IAM Flashcards

1
Q

IAM Security Reporting and Access Information tools

A
  • IAM credentials report (account-level)
    • all account users and their permissions
  • IAM access advisor (user-level)
    • what services were accessed by which user
    • use this information to revise policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM Groups

A
  • Groups (only contain users)
    • i.e. developers, operations
    • users can belong to multiple groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Roles

A
  • similar to user only they don’t have any credentials (not associated with a single person)
  • permission policies associated with it
  • use this inside applications and ec2 instances (instead of embeding user credentials inside an app)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policies

A

Users & Groups can be assigned JSON documents called policies describing what the group can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Inline Policy

A

policy that’s embedded in an IAM identity (a user, group, or role). That is, the policy is an inherent part of the identity. Inline policies are useful if you want to maintain a strict one-to-one relationship between a policy and the identity to which it is applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed policy

A

Reusability
Central change management
Versioning and rolling back
Delegating permissions management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

policy structure

A
  • version
  • id (optional)
  • statements
    • Sid - statement id (optional)
    • effect (allow/deny)
    • principal - account/user/role/service to which the policy is applied to (optional)
    • action - list of actions this policy allows or denies
    • resource - list of resources the actions are applied to
    • condition - conditions for when this policy is in effect (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key pairs

A

Ec2 and cloudfront only
Create a digital SIGNATURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Keys

A

Access key I’d
Secret access key

Sign programmatic requests to AWS (not accessing ec2 directly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly