IAM Flashcards

1
Q

What does IAM stand for?

A

Identity Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is IAM a global service?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the root account created? Should it be used or shared?

A

The root account is created by default. It should NEVER be used or shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are users?

A

End users within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are groups?

A

Groups are a collection of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can groups contain other groups?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do users have to belong to a group?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/False: Users can only belong in one group

A

False, users can belong to multiple groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are IAM policies?

A

IAM policies define permissions for an action regardless of the method that you use to perform the operation. For example, if a policy allows the GetUser action, then a user with that policy can get user information from the AWS Management Console, the AWS CLI, or the AWS API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who can be assigned JSON documents aka ‘policies’?

A

Users and Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the least privilege principle?

A

Don’t give more permissions than a user needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the IAM policy structure consist of?

A

Version, Id, and Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the IAM policy statement consist of?

A

Sid, Effect, Principal, Action, Resource, Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In AWS IAM policy statement, what does Sid stand for and what is it?

A

Sid = Statement ID
Sid is an identifier for the statement. Sid not always present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In AWS IAM policy statement, what does the Effect show?

A

the Effect shows whether the statement allows or denies access
(Allow, Deny)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In AWS IAM policy statement, what does the principal show?

A

the account/user/role to which the policy is applied to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In AWS IAM policy statement, what does the resource show?

A

the Resource shows a list of resources to which the actions applied to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In AWS IAM policy statement, what does the Condition show?

A

the Condition shows the conditions for when the policy is in effect (optional…not always present in the statement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some requirements that you can add when setting up a password policy to create stronger passwords?

A

Set a min password length, require specific character types (i.e upper/lower case, numbers, non-alphanumeric), allow ALL IAM users to change their passwords, set a password expiration & require users to change it, prevent password re-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does MFA stand for?

A

Multi-Factor Authentication

21
Q

Why should MFA be implemented?

A

To protect your Root Accounts and IAM users. Users who have access to your account can change configurations and/or delete resources

22
Q

How does MFA work?

A

MFA = password you know + security device you own

23
Q

What is the main benefit of an MFA?

A

If a password is stolen or hacked the account is not compromised

24
Q

What are the types of MFA devices?

A

virtual MFA device, universal 2nd factor (U2F) security key, hardware key fob mfa device, hardware key fob mfa device AWS GovCloud

25
What are 2 types of virtual MFA devices?
Google authenticator (phone only) and Authy (mult-device)
26
True/False Virtual MFA devices can support multiple tokens on a single device
True
27
What is an example of a Universal 2nd Factor (U2F) Security Key?
YubiKey by Yubico (a third party vendor)
28
True/False U2F's such as YubiKey by Yubico can support multiple root and IAM users using a single security key
true
29
What is an example of a hardware key fob mfa device?
Gemalto
30
What is an example of a hardware key fob MFA device for AWS GovCloud (US)?
SurePassID
31
How many options do you have to access AWS?
3
32
How can you access AWS?
AWS Management Console (protected by password + MFA), AWS CLI (protected by access keys), AWS Software Developer Kit/SDK (for code: protected by access keys)
33
Where are access keys generated?
through the AWS console
34
Who manages users' access keys?
Users manage their own access keys
35
True/False Access keys should be shared
False
36
True/False Access Key ID is similar to a username
True
37
True/False The secret access key is similar to a password
True
38
What is the AWS CLI?
a tool that enables you to interact with AWS services using commands in you command-line shell
39
What does AWS Command Line Interface provide?
Direct access to the public APIs of AWS services and an alternative to the AWS Management console
40
What is the AWS SDK?
AWS Software Development Kit. Enables you to access and manage AWS services programmatically.
41
What does an IAM role do?
assign permissions to AWS services to perform actions on your behalf
42
Give examples of common IAM roles?
EC2 Instance Roles, Lambda Function Roles, Roles for CloudFormation
43
What are two IAM security tools?
IAM Credentials Report (account level), IAM Access Advisor (user level)
44
What does a credential report show?
a report that lists all your account's users and the status of their various credentials
45
What does the IAM access advisor show?
the service permissions granted to a user and when those services were last accessed
46
How can IAM access advisor be used?
to revise policies
47
What are the AWS IAM best practices?
1.) don't use the root user except for AWS account setup 2.) one physical user = one AWS user 3.) create a strong password policy 4.) use & enforce the use of MFA 5.) create & use roles for giving permissions to AWS services 6.) use access keys for programmatic access (CLI/SDK) 7.) audit permissions of your account with the IAM credentials report 8.) never share IAM users and Access Keys
48
What is a policy?
a JSON doc that outlines permissions for users or groups