Governance & Security Flashcards
1
Q
AWS Global Infrastructure
A
Edge locations and Regional Edge Cache
Local Zones
Availability Zones
Regions
2
Q
AWS Regions
A
- A region is a geographical area
- Each region consists of 2 or more availability zones
- Isolated from other AWS Regions
3
Q
Availability Zones
A
- Availability Zones are physically separate and isolated from each
other - AZs span one or more data centers
- Each AZ is designed as an independent failure zone
4
Q
Local Zones
A
- AWS Local Zones place compute, storage, database, and other select
AWS services closer to end-users - Extension of an AWS Region where you can run your latency sensitive
applications
5
Q
Edge Locations and Regional Edge Caches
A
- Edge locations are Content Delivery Network (CDN) endpoints for
CloudFront - There are many more edge locations than regions
- Regional Edge Caches sit between your CloudFront Origin servers and
the Edge Locations - A Regional Edge Cache has a larger cache-width than each of the
individual Edge Locations
6
Q
Advantages of cloud?
A
- Trade capital expense for variable expense
- Benefit from massive economies of scale
- Stop guessing about capacity
- Increase speed and agility
- Stop spending money running and maintaining data centres
- Go global in minutes
7
Q
IAM Best Practices - General
A
- Create individual IAM users
- Use groups to assign permissions to IAM users
- Grant least privilege
- Use access levels to review IAM permissions
- Monitor activity in your AWS account
8
Q
IAM Best Practices - Roles
A
*Use roles for applications that run on Amazon EC2 instances
* Use roles to delegate permissions
9
Q
IAM Best Practices - Policies
A
- Get started using permissions with AWS managed policies
- Use customer managed policies instead of inline policies
- Use policy conditions for extra security
10
Q
IAM Best Practices - Credential Management
A
- Lock away your AWS account root user access keys
- Configure a strong password policy for your users
- Enable MFA
- Do not share access keys
- Rotate credentials regularly
- Remove unnecessary credentials
11
Q
Amazon EC2 Metadata and User Data
A
- User data is data that is supplied by the user at instance
launch in the form of a script - Instance metadata is data about your instance that you can use to configure or manage the running instance
- User data and metadata are not encrypted
- Instance metadata is available at
http://169.254.169.254/latest/meta-data
12
Q
Access keys
A
- Access keys can be used on EC2 instances to gain permissions
to other AWS services - Access keys are stored in plaintext so this is not secure
- Better to use IAM roles whenever possible and avoid access
keys
13
Q
AWS Organizations
A
- Allows you to consolidate multiple AWS accounts into an
organization that you create and centrally manage - Available in two feature sets:
- Consolidated Billing
- All features
- Includes root accounts and organizational units
- Policies are applied to root accounts or OUs
14
Q
AWS Organization Consolidated billing includes?
A
- Paying Account – independent and cannot access resources of other
accounts - Linked Accounts – all linked accounts are independent
15
Q
AWS Control Tower
A
- Simplifies the process of creating multi-account environments
- Sets up governance, compliance, and security guardrails for
you - Integrates with other services and features to setup the
environment for you including: - AWS Organizations, SCPs, OUs, AWS Config, AWS CloudTrail,
Amazon S3, Amazon SNS, AWS CloudFormation, AWS Service
Catalog, AWS Single Sign-On (SSO)
16
Q
AWS Systems Manager
A
- Manages many AWS resources including Amazon EC2, Amazon
S3, Amazon RDS etc. - Systems Manager Components:
- Automation – uses documents to run automations
- Run Command – run commands on EC2 instances
- Inventory – gather inventory information
- Patch Manager – manage patching schedules and installation
- Session Manager – connect securely without SSH or RDP
- Parameter Store – store secrets and configuration data securely
17
Q
AWS Service Catalog
A
- Allows organizations to create and manage catalogs of IT
services that are approved for use on AWS - Allows you to centrally manage commonly deployed IT
services - IT services can include virtual machine images, servers,
software, and databases and multi-tier application
architectures - Enables users to quickly deploy only the approved IT services
they need