AWS Security Services Flashcards
Assign True or False to the following statements:
- Amazon GuardDuty is a service that uses ML to detect anomalies such as suspect API calls or unauthorized deployments
-Amazon GuardDuty is compatible with CloudTrail event logs, VPC flow logs, DNS logs and others
-Has a target functionality to detect crypto mining attacks
-Can setup EventBridge rules targeting Lambda, SNS or SQS in case of findings
- A management account of an organization can determine an organization account to be a GuardDuty Delegated Administrator, having full GuardDuty permissions for all accounts on the organization, with the exception of the organization account
-True
-True
-True
-False, can’t target SQS
-False, has unlimited permissions for all accounts of the organization
Explain the service AWS Trusted Advisor
Trusted Advisor is an AWS service that inspects an AWS Account and makes recommendations to it based on best practices.
Trusted Advisor can generate recommendations for what areas?
-Cost Optimization
-Performance
-Service Limits
-Security
-Operational Excelence
-Fault Tolerance
What advantages does the Full Trusted Advisor offer compared to the standard one?
- Allows you to set alarms for service limits
- Grants Programmatic Access using AWS Support API
Assign True or False to the following statements:
- Trusted Advisor can check if a bucket and any individual object inside it are public
- AWS limits can only be monitored in Trusted advisor, not changed
- False, Trusted Advisro can check if a Bucket is public, but not its objects. To do that you must use EventBridge/S3 events/AWS Config
-True
What are the kinds of existing flow logs?
- VPC FLow Logs
- Subnet Flow Logs
- ENI (Elastic Network Interface) Flow Logs
What are the possible destinations for Flow Logs?
-S3
-Kinesis
-Cloudwatch Logs
Assign True or False to the following statements:
- You can query Flow Logs on Athena or CloudWatch Logs Insights
- Flow logs can be use to evaluate information such as destination IP, source IP, account id, destination id and action taken
- If you have a NAT Gateway inside a VPC ant the VPC tries to receive inbound traffic, since the NAT Gateway automatically drops inbound traffic, the action on the log will be REJECT
-True
-True
-False, the VPC can ACCEPT the action, the one that will drop it is the NAT Gateway
What is AWS Security Hub?
It’s a service that allows you to manage security and automate security checks accross multiple AWS accounts
What is AWS Config?
AWS Config is a compliance monitoring service. It is able to record the configuration of your AWS resources and configurations over time for auditing reasons.
Assign True or False to the following statements:
-AWS Config Rules allow you to set conditions to be followed by your resources, with any non-compliant action being denied
-AWS Config allows you to send SNS noticiations for any changes performed
-AWS Config allows you to create custom rules using AWS Lambda
-AWS Config can check for rule violations whenever there is a config change or periodically, and can trigger Amazon Eventbridge if any configuration is non compliant
-Any non-compliant ule can be treated through SSM Automations
-False, you cannot deny actions of being performed using AWS Config
-True
-True
-True
-True
What is AWS System Manager (SSM)?
System Manager is an instance management service for both EC2 and on-prem. It allows you to automate patching, execute commands or run scripts automatically and on multiple instances at the same time.
Assign True or False to the following statements regarding AWS System Manager:
- Works only for Linux OS
- It bills you for each instance integrated with it
- Integrated with both CloudWatch metrics/dashboards and AWS Config
- Needs SSM Agent installed on systems for it to work. This is true by default on EC2 instances
- System Manager can run commands on múltiple instances at the same time without the need for SSH
- False, works for both Linux OS and Windows
- False, it has no costs
- True
- False, it only comes installed on Amazon Linux AMI and some Ubuntu AMIs
- True
AWS System Manager can be used to run commands on instances before they are scaled down by an Autoscaling Group (ASG). Explain how this process works
To do what is described, you must first create a life cycle hook that puts the scaling down instance on the Terminating:Wait state. Then you must configure EventBridge to monitor the Terminating:Wait and trigger the SSM Automation Document to perform the actions on the instance before termination.
What is SSM Session Manager?
Session Manager is a System Manager functionality that allows you to star a secure shell on your EC2 or on-prem instance. The access can be performed through the AWS Console, AWS CLI or Session Manager SDK and it does not need SSH Access, SSH keys or Bastion Hosts. Works for Linux, MacOS and Windows
What is SSM OpsCenter?
OpsCenter is a System Manager functionality that helps you resolve operational events (events, alarms and issues) by aggregating informations on the event from sources such as CloudTrail Logs, CloudWatch alarms, AWS Config changes and relationships and CloudFormation stack information. Also allows you to automate responses using Automation Runbooks.
Describe what AWS Firewall Manager does
Firewall manager allows you to manage security rules in all accounts of an organization. Some common rules managed by firewall manager Security Policies are:
-Security Groups
-WAF Rules
-AWS Shield Advanced
-AWS Network Firewall
-Amazon Route 53 Resolver DNS Firewall
The Security Policies are created regionally, and are applied to all new resources created inside your organization.
What is Amazon Inspector?
Amazon Inspector is an AWS Service that inspects your EC2 instances, Lambda Functions and Container images for vulnerabilities. All identified vulnerabilities in regarding packages and reachability are associated with a risk score, and can be analysed in Security Hub or EventBridge
What is AWS Certificate Manager?
It an AWS service that helps with the management of security certificates. It automatically loads the certificate on Load Balancer, CloudFront and API Gateway, and it can be use to create public or private certificates and renew certificates. ACM is a regional service, and you can’t use it to copy certificate between regions.
What is AWS CloudHSM (Hardware Security Module)? What is a good use case for it?
CloudHSM is a service that offers harware focused on processing security software. It allow you to store, generate, import, export and manage cryptographic keys, and can only be accessed the CloudHSM Client Software. Good for cases where SSE-C encryption is used.
What is AWS Macie?
Macie is a service that uses ML to automatically detect sensitive data and report it to the account owner. It also provides a dashboard informing how this data is being used and transfered.
What are the differences between AWS Shield Standard and AWS Shield Premium?
-Shield Standard is free and working by default on AWS, while Premium is optional and paid ($3,000 per month per organization)
- Shield Standard provides from common layer 3/4 attacks such as SYN/UDP Flood and Reflection attacks, while Premium also protects against more sophisticated attacks on services such as EC2, ELB, Cloudfront, Route 53 and AWS Global Accelerator
- AWS Premium also grants access to a 24/7 DDoS response team and prtoects against fee spikes due to DDoS
What is AWS WAF?
AWS WAF, or Web Application Firewall, is a service that protects your application from common layer 7 exploits
Assign True or False to the following statements regarding AWS WAF:
- AWS WAF can to no services other than CloudFront, ELB (Application Load Balancer) and API Gateway
- WAF provides no help against a DDoS attack
- WAF access control is done through Web ACLs, which can be use to perform only Allow and Block actions
-Some of the filters that can be applied to Web ACLs include IP Adresses, HTTP Headers, HTTP Body or URI strings
-WAF can block common attacks such as SQL injection and cross-site scripting (XSS)
-False, it can also be applied to AppSync
-True
-False, WAF can perform Allow, Block, Count, CAPTCHA or Challenge actions
-True
-True
Aside from Web ACLs, WAF also implement Managed Rules implemented by AWS and marketplace sellers. What are some rule groups for those rules?
- Baseline Rule Groups: General protection from common threats.
- Use-Case Specific Rule Groups: Protection from common WAF use cases. Ex: AWSManagedRulesSQLiRuleSet
- IP Reputation Rule Groups: Block requests based on source (ex: Malicious IPs)
- Bot Control Managed Rule Group: Block and manage requests from bots
Where can WAF logs be sent to?
-S3 Bucket (5 min intervals)
-Kinesis Data Firehose (limited by Firehose quotas)
- CloudWatch Logs Log Group (5MB/s)
What must be done so EC2 can send metrics to CloudWatch?
The CloudWatch agent must be installed inside the EC2 instance/on-prem server
What are the 4 main Cloudwatch functionalities?
-Metrics
-Alarms
-Logs
-EventBridge
On an EC2 instance, there are some network metrics that have a maximum value allowed so EC2 runs properly. What are those metrics?
-Bandwidth capability
-Link local service access
-Packets-per-second (PPS) performance
-Connections tracked
Cloudwatch Logs possess Log Events, Log Streams and Log Groups. Explain the difference between them.
- Log events are singular events that are logged inside a Log Stream.
- A Log Stream is a sequence of Log Events coming from the same source.
- A Log Groups are groups of log streams that share the same retention, monitoring, and access control settings
True or false: Logs stored in Cloudwatch Logs cannot be deleted without deleting the log group.
False, it is possible to configure log groups so logs are deleted or exported to s3 after a certain period of time.
What kinds of Cloudwatch alarms are there?
-Metric alarm: Watches the value of a single metric and generates an alarm if it goes outside the configured thresholds
-Composite alarm: Uses rules to chek the states of multiple alarms and only goes off if all rules are met.