IAM Flashcards
An organization is planning to create a user with IAM. They are trying to understand the limitations of IAM so that they can plan accordingly. Which of the below-mentioned statements is not true with respect to the limitations of IAM?
- One IAM user can be a part of a maximum of 5 groups
- Organization can create 100 groups per AWS account
- One AWS account can have a maximum of 5000 IAM users
- One AWS account can have 250 roles
- One IAM user can be a part of a maximum of 5 groups
You need to set up a security certificate for a cIient’s e-commerce website as it will use the HTTPS protocol. Which of the below AWS services do you need to access to manage your SSL server certificate?
A. AWS Directory Service
B. AWS Identity & Access Management
C. AWS CIoudFormation
D. Amazon Route 53
B. AWS Identity & Access Management
AWS Identity and Access Management (IAM) is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS.
All your SSL server certificates are managed by AWS Identity and Access management (IAM). Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingServerCerts.htm|
Within the IAM service a GROUP is regarded as a:
- A collection of AWS accounts
- It’s the group of EC2 machines that gain the permissions specified in the GROUP.
- There’s no GROUP in IAM, but only USERS and RESOURCES.
- A collection of users.
- A collection of users.
In an IAM Policy, what does “Version”: “2012-10-17” do?
- It is the version date the policy was last edited
- It is the version date the policy was created
- It is the version date of policy language
- This is internal use only by Amazon, and only used when a policy is made by the IAM policy generator
- It is the version date of policy language
The version statement is the version (though the version is denoted in date form) of the policy language for IAM. There are only 2 options currently, 2008-10-17 (the default) and 2012-10-17. If the version is not defined, IAM will use the 2008 version which does not include the more advanced language options such as policy variables. It is recommended to always state the latest version in your policies for all the latest features of the IAM language.
What is the default maximum number of MFA devices in use per AWS account (at the root account level)?
1
20
12
1
Which service enables AWS customers to manage users and permissions in AWS?
- AWS Access Control Service (ACS)
- AWS Identity and Access Management (IAM)
- AWS Identity Manager (AIM)
- AWS Identity and Access Management (IAM)
What does the following policy for Amazon EC2 do?
{
“Statement”:[{
“Effect”:”AI|ow”, “Action”:”ec2:Describe”, “Resource”:”” II
}
A. Allow users to use actions that start with “Describe” over all the EC2 resources.
B. Share an AMI with a partner
C. Share an AMI within the account
D. Allow a group to only be able to describe, run, stop, start, and terminate instances
A. Allow users to use actions that start with “Describe” over all the EC2 resources.
You log in to IAM on your AWS console and notice the following message. “Delete your root access keys.” Why do you think IAM is requesting this?
A. Because the root access keys will expire as soon as you log out.
B. Because the root access keys expire after 1 week.
C. Because the root access keys are the same for all users.
D. Because they provide unrestricted access to your AWS resource
D. Because they provide unrestricted access to your AWS resource
In AWS an access key is required in order to sign requests that you make using the command-line interface (CLI), using the AWS SDKs, or using direct API calls. Anyone who has the access key for your root account has unrestricted access to all the resources in your account, including billing information. One of the best ways to protect your account is to not have an access key for your root account. We recommend that unless you must have a root access key (this is very rare), that you do not generate one. Instead, AWS best practice is to create one or more AWS Identity and Access Management (IAM) users, give them the necessary permissions, and use IAM users for everyday interaction with AWS.
Reference: http://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.htmI#root-password
When you use the AWS Management Console to delete an IAM user, IAM also deletes any signing certificates and any access keys belonging to the user.
FALSE
This is configurable
TRUE
TRUE
An AWS customer is deploying an application that is composed of an AutoScaling group of EC2 Instances. The customers security policy requires that every outbound connection from these instances to any other service within the customers Virtual Private Cloud must be authenticated using a unique x.509 certificate that contains the specific instanceid. In addition an x.509 certificates must be designed by the customer’s Key management service in order to be trusted for authentication. Which of the following configurations will support these requirements?
- Configure an IAM Role that grants access to an Amazon S3 object containing a signed certificate and configure the Auto Scaling group to launch instances with this role. Have the instances bootstrap get the certificate from Amazon S3 upon first boot.
- Embed a certificate into the Amazon Machine Image that is used by the Auto Scaling group. Have the launched instances generate a certificate signature request with the instance’s assigned instance-id to the Key management service for signature.
- Configure the Auto Scaling group to send an SNS notification of the launch of a new instance to the trusted key management service. Have the Key management service generate a signed certificate and send it directly to the newly launched instance.
- Configure the launched instances to generate a new certificate upon first boot. Have the Key management service poll the AutoScaling group for associated instances and send new instances a certificate signature that contains the specific instance-id.
- Configure the Auto Scaling group to send an SNS notification of the launch of a new instance to the trusted key management service. Have the Key management service generate a signed certificate and send it directly to the newly launched instance.
What happens to the security permissions of a tenant when an IAM role is granted? (Select two)
- tenant inherits only permissions assigned to the IAM role temporarily
- add security permissions of the IAM role to existing permissions
- previous security permissions are no longer in effect
- previous security permissions are deleted unless reconfigured
- tenant inherits only read permissions assigned to the IAM role
- tenant inherits only permissions assigned to the IAM role temporarily
- previous security permissions are no longer in effect
You are setting up some IAM user policies and have also become aware that some services support resource-based permissions, which let you attach policies to the service’s resources instead of to IAM users or groups. Which of the below statements is true in regards to resource-level permissions?
A. All services support resource-level permissions for all actions.
B. Resource-level permissions are supported by Amazon CIoudFront
C. All services support resource-level permissions only for some actions.
D. Some services support resource-level permissions only for some action
D. Some services support resource-level permissions only for some action
AWS Identity and Access Management is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS. The service is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon RDS, and the AWS Management Console. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access.
In addition to supporting IAM user policies, some services support resource-based permissions, which let you attach policies to the service’s resources instead of to IAM users or groups. Resource-based permissions are supported by Amazon S3, Amazon SNS, and Amazon SQS.
The resource-level permissions service supports IAM policies in which you can specify individual resources using Amazon Resource Names (ARNs) in the poIicy’s Resource element.
Some services support resource-level permissions only for some actions.
Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_SpecificProducts.html
IAM provides several policy templates you can use to automatically assign permissions to the groups you create. The _____ policy template gives the Admins group permission to access all account resources, except your AWS account information
- Read Only Access
- Power User Access
- AWS Cloud Formation Read Only Access
- Administrator Access
- Administrator Access
When you assume an IAM role, which of the following occurs? (Select 2)
- You are granted temporary permissions based on the policy attached to the IAM Role
- You are granted admin rights for the account you assume the role in
- Permissions granted to your IAM user account are temporarily removed
- You are granted temporary permissions based on the policy attached to the IAM Role while retaining your current permissions
- You are granted temporary permissions based on the policy attached to the IAM Role
- Permissions granted to your IAM user account are temporarily removed
When you assume an IAM role, you are granted the permissions specified in that Role’s attached policies. Any current permissions granted via policy, whether attached to your IAM User Account, a Group your account is a member of, or another Role you were utilizing will be temporarily stripped away while the newly assumed Role is active. Once you return to your user account, you will lose the permissions granted by the role and your normal permissions will be restored.
Every user you create in the IAM system starts with _________.
- Partial permissions
- Full permissions
- No permissions
- No permissions