AWS Shared Responsibility Flashcards

1
Q

What is the AWS shared responsibility model?

A

It indicates which parts of security will be handled by AWS and which parts customers are responsible for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AWS responsible for in terms of security according to the shared responsibility model?

A

AWS is responsible for the physical implementation, including physical facilities, systems, infrastructure, hardware, software, networking, global infrastructure, and protecting the data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the customer’s responsibility in the AWS shared responsibility model?

A

Customers are responsible for securing their applications and data sets in the cloud, including encryption of data at rest and in transit, network security, managing credentials and logins safely, firewall configurations, and security of operating systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some security responsibilities of AWS in the shared responsibility model?

A

AWS is responsible for protecting the physical security of data centers, global infrastructure, infrastructure including hardware, software, networking, facilities, redundancy, and intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AWS ensure in terms of virtualization infrastructure?

A

AWS ensures isolation between customer workloads, such as EC2 instances, to keep them separate from other customer environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some security responsibilities of customers in the shared responsibility model?

A

Customers are responsible for securing their AWS data, encrypting data at rest and in transit, managing network security, credentials, logins, firewall configurations, and security of operating systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Infrastructure as a Service (IaaS) in cloud computing?

A

IaaS refers to services where customers maintain control and management of most of the system, including virtual servers like Amazon EC2, where they manage the operating system and software giving them more responsibility for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Platform as a Service (PaaS) in cloud computing?

A

PaaS refers to services where infrastructure is largely hidden, allowing customers to focus on code and application implementation. AWS services like Amazon Relational Database Service (RDS) fall under this category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Software as a Service (SaaS) in cloud computing?

A

SaaS refers to complete software solutions hosted centrally, where customers do not manage the underlying infrastructure. Examples include AWS Trusted Advisor and AWS Shield.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some responsibilities of customers using IaaS?

A

They are responsible for securing operating systems, applications, security groups, and network settings of their EC2 instances, and managing the security of their AWS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some advantages of PaaS compared to IaaS?

A

PaaS removes the need for customers to manage infrastructure, focusing instead on coding and application deployment, while still benefiting from managed services like automated backups and server updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the licensing models commonly associated with SaaS offerings?

A

Subscription-based or pay-as-you-go models are typical for SaaS offerings like AWS Trusted Advisor and AWS Shield.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does IAM handle permissions in resource-based policies?

A

IAM follows the principle of least privilege, granting only the minimum permissions necessary based on explicit allow or deny statements in policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is multi-factor authentication (MFA) in IAM?

A

MFA adds an extra layer of security by requiring users to provide an additional piece of information, such as a code from a mobile app, along with their username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of IAM groups in managing permissions?

A

IAM groups are used to apply permissions efficiently by defining access policies for a collection of users with similar responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the different types of access that can be assigned to IAM users?

A

IAM users can be assigned programmatic access (access keys for API calls) and/or AWS Management Console access (web-based access).

17
Q

What is the purpose of IAM roles?

A

IAM roles are intended to be assumable by anyone who needs the associated permissions, and they do not have long-term credentials associated with them like passwords or access keys.

18
Q

How does AWS ensure isolation between customer workloads in its virtualization infrastructure?

A

AWS ensures isolation between customer workloads to keep them separate from other customer environments, such as isolating EC2 instances of one customer from another.