BOOK: AWS - Identity and Access Mgt (IAM) Flashcards
What address do you use to get to the management dashboard for IAM?
https://console.aws.amazon.com/iam
What are the three best practices for protecting the IAM “root” account?
- Add MFA (multi-factor authentication)
- Do not use the root account for daily actions
- Use a strong password
For programmatic, or command-line access what will you need to authenticate?
access keys
Opening a remote login session to a Linux instance on Elastic Compute Cloud (EC2) will require a valid ________________________.
set of access keys
You can configure a password policy from the______________________ section of the IAM.
Account Settings
MFA works by associating a physical device—either a ____________ or MFA-compliant device like ________, or a smartphone with the Authenticator app installed with your account.
- Universal 2nd Factor (U2F)
- YubiKey
You can generate a new set of access keys while logged into the AWS Management Console from the _________________________.
Security Credentials page
After choosing the “Create New Access Key” button, you will have an option of downloading the key to your computer as a text file , or ______________________
showing the actual Access Key ID, and Secret Access Key values in the dialog, where you can copy and paste them somewhere safe.
The industry-standard tool for safely encrypting remote login sessions is the______________ protocol.
Secret Shell (SSH)
When you launch a new EC2 Linux instance, you’ll be prompted either to use an existing ____________ or create a new one.
SSH key pair
True or False.
You’ll only get one opportunity to download the private half of your SSH key pair to your computer, when setting up the initial connection to an EC2 instance
True.
You’re better off creating users to whom you can assign only the permissions needed for a specific set of tasks. This adheres to what principle?
the principle of least privilege
If you wanted to create a primary admin to replace your root user for day-to-day administration, hyou would select the _________________ policy.
AdministratorAccess
If your AWS data is encrypted, AWS will invisibly decrypt your data only when______________.
the access request is accompanied by authentication.
You can have S3 encrypt the objects of a bucket at any time—during or after bucket creation. You can select either ____________or____________ encryption.
S3-managed server-side encryption keys (SSE-S3),
KMS-managed keys (SSE-KMS)