on-premises network or remote devices to your AWS cloud.

Two types:
1. Site-to-Site VPN: For connecting an on-premise network to the AWS cloud.
2. Client VPN: Allows users to access both on-premise and AWS resources from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AWS Direct Connect

A

Creates a private connection between an on-premise network and AWS cloud, without using the internet.

Higher reliability and security. Not reliant on internet bandwith.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an endpoint service?

A

Gateway objects created within a VPC to connect with public services.

An alternative to NAT and internet gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AWS Client VPN

A

Allows users to access both on-premise and AWS resources from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Amazon Macie

A

A Machine Learning service that discovers, classifies, and protects sensitive info (like PII) stored in S3.

26
Q

Amazon GuardDuty

A

A threat detection service that monitors AWS accounts and workloads for malicious activity.

It monitors:
* CloudTrail
* VPC Flow Logs
* S3 data events
* Aurora login events
* EKS, ECS, and EC2

GuardDuty can help detect a variety of potential threats, including:
* Compromised AWS credentials
* Data exfiltration and destruction
* Unauthorized cryptomining activity
* Presence of malware

27
Q

Amazon Cognito

What are Cognito user pools and identity pools?

A
28
Q

AWS Secrets Manager

A
29
Q

AWS Shield

A
30
Q

IAM Identity Center

A
31
Q

AWS Systems Manager Parameter Store

A
32
Q

What do these terms mean: plaintext, algorithm, key, and ciphertext? What are the two types of encryptions and keys?

A

Plaintext: Unencrypted data

Algorithm: Code that generates plaintext to encrypted data using an encryption key

Key: A password used with algorithms to produce ciphertext

Ciphertext: Encrypted data

Types of encryptions and keys: Symmetric and asymmetric

33
Q

AWS Key Management Service (KMS)

Why use instead of AWS Cloud HSM? Why use both?

A
34
Q

AWS Cloud Hardware Security Module (CloudHSM)

Why use instead of AWS KMS? Why use both?

A
35
Q

How do you manage encryption keys across regions?

A
36
Q

How do you implement access policies for encryption keys?

A
37
Q

AWS Certificate Manager

How are certificates renewed? How does it encrypt data in transit?

A
38
Q

S3 provides client-side and server-side encryption. What are the three types of server-side encryption?

A
  1. Server-side with customer provided keys.
  2. Server-side with S3 managed keys.
  3. Server-side with customer master keys stored in AWS KMS.
39
Q

AWS Artifact

How do you use the self-service central repository for compliance?

A
40
Q

How does adding data encryption affect the data retrieving speed of Amazon S3, AWS RDS, and AWS KMS?

A
41
Q

How does data protection affect the performance of S3 versus EBS?

A
42
Q

When would you use S3 lifecycle configurations instead of S3 intelligent tiering?

A
43
Q

What are the five ways to use cloud storage?

A
  1. Backup and recovery
  2. Software test and development
  3. Data migration
  4. Compliance
  5. Big data & data lakes
44
Q

What options exist for different storage to protect data in the event of a disaster?

A
  1. Backup and restore (low cost and complexity)
  2. Multiple active regions (high cost and complexity)
  3. Active/Passive strategies (low cost, high complexity)
  4. Pilot light
  5. Warm standby
  6. Multi-site active-active
45
Q

EBS Snapshot

Periodic or continuous?

A
46
Q

DynamoDB Backup

Periodic or continuous?

A
47
Q

RDS Snapshot

Periodic or continuous?

A
48
Q

Aurora Snapshot

Periodic or continuous?

A
49
Q

EFS Backup (when using AWS Backup)

Periodic or continuous?

A
50
Q

Amazon Redshift Snapshot

Periodic or continuous?

A
51
Q

Neptune Snapshot

Periodic or continuous?

A
52
Q

DocumentDB

Periodic or continuous?

A
53
Q

S3 Cross-Region Replication

Periodic or continuous?

A

Asynchronously copies objects to an S3 bucket in the chosen recovery region.

Continuous; also provides versioning.

54
Q

AWS Backup

What can AWS Backup backup? (7 answers)

A

A centralized location to configure, schedule, and monitor backups. Supports creating backups across regions.

Can backup:
* EBS Volumes
* EC2 Instances
* RDS and Aurora databases
* DynamoDB tables
* EFS files systems
* Storage Gateway volumes
* Amazon FSx for Windows and Lustre

55
Q

What backup storage can you use for hybrid environments?

A

AWS Storage Gateway

56
Q

What are SSL keys? What are data keys?

A

SSL Keys:
Secure Sockets Layer (SSL) encrypts data sent over the internet by using randomly-generated strings of characters.

Data Keys:
A string of data used to encrypt and decrypt data between parties.

57
Q

Which services can help you maintain the principle of least priviledge when working in a multi-accound environment?

AWS Service Catalog, AWS Organizations, or AWS Control Tower?

A
58
Q

When would you use an IAM Role? When would you use an IAM User?

A
59
Q

AWS Directory Service

What are its different use cases?

A
60
Q

VPC Flow Logs

A