IAM Flashcards

1
Q

What is IAM?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is IAM a Global or local service?

A

Global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defined the privilege principle applied in aws

A

The least privilege principle: don’t give more permissions than a user needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an inline policy?

A

A policy that is only attached to a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Basic concepts and info of IAM

A
  • Root account is created by default, shouldn’t be used or shared
  • Users are people within your organization and can be groupes
  • Groups only contain users, not other groups
  • Users don’t have to belong to a group
  • Users can belong to multiple groups
  • Users or Groups can be assigned JSON documents called policies.
  • The policies defined the permissions of the users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM policy structure

A
  • versions: policy language version
  • id: an identifier (optional)
  • statement: one or more individual statements (required)
    - sid: statement id (optional)
    - effect: whether the statement allows or denies access (allow, deny)
    - principal: account/user/role to which this policy applied to
    - action: list of actions this policies allows/denies
    - resource: list of resources to which the actions applied to
    - condition: conditions for when this policy is in effect (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM password policy

A

Dictates the rules that the users’ passwords must follow
- set a minimum length
- require specific character types
- allow all IAM users to change their own passwords
- require users to change their password after sometime (password expiration)
- prevent password re-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is MFA?

A

Multi Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Benefit of MFA

A

If a password is stolen/hacked, the account is not compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MFA device options

A

Virtual MFA device
Universal 2nd Factor Security Key
Hardware Key Fob MFA Device (for AWS GovCloud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtual MFA device

A

Support for multiple tokens on a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Universal 2nd Factor Security Key

A

Physical device
Support for multiple root and IAM users using a single security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the ways to access AWS?

A
  • AWS Management Console (protected by password + MFA)
  • AWS Command Line Interface (CLI) protected by access keys
  • AWS Software Developer KIT (SDK) protected by access keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Keys

A

Are generated through the AWS Console
Users manage their own access keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Security Tools available?

A

At the account level, IAM Credentials Report
At the user leve, IAM Access Advisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the IAM Credentials Report?

A

A security tool, a report that list all your account’s users and the status of their various credentials.

17
Q

What is IAM Access Advisor?

A

A security tool. Access Advisor shows the service permissions granted to a user and when those services where last accessed. You can uses this information to revise your policies and stick with the least privilege principle.

18
Q

Shared responsibility model for IAM

A

AWS
- Infrastructure (global network security)
- Configuration and vulnerability analysis
- Compliance validation
You
- Users, groups, roles, policies management and monitoring
- Enable MFA on all accounts
- Rotate all your keys often
- Use IAM tools to apply appropriate permissions
- Analyze access patterns and review permissions