IAM Flashcards

1
Q

What does an IAM identity represent?

A
  • User

- Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IAM role?

A

An IAM role is an identity that can be temporarily assigned to an application, service, user, or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can users or applications without AWS accounts be authenticated and given temporary access to AWS resources?

A

Yes, through federation with an external service, such as Kerberos, AD, or LDAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are identities pricisely controlled to access specific AWS resources?

A

By attaching policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What the two ways to attach IAM policies?

A
  • To IAM identity (identity-based policy)

- To resource (resource-based policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the IAM Policy look like?

A
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["*"],
"Resource": ["*"]
}
]
}
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does IAM Policy work?

A
  • Any action that’s not explicited allowed by a policy will be denied.
  • “Deny” policy always wins when there’s a conflict.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a IAM group?

A

IAM group helps to manage policies for a group of IAM users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens when a trusted entity assumes a role?

A

AWS issues it a time-limited security token using the AWS Security Token Service (STS)?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two important functions of Amazon Cognito?

A
  • User pool (add user sign-up and sign-in to your application)
  • Identity pool (give application users temporary, controlled access to other services in your AWS account)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to integrate with AD on-premise in AWS?

A

Use AWS Directory Service.

The goal is to apply Active Directory domains to compatible applications running in your VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is AWS Organizations?

A

AWS Organizations can manage policy-based controls across multiple AWS accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AWS Secrets Manager?

A

AWS Secrets Manager manages passwords and 3rd party API keys and deliver them to applications on request.

The manager will even automatically take care of credential rotation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AWS CloudHSM?

A

CloudHSM provides a encryption-key management service that’s similar to AWS KMS, but can meet certain compliance requirements (e.g. FIBS 140-2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best practice with AWS root account?

A
  • Lock down root user

- Delegate day-to-day tasks to specially defined users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the usage of X.509 certificate in the context of IAM?

A

X.509 certificate is used to encrypt SOAP requests, not authentication.

17
Q

Does IAM role use access key?

A

No, only IAM user and root user use.

18
Q

How AWS Organization organize accounts?

A
  • Organization Root

- Organizational Unit (OU)

19
Q

What features does AWS Organization provide?

A
  • Consolidated Billing

- Consolidation of reservations and volume discounts