AWS Solutions Architect Associate 2025 Flashcards

To learn and retain more about AWS

1
Q

What is an IAM role?

A

Entities you create and assign specific permissions to that are assumed by trusted identities such as workforce identities and applications to perform actions in AWS. Roles are temporary and do not have long term credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IAM policy?

A

An IAM policy is a JSON document in AWS that defines permissions for identities (users, groups, roles) or resources. It specifies what actions (e.g., s3:PutObject) are allowed or denied, on which resources (e.g., arn:aws:s3:::example-bucket/*), and under what conditions (optional). Policies can be identity-based (attached to users, groups, or roles), resource-based (attached to resources like S3 buckets), managed (predefined by AWS or custom reusable policies), or inline (specific to one identity). They are essential for controlling access to AWS resources and enforcing the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IAM stand for?

A

AWS Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an IAM user?

A

An IAM identity that you create in AWS representing the human, workload or application, that interacts with AWS. Users have credentials (access keys for APIs/CLI, passwords for the console) and are granted permissions via policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a root user?

A

When you first create an Amazon Web Services (AWS) account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account. The root user has special privileges like the ability to enable MFA or close the aws account.

It’s bad practice to use the root user for any actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you identify an IAM user?

A

• a freindly name (e.g. John)
• An ARN (an Amazon Resource Name)
• a unique identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How might an IAM role and IAM user interact?

A

A user might assume an IAM role temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How might an IAM user be used? What does it identify?

A

Typically, to identify a human. It can also be used to ID an application, but using an IAM role is more appropriate for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can you assign an IAM role to an IAM user?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kinds of IAM policies are there?

A

Types of IAM Policies
1. Identity-Based Policies
• Attached to users, groups, or roles.
• Define what actions the identity can perform on AWS resources.
2. Resource-Based Policies
• Attached directly to resources (e.g., S3 buckets, KMS keys).
• Specify who can access the resource and what actions they can perform.
3. AWS Managed Policies
• Predefined by AWS for common use cases.
• Cannot be edited but can be attached to identities.
4. Customer Managed Policies
• Custom reusable policies created by you.
• Offer flexibility for specific permissions.
5. Inline Policies
• Embedded directly in a user, group, or role.
• Used for specific, tightly scoped permissions.
6. Permissions Boundaries
• Define the maximum permissions an identity-based policy can grant.
• Acts as a guardrail for roles or users.
7. Session Policies
• Temporary, inline policies passed when assuming a role or federating.
• Restrict permissions for the duration of a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are identity based IAM policies?

A

Identity-based policies are JSON permissions policy documents that control what actions an identity (users, groups of users, and roles) can perform, on which resources, and under what condition. They are attached to an IAM identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are resource based IAM policies?

A

Resource-based policies are JSON policy documents that you attach to a resource such as an Amazon S3 bucket. These policies grant the specified principal permission to perform specific actions on that resource and defines under what conditions this applies. Resource-based policies are inline policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are IAM permissions boundaries?

A

A permissions boundary is an advanced feature in which you set the maximum permissions that an identity-based policy can grant to an IAM entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are service control policies?

A

SCPs are JSON policies that specify the maximum permissions for an organization or organizational unit (OU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are access control lists?

A

Access control lists (ACLs) are service policies that allow you to control which principals in an account can access a resource.

They are more straightforward and less flexible than resource based policies, but they are easier to do .

They are largely deprecated and are limited: For example, you can grant permissions only to other AWS accounts; you cannot grant permissions to users in your account. You cannot grant conditional permissions, nor can you explicitly deny permissions. ACLs are suitable for specific scenarios. For example, if a bucket owner allows other AWS accounts to upload objects, permissions to these objects can only be managed using object ACL by the AWS account that owns the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are session policies?

A

Session policies are advanced policies that you pass as a parameter when you programmatically create a temporary session for a role or federated user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a principal in AWS?

A

A principal is a human user or workload that can make a request for an action or operation on an AWS resource.

18
Q

What is a workload in AWS?

A

A workload is a collection of resources and code that delivers business value, such as a customer-facing application or a backend process.

19
Q

What is a federated identity?

A

A federated identity is a user that can access secure AWS account resources with external identities. External identities can come from a corporate identity store (such as LDAP or Windows Active Directory) or from a third party (such as Login in with Amazon, Facebook, or Google). Federated identities don’t sign in with the AWS Management Console or AWS access portal. The type of external identity in use determines how federated identities sign in.

20
Q

What is the .aws/credentials file for?

A

It is a plaintext file used to define the following values for services or profiles: aws_access_key_id, aws_secret_access_key, aws_session_token , aws_token expiration

21
Q

What is the .aws/config file for?

A

It is used to further specify settings for profiles or services, like region and output (specifies output format of any command issued under this profile)

22
Q
A
23
Q

What is a control plane?

A

Control planes provide the administrative APIs used to create, read/describe, update, delete, and list (CRUDL) resources. For example, the following are all control plane actions: launching a new Amazon Elastic Compute Cloud (Amazon EC2) instance, creating an Amazon Simple Storage Service (Amazon S3) bucket, and describing an Amazon Simple Queue Service (Amazon SQS) queue. When you launch an EC2 instance, the control plane has to perform multiple tasks like finding a physical host with capacity, allocating the network interface(s), preparing an Amazon Elastic Block Store (Amazon EBS) volume, generating IAM credentials, adding the Security Group rules, and more. Control planes tend to be complicated orchestration and aggregation systems.

24
Q

Must you specify access policies on both the aws resource and the role?

A

It is not required, but it is safer.

25
Q

What is a data plane?

A

The data plane is what provides the primary function of the service. For example, the following are all parts of the data plane for each of the services involved: the running EC2 instance itself, reading and writing to an EBS volume, getting and putting objects in an S3 bucket, and Route 53 answering DNS queries and performing health checks.

Data planes are intentionally less complicated, with fewer moving parts compared to control planes, which usually implement a complex system of workflows, business logic, and databases.

26
Q

What do A records map to?

A

Static IPs

27
Q

What do CNAME’s route to?

A

Other domain names

28
Q

What is an alias record?

A

An alias record is a type of DNS record that allows you to map a domain name to an AWS resource, such as an Amazon CloudFront distribution, an Elastic Load Balancer, an S3 bucket configured as a static website, or other Route 53 record. Alias records are unique to Route 53 and offer a few advantages

29
Q

IAM = ?

A

Identify & Access Management

30
Q

What are groups?

A

Groups are entities that group users within an organization. A user can be a part of many groups, a group can have many users. A user can be without a group. A group can’t contain another group.

31
Q

Are users global?

A

Yes

31
Q

What is the least privilege principle?

A

Do not give more permissions than a user needs.

32
Q

What are inline policies?

A

Policies attached to a single user, as opposed to a group.

33
Q

What is the IAM policy structure?

A

A JSON doc with version, ID (optional), and at least one statement.

34
Q

What does an IAM policy statement consist of?

A

Sid (statement id), Effect (Allow or Deny), Principal (account, user, role to which the policy applies), Actions (list of actions this policy allows or denies), and resource (resources to which the actions apply to)

35
Q

What is EBS?

A

EBS (Elastic Block Store): AWS service providing durable, high-performance block storage for EC2 instances, used for data storage, backup, and applications requiring low-latency access.

36
Q

What is an application in AWS?

A

An application in AWS refers to a software program or suite designed to perform a specific function.

36
Q

What is a workload in AWS?

A

A workload in AWS represents the resources and processes required to deliver a specific business or technical objective. It includes applications, infrastructure (servers, storage, networking), and any supporting elements.

37
Q

What is a workforce identity?

A

A workforce identity in AWS refers to the digital identity of employees, contractors, or other members of an organization who need access to AWS resources or applications as part of their work.

38
Q

What is a resource?

A

In AWS, a resource is any object or entity that you can create, manage, or interact with in the AWS ecosystem.

39
Q

What is an IAM identity?

A

An IAM identity in AWS is a component within the Identity and Access Management (IAM) service that represents a user, group, or role. These identities are used to manage access to AWS resources securely by attaching policies that define their permissions.

40
Q

What kinds of Big O notations are there?

A

O(1): Constant complexity.
O(logn): Logarithmic complexity.
O(n): Linear complexity.
O(nlogn): Loglinear complexity.
O(n^x): Polynomial complexity.
O(X^n): Exponential time.
O(n!): Factorial complexity.