AWS Security Flashcards
How do you ensure Kinesis Data Streams data is encrypted in Transit?
Use the ‘StartStreamEncryption’ API
What is the new name for Amazon Kinesis Data Analytics for Apache Flink?
Amazon Managed Service for Apache Flink
What’s tricky about thinking about access vs trust when establishing one-way trust relationships between on-prem AD and AWS?
The direction of the trust relationship is the opposite of the direction of access.
I.e. if you extend an outgoing trust from AWS to on-prem AD, this grants access from AD to AWS, not the other way around.
How can you prevent user access to EC2 metadata?
Disallow it using IAM or SCPs.
Between the master account users and member account users in a multi-account GuardDuty setup, who can generate sample findings?
Both member and master account users.
Between the master account users and member account users in a multi-account GuardDuty setup, who upload and manage trusted IP and threat lists?
Master account users.
Between the master account users and member account users in a multi-account GuardDuty setup, who can archive findings?
Master account users
What does this principle refer to in a KMS Key policy:
“Principal”: {
“AWS”: “arn:aws:iam::111122223333:root”
},
Any user in the account can be granted access via IAM.
“root” in this case of key policies is not referring to the root user of the account.
Does log file integrity validation automatically enable encryption?
No.
What’s the most efficient way to encrypt CloudTrail logs with customer managed keys?
Use server-side encryption with AWS KMS–managed keys (SSE-KMS)
What is envelope encryption?
where you encrypt plaintext data with a data key and then encrypt the data key with a top-level plaintext master key
What form of data encryption provides an audit trail which shows who used the encryption key?
Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS)
(NOT a feature of S3-managed keys)
How can you encrypt data before it is sent to a DynamoDB table, with full customer control of the encryption keys?
Configure the DynamoDB table to enable customer-managed CMK server-side encryption
In a KMS key policy, what is the difference between the ‘aws:sourceVpce’ condition and the ‘aws:sourceVpc’ condition?
the former is to specify a specific vpc endpoint, the latter is to specify the whole vpc.
If a principle is granted access to an S3 bucket via the bucket policy, but not their IAM policy, do they have access to the bucket?
Yes. As long as there’s no explicit deny in any policy.
Linux EC2: What is the path of CloudWatch Logs Agent log file (used for log propagation troubleshooting)?
/var/log/awslogs.log