Basic Security and Compliance Aspects of The AWS Platform and The Shared Security Model Flashcards

1
Q

What is an easy way to remember the AWS Shared Responsibility Model?

A

AWS is responsible for the Security OF the Cloud and the customer is responsible for Security IN the Cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the customer responsible in the Shared Security Model?

A

Customer Data

Platform, Applications, Idendity & Access Management

Operating System, Network & Firewall Configuration.

Cliend Side Data Encryption & Data Integrity Authentication

Server-Side Encryption (File system and/or data)

Networking Traffic Protection (Encryption, Integrity, Identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is AWS responsible in the Shared Security Model?

A

Software

Compute, Storage, Database, Networking

Hardware/AWS Global Infrastructure

Regions, Availability Zones, Edge Locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym Scam Sidi stand for?

A

Secure Support
Compliance Assurance Programs
Access Control and Identity
Monitoring and Logging

Standard and Best Practices
Infrastructure Resilience
Data Encryption
Infrastructure Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Amazon provide Secure Support?

A
  • Real-time insight through AWS Trusted Advisor

- Proactive support and advocacy with a Technical Account Manager (TAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Amazon provide Compliance Assurance Programs?

A

From certifications, regulations to frameworks, AWS has you covered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Names the three of the certifications AWS has for security?

A

https://aws.amazon.com/compliance/programs/

Cyber Essentials Plus (UK)
DoD SRG (US)
FIPS (US)
ISO 9001
CISPE
GLBA
UK Data Protection Act
EU Data Protection Directive
FFIEC
G-Cloud (UK)
NIST
UK Cloud Security Principles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does AWS secure it’s infrastructure?

A
  • Network firewalls built into Amazon VPC.
  • In transit encryption using TLS across all services.
  • Private or dedicated connections into your data center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does AWS ensure Infrastructure Resilience?

A
  • Technologies built from the ground up for resilience in the face of DDoS attacks.
  • Services can be used in combination to automatically scale for traffic load.
  • Autoscaling, CloudFront, Route 53 can be used to prevent DDoS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does AWS encrypt Data?

A
  • At rest encryption available in EBS, S3, Glacier, RDS (Oracle and SQL Server) and Redshift.
  • Key management through AWS KMS - you can choose -whether to control the keys or let AWS.
  • Server side encryption of message queues in SQS.
  • Dedicated hardware-based cryptographic key storage using AWS CloudHSM, allowing you to satisfy compliance requirements.
  • APIs to integrate AWS security into any applications you create.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of AWS’s security Standards and Best Practices?

A
  • A security assessment service, Amazon Inspector, that automatically assesses applications for vulnerabilities or deviations from best practices, including impacted networks, OS, and attached storage
  • Deployment tools to manage the creation and decommissioning of AWS resources according to organizational standards
  • Inventory and configuration management tools, like AWS Config, that identify AWS resources then track, and manage changes to those resources over time
  • Template definition and management tools, including AWS CloudFormation to create standard, preconfigured environments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does AWS manage and log user activity?

A
  • Deep visibility into API calls through AWS CloudTrail, including who, what, when, and from where calls were made
  • Log aggregation options, streamlining investigations and compliance reporting
  • Alert notifications through Amazon CloudWatch when specific events occur or thresholds are exceeded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does AWS provide Identity and Access Control?

A
  • AWS Identity and Access Management (IAM) lets you define individual user accounts with permissions across AWS resources
  • AWS Multi-Factor Authentication for privileged accounts, including options for hardware-based authenticators
  • AWS Directory Service allows you to integrate and federate with corporate directories to reduce administrative overhead and improve end-user experience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the main features and functions of Amazon AIM?

A
  • Manage IAM users and their access
  • Manage IAM roles and their permissions
  • Manage federated users and their permissions
  • Grant other people permission to administer and use resources in your AWS account without having to share your password or access key.
  • Grant granular, different permission to different people for different resources
  • Enables you to add specific conditions such as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device.
  • Use IAM features to securely give applications that run on EC2 instances the credentials that they need in order to access other AWS resources
  • Add two-factor authentication to your account and to individual users for extra security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AWS Support and how does it help the end user?

A
  • AWS Support provides tools and resources to help you make sure your AWS environment is built and operated to be secure, highly available, efficient, and cost effective
  • Real-time insight through AWS Trusted Advisor
  • Proactive support and advocacy through Technical Account Manager (TAM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly