Domain 2: Security & Compliance Flashcards
Customer - Shared Responsibility Model (RDS)
Customers are responsible for managing the data and configurations within the database, while AWS handles the underlying infrastructure.
Customer - Shared Responsibility Model (Lambda)
Customers are responsible for the code they deploy and the security settings for their functions, while AWS manages the underlying infrastructure and scaling.
Customer - Shared Responsibility Model (EC2)
Customers are responsible for the security of their EC2 instances, including applying OS updates and configuring firewalls.
Customer - Shared Responsibility Model (General)
Customers are responsible for securing the data they store and process on AWS services.
AWS - Shared Responsibility Model
AWS is responsible for the security of the underlying cloud infrastructure, such as data centers, networking, and hardware. AWS also provides a range of services and tools to enhance security, compliance, and monitoring.
AWS Compliance Information
AWS maintains comprehensive compliance programs, and customers can find compliance information in the AWS Compliance Center. This includes recognized compliance controls, such as HIPAA, SOC reports, and more.
Achieving Compliance on AWS
AWS provides various encryption options for securing data both in transit and at rest. For example, customers can use SSL/TLS for data in transit and encryption services like AWS Key Management Service (KMS) for data at rest.
Audit and Reporting - CloudWatch
Provides monitoring and alerting capabilities for AWS resources.
Audit and Reporting - Config
Offers configuration tracking and compliance assessment.
Audit and Reporting - CloudTrail
Provides detailed logs of API activity for security, compliance, and auditing purposes
Least Privileged Access
Refers to providing users and applications with the minimum level of access required to perform their tasks. By following this principle, potential security risks and unauthorized access are minimized.
Access Keys and Password Policies:
Customers can manage access keys and define password policies, including rotation and complexity requirements, to enhance security.
Multi-Factor Authentication (MFA):
Customers can enable MFA to add an extra layer of protection to user accounts and reduce the risk of unauthorized access.
AWS Identity and Access Management (IAM):
IAM allows customers to create and manage users, groups, roles, and permissions to control access to AWS resources.
Identify AWS access management capabilities:
The root account is the highest-level AWS account with full access. It’s essential to protect it with strong authentication and restrict its usage to critical tasks only.