Cloud Security Flashcards
Identity and Access Management(IAM)
Used to manage access to AWS Resources.
Fine-grained access rights:
WHO can access;
WHICH resources;
HOW they can be accessed;
No Cost account feature.
IAM User
Person/Application that can authenticate with an AWS account.
Programmatic Access:
Authenticate using Access key ID and Secret Access Key;
Provides AWS CLI and AWS SDK Access;
AWS Management Console Access:
Authenticate using 12-digit Account ID or alias;
IAM Username;
IAM Password;
MFA;
IAM Group
Collection of IAM Users that are granted identical authorization.
A User can belong to multiple;
There is no default;
Cannot be nested;
IAM Policy
Document that defines which resources can be accessed and the level of access to each resource.
Identity-based:
Attach a policy to any IAM entity;
A single policy can be attached to multiple entities;
A single entity can have multiple policies attached to it;
Resource-based:
Attached to a resource(such as S3 Bucket);
IAM Role
Used to grant a set of permissions for making AWS service requests.
IAM Identity with specific permissions;
Attach Permissions policies to it;
Intended to be assumable by a person, application, or service;
Role provides temporary security credentials.
IAM MFA
Increased Security, in addition to username and password.
IAM Authorization
Assign permissions by creating an IAM policy.
Permissions are implicitly denied by default;
If something is explicitly denied, it is never allowed;
IAM Permission Flow
Explicitly Denied = Deny
Explicitly Allowed = Allow
Implicit Deny
AWS Root User
Accessed by signing in with the email and password;
Best practice to not use when necessary and use principle of least privilege;
Remove access keys;
CloudTrail
Tracks user activity on your account.
Billing Reports
Provide information about your use of AWS resources and estimated costs for that use.
Delivers reports to an S3 Bucket that you specify.
AWS Organizations
Enables you to consolidate multiple AWS accounts so that you centrally manage them.
Can attach different access policies to each Organizational Unit(OUs);
Use service control policies to establish control over the AWS services and API actions that each AWS account can access;
AWS Key Management Service(KMS)
Enables you to create and manage encryption keys;
Enables you to control the use of encryption across AWS services and in your applications;
Integrates with AWS CloudTrail to log all key usage;
Uses hardware security modules (HSMs) that are validated by Federal Information Processing Strandards(FIPS) 140-2 to protect keys;
Cognito
Adds user sign-up, sign-in, and access control to your web and mobile applications.
AWS Shield
DDoS protection service;
Safeguards applications running on AWS;
Use it to minimize application downtime and latency;