Cloud Security Flashcards

1
Q

Identity and Access Management(IAM)

A

Used to manage access to AWS Resources.

Fine-grained access rights:
WHO can access;
WHICH resources;
HOW they can be accessed;

No Cost account feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM User

A

Person/Application that can authenticate with an AWS account.

Programmatic Access:
Authenticate using Access key ID and Secret Access Key;
Provides AWS CLI and AWS SDK Access;

AWS Management Console Access:
Authenticate using 12-digit Account ID or alias;
IAM Username;
IAM Password;
MFA;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Group

A

Collection of IAM Users that are granted identical authorization.

A User can belong to multiple;
There is no default;
Cannot be nested;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM Policy

A

Document that defines which resources can be accessed and the level of access to each resource.

Identity-based:
Attach a policy to any IAM entity;
A single policy can be attached to multiple entities;
A single entity can have multiple policies attached to it;

Resource-based:
Attached to a resource(such as S3 Bucket);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM Role

A

Used to grant a set of permissions for making AWS service requests.

IAM Identity with specific permissions;
Attach Permissions policies to it;
Intended to be assumable by a person, application, or service;

Role provides temporary security credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM MFA

A

Increased Security, in addition to username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM Authorization

A

Assign permissions by creating an IAM policy.

Permissions are implicitly denied by default;
If something is explicitly denied, it is never allowed;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM Permission Flow

A

Explicitly Denied = Deny
Explicitly Allowed = Allow
Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS Root User

A

Accessed by signing in with the email and password;

Best practice to not use when necessary and use principle of least privilege;

Remove access keys;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CloudTrail

A

Tracks user activity on your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Billing Reports

A

Provide information about your use of AWS resources and estimated costs for that use.

Delivers reports to an S3 Bucket that you specify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Organizations

A

Enables you to consolidate multiple AWS accounts so that you centrally manage them.

Can attach different access policies to each Organizational Unit(OUs);

Use service control policies to establish control over the AWS services and API actions that each AWS account can access;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Key Management Service(KMS)

A

Enables you to create and manage encryption keys;
Enables you to control the use of encryption across AWS services and in your applications;

Integrates with AWS CloudTrail to log all key usage;
Uses hardware security modules (HSMs) that are validated by Federal Information Processing Strandards(FIPS) 140-2 to protect keys;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cognito

A

Adds user sign-up, sign-in, and access control to your web and mobile applications.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AWS Shield

A

DDoS protection service;
Safeguards applications running on AWS;

Use it to minimize application downtime and latency;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption of data at rest​

A

Encryption encodes data with a secret key.

AWS KMS can manage your secret keys​;

Can encrypt data in:
S3, EBS, EFS, RDS;

17
Q

Encryption of data in transit​

A

Transport Layer Security (TLS)—formerly SSL—is an open standard protocol.

AWS Certificate Manager provides a way to manage, deploy, and renew TLS or SSL certificates .

HTTPS uses TLS or SSL for the bidirectional exchange of data.

18
Q

AWS Config

A

Assess, audit, and evaluate the configurations of AWS resources. ​

Simplify compliance auditing and security analysis.​

19
Q

AWS Artifact​

A

A resource for compliance-related information​ such as reports.