AWS Security (IAM) Flashcards

1
Q

What are the 4 steps to secure your AWS root account?

A
  1. Enable multi-factor authentication on the root account.
  2. Create an admin group for your administrators, and assign the appropriate permissions to this group.
  3. Create user accounts for your administrators.
  4. Add your users to the admin group.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we control permissions using IAM?

A

We assign permissions using policy documents, which are made up of JSON (JavaScript Object Notation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Permissions are stored using what format?

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A policy document consists of what sections?

A
  1. Version

2. Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of IAM Policy Documents are there?

A

Groups, Users & Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does IAM require the region to be selected?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of IAM Policies?

A

AWS Managed & Customer Managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the policy document, typically what are the 3 sections under Statement?

A

Effect, Action and Resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 building blocks for Identity & Access Management?

A
  1. Users - a physical person
  2. Groups - functions, such as administrators, developers, etc. Groups contain users.
  3. Roles - internal usage within AWS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is best practice for users to ______ permissions from groups.

A

inherit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the best practice in regards to users and people?

A

1 user = 1 person.

Always work on the principle that one user equals one physical person. Never share user accounts across multiple people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Should you share user accounts across multiple people?

A

No. It is not considered best practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the definition of “The Principal of Least Priviledge”?

A

Only assign a user the minimum amount of privileges they need to do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where do you set password policy requirements?

A

Under “Account Settings” in IAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you create a user, what kind of permissions are they automatically granted?

A

A new user is created with NO PERMISSIONS by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can add an ______ ______ to establish a trust between SAML 2.0 and other services’ logins.

A

Identity provider

17
Q

What makes your windows login useable within AWS, using the Identity Provider using SAM?

A

Active Directory Federation

18
Q

What is the account that is created when you first set up your AWS accounts and which has complete access?

A

Root account

19
Q

What account should you secure as soon as possible AND not use to log in day to day?

A

Root account

20
Q

Are access key ID and secret access keys the same as usernames and passwords?

A

No. You cannot use the access key ID and secret access key to login to the console. You can use them to access AWS via the APIs and Command Line.

21
Q

What do you use to access the login to the console?

A

IAM user account

22
Q

What do you use to access AWS via the APIs and Command Line?

A

Access Key ID and Secret Access Key

23
Q

True or False: If you lose the access key ID and secret access key values, you can download the existing ones from the console as an administrator.

A

False.

You only get to view these once. You’ll have to regenerate them if you lose them. Save them in a secure location.

24
Q

You can use this to combine your existing user account with AWS. For example, Microsoft Active Directory credentials can be used if you setup this service.

A

IAM Federation

25
Q

What uses the SAML standard, which is Active Directory?

A

Identity Federation

26
Q

Always give your users the _____________ of access required to do their job.

A

minimum amount

27
Q

Create ________ and assign your users to them.

A

“1. Create IAM groups and assign your users to groups.

  1. Group permissions are assigned using IAM policy documents.
  2. Your users will automatically inherit the permissions of the group.”
28
Q

What is an IAM Role?

A

A role is an identity you can create in IAM that has specific permissions. A role is similar to a user, as it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS.

29
Q

True or False: A role is uniquely associated with one person.

A

False. Instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it.

30
Q

A role does/does not have the same standard long-term credentials the same way passwords or access keys do.

A

“Does not.

Instead, when you assume a role, it provides you with the temporary security credentials for your role session.”

31
Q

Roles can allow ______ access.

A

Cross-Account access. This allows one AWS account the ability to interact with resources in other AWS accounts.

32
Q

What other entities can assume a role?

A

People, AWS architecture, or other system-level accounts.

33
Q

When using roles, the preferred option is:

A

Roles are preferred from a security perspective.

34
Q

True or False: Always choose using roles over hard-coding your credentials.

A

True. Roles allow you to provide access without the use of access key IDs and secret access keys.

35
Q

Roles require / do not require the use of access key IDs and secret access keys.

A

DO NOT require

36
Q

How is a role’s permissions being controlled?

A

By using policies.

37
Q

Upon updating a policy attached to a role, it will take effect when?

A

Immediately