Core Fundamentals and AWS Accounts Flashcards

prepare for the AWS cert with cantrill learning.

1
Q

What is IAM?

A

A standard issue FREE (with limits) service is provided with each AWS account. Where users, groups, and roles are created and are given permissions. Own DB for IAM. 1 Globally resilient service. Any data is always secure across all regions. Own dedicated instance of IAM. IAM service has full trust and can do as much as ROOT USER. Enbles user Identity federation (IDF) and MFA.

Manage Identities - ID Provider (create and manage)
Authenticates (proves who you are)
Authorizes (allow or deny services within the account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can the ROOT USER do in an AWS account?

A

Full control of the AWS account. Full control. Unrestricted. AWS Account and ROOT USER are kind of the same thing. Auto created. CANNOT be restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What permissions are automatically granted to new identities added to the account?

A

Least privilege principle. No permissions are given automatically. They must be explicitly given.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an AWS account made up of?

A

A unique email address, payment method, users, groups, roles, and services being provided. It prevents things from getting out of the account and things getting into the account as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why would you want to avoid using the same AWS account for the entire business?

A

This creates a single point of failure. If that one account is compromised, all the business is compromised. You can split Dev, Prod, or Test into different accounts or even separate customer segments into separate accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When creating a new AWS account what options do you have for alternate contacts?

A

Billing, Operations, and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the factors of identification?

A

Knowledge - Something you know
Possession - Something you have (device or app)
Inherent - Something you are (fingerprint, iris scan)
Location - Building, Corporate Network, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is MFA implemented for AWS?

A

AWS creates a secret key and pairs that with your user account info like user name. Then, that information is stored in a QR Code. When that QR code is scanned with an app, the app will reach out to AWS to ensure that the key is correct and will pair itself to your account to give regenerated MFA codes that AWS can cross reference to ensure you are who you say you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When setting up a budget, what template options do you have?

A

Free tier - Any spend at all
Monthly Spend - Define how much you can spend in one month
Daily Savings - Notifies when you fall below the defined target that you agree to use. Must spend!
Daily Reservation Utilization - Notifies when you fall below the defined target that you agree to use. Must use!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of objects can you create with IAM?

A

User - Identities (humans or apps) that need access to the account. Individual.
Group - a collection of related users
Role - used by AWS services or external users to grant access to an uncertain number of entities. Uncertain many.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an IAM Policy?

A

Allows or denies access to AWS services. Do nothing, only define. Must be attached to a user group or role to take effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If using best practices, what should the ROOT USER be used for?

A

Only for the initial creation and setup of the AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you access an AWS account through the command line or APIs?

A

IAM Access Keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are long-term access keys?

A

These are authentication types which don’t change or rotate automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When creating an IAM user why would you want to omit a password?

A

If you intend to authenticate with this user through only access keys (API or command line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the parts of credentials?

A

Public piece and private piece. Username is public, password is private, MFA token is private.

17
Q

What is an access key?
Where are access keys created?
How many access keys can a user have?

A

An account can use an access key to access an AWS account via command line or API. They can be Created, deleted, made acitive/inactive.

Access keys are created in the security credentials for a logged in user.

A user can have 0-2 access keys.

18
Q

What are the parts of an access key?

A

The key ID which you can fetch from AWS at any point.
The secret key which you can NEVER access again after the point of creation. It must be stored securely at time of creation.

19
Q

What should you do if an access key is compromised?

A

Delete the access key, recreate an access key, and update all instances of connection via that access key.

20
Q

What is the process for rotating access keys?

A

Create a new access key, update all instances where the key is used, and make the old access key inactive/delete it.

21
Q

What are the best practices of working with access keys?

A

NEVER STORE IN PLAIN TEXT
DISABLE/DELETE WHEN NOT IN USE
Use the least privilege principle
Rotate keys regularly

22
Q

How do you configure multiple accounts on a single computer?

A

Use named credentials when configuring in the terminal:
aws configure –profile general