Design Secure Architectures Flashcards
What is true about the default network ACL?
You can add or remove rules from the default network ACL.
The default network ACL is configured to allow all traffic to flow in and out of the subnets with which it is associated. You are able to add and remove your own rules from the default network ACL. However, each network ACL also includes a rule whose rule number is an asterisk. This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied. You can’t modify or remove this rule.
You have a regulatory requirement that the application is secure and you must use a firewall managed by AWS that enables control and visibility over VPC-to-VPC traffic and prevents the VPCs hosting your sensitive application resources from accessing domains using unauthorized protocols. What AWS service would support this?
AWS Network Firewall
The AWS Network Firewall infrastructure is managed by AWS, so you don’t have to worry about building and maintaining your own network security infrastructure. AWS Network Firewall’s stateful firewall can incorporate context from traffic flows, like tracking connections and protocol identification, to enforce policies such as preventing your VPCs from accessing domains using an unauthorized protocol. AWS Network Firewall gives you control and visibility of VPC-to-VPC traffic to logically separate networks hosting sensitive applications or line-of-business resources.
AWS WAF
AWS WAF is a web application firewall that helps protect web applications from attacks by allowing you to configure rules that allow, block, or monitor (count) web requests based on conditions that you define. These conditions include IP addresses, HTTP headers, HTTP body, URI strings, SQL injection and cross-site scripting.
AWS Firewall Manager
AWS Firewall Manager is a security management service that allows you to centrally configure and manage AWS WAF, AWS Shield Advanced, and Amazon VPC security groups across your AWS accounts and applications. With Firewall Manager, you can roll out firewall rules across your accounts and resources, making it easier to manage consistent security postures across your entire AWS environment.
This service provides private connectivity between VPCs, AWS services, and on-premises applications, securely on the Amazon network. It allows you to access services over a private endpoint within your VPC or via Direct Connect, keeping your traffic off the public internet. This can significantly reduce the risk of exposing sensitive data and improve performance for traffic that doesn’t have to travel over the public internet.
AWS PrivateLink
A new S3 bucket has been created which will need to allow roughly a third of all users access to sensitive information in the bucket. What is the most time efficient way to get these users access to the bucket?
Create a new policy which will grant permissions to the bucket. Create a group and attach the policy to that group. Add the users to this group.
The application will run on EC2 and will make several requests to AWS services such as S3 and DynamoDB. What is the best way to grant permissions to these other AWS services?
Create an IAM role that you attach to the EC2 instance to give temporary security credentials to applications running on the instance.
Amazon S3 can send event notification messages to the following destinations.
Publish event messages to an Amazon Simple Notification Service (Amazon SNS) topic
Publish event messages to an Amazon Simple Queue Service (Amazon SQS) queue Note that if the destination queue or topic is SSE enabled, Amazon S3 will need access to the associated AWS Key Management Service (AWS KMS) customer master key (CMK) to enable message encryption.
Publish event messages to AWS Lambda by invoking a Lambda function and providing the event message as an argument
This feature is used to speed up the transfer of files over long distances between your client and your S3 bucket.
Amazon S3 Transfer Acceleration
Transfer Acceleration takes advantage of Amazon CloudFront’s globally distributed edge locations. When you upload a file to your bucket, it first goes to the CloudFront edge location nearest to you and then travels to the S3 bucket over Amazon’s optimized network. Use cases for Transfer Acceleration include:
Large file uploads/downloads where end users are located far from the S3 bucket's region. Frequent data transfers over long distances.
This feature allows you to upload a single large file as a set of smaller parts. After all parts of your object are uploaded, Amazon S3 then combines these parts as a single object.
Multipart Upload
This allows for improved throughput and quick recovery from any network issues. It’s generally recommended for files larger than 100MB. Use cases for Multipart Upload include:
Uploading large files where a single operation might time-out or fail due to network conditions. Parallelizing uploads, where different parts are uploaded by different threads or even different machines to speed up the process.
An audit has determined that this data must be stored in a secured manner and any data stored in the buckets already or data coming into the buckets must be analyzed and alerts sent out flagging improperly stored data. Which AWS service can be used to meet this requirement?
Amazon Macie
Amazon Macie is a fully-managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. Macie automatically provides an inventory of Amazon S3 buckets including a list of unencrypted buckets, publicly accessible buckets, and buckets shared with AWS accounts outside those you have defined in AWS Organizations. Then, Macie applies machine learning and pattern matching techniques to the buckets you select to identify and alert you to sensitive data, such as personally identifiable information (PII). Macie’s alerts, or findings, can be searched and filtered in the AWS Management Console and sent to Amazon CloudWatch Events for easy integration with existing workflow or event management systems, or to be used in combination with AWS services, such as AWS Step Functions to take automated remediation actions.
This is an online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment.
AWS Trusted Advisor
Trusted Advisor provides real-time guidance to help you provision your resources following AWS best practices.
This service assesses applications for exposure, vulnerabilities, and deviations from best practices.
Amazon Inspector:
After performing an assessment, Inspector produces a detailed report with prioritized steps for remediation.
This service makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
Amazon Detective
It automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that helps you to investigate and visualize security issues.
This is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts and workloads.
Amazon GuardDuty
GuardDuty analyzes and processes VPC Flow Logs and AWS CloudTrail event logs.