IAM 101 Flashcards

1
Q

What is IAM?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a root account? What should it be used for?

A

An IAM root account is created when you create an AWS account. It will always have full permissions for your organization, so it should only be used to create users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are users organized within an organization?

A

By GROUPS, which are collections of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many groups can a user belong to?

A

They can belong to multiple groups, but a user doesn’t need to belong to any groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can a group contain other groups?

A

No, a group can only contain users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are IAM permissions determined?

A

Users or groups can be assigned JSON documents called POLICIES, which define its permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are concerned about passwords being cracked or stolen within your organization. What are two ways to mitigate the risk of this?

A

1) You can create a password policy that specifies password length, password re-use requirements, character types, or password expiration periods.
2) You can enforce MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the options for MFA?

A

1) A virtual MFA device like Google Authenticator or Authy.
2) A hardware U2F device like YubiKey.
3) A hardware key fob MFA device like Gemalto.
4) A hardware key fob MFA device for AWS GovCloud, like SurePassID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a MFA device and a U2F device?

A

MFA is support for multiple tokens on a single device, while U2F (a “universal” key) is a single key for multiple root and IAM users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you don’t have access to a shell for AWS (or can’t install the CLI tool), what’s another option for using the CLI?

A

AWS has a browser CLI called CloudShell. It has the same credentials that you’d use for your user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you give permissions to an AWS service?

A

Create an IAM role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an IAM role?

A

You can think of an IAM role as similar to an IAM user, but intended to be used by an AWS service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You’d like to do an account-level audit of your users’ credentials. What security tool would you use?

A

IAM Credentials Report.

It lists all of your account’s users and the status of their various credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You’re worried that a user could have IAM access to a service that they don’t need. How can you examine this, and see if that permission has been used?

A

IAM Access Advisor.

It shows the permissions granted to a user and when those services were last accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an access key?

A

An access key is used for programmatic (CLI/SDK) access to AWS. It’s similar to a machine user in CircleCI. You can only have two access keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are best practices for access keys?

A

They’re meant for long-term use, so should only be used when they need to be. IAM roles (temporary access) are preferred over access keys.

Disable access keys on your root account - your keys should have limited permissions.

You can only have two keys, and this should be used to rotate your access keys regularly.

17
Q

How can you test whether a user can perform an action?

A

IAM policy simulator.