IAM Flashcards

1
Q

4 Steps to Secure Your AWS Root Account

A
  1. Enable multi-factor authentication on the root account.
  2. Create an admin group for your administrators, and assign the appropriate permissions to this group.
  3. Create user accounts for your administrators.
  4. Add your users to the admin group.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IAM Federation?

A

You can combine your existing user account with AWS. For example, when
you log on to your PC (usually using Microsoft Active Directory), you can use the same credentials to log in to AWS if you set up federation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Identity Federation?

A

Uses the SAML standard, which is Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many access keys can exist per IAM identity?

A

You can have only have two access keys per identity(active or inactive). It is helpful if you want to rotate access keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between managed policies and inline policies?

A

When you create an inline policy, it is immediately attached to the IAM identity (user, group, or role) for which it is defined upon creation. Inline policies are specific to the IAM identity with which they are associated, and they are applied right away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When inline policies should be used instead of managed policies?

A

When you need to ensure that a specific set of rights (allow or deny) to an identity. For special or exceptional allow or deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many IAM users can have per account?

A

5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In how many groups maximum can be a member an IAM user?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many groups can exists per account?

A

300(soft limit). Can be increased by request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can groups be referenced as a principal in a policy?

A

No. Groups are not a “true identity”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2 types of policies that can be attached to an IAM role?

A
  1. Trust Policy (controls which identities can assume the role)
  2. Permissions Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a role is assumed which AWS service creates the temporary credentials for the role?

A

STS (Secure Token Service) sts:AssumeRole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a service linked role?

A

A Service-Linked Role is a predefined IAM role managed by AWS for a specific service to perform actions on your behalf securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the relationship between an “instance profile” and an “IAM role”?

A

An “instance profile” and an “IAM role” are closely related in AWS. The “IAM role” defines permissions and policies, while the “instance profile” is a container used to associate the IAM role with EC2 instances. When launching an EC2 instance, you typically select or create an IAM role, and the instance profile is created automatically to link the role to the instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does an EC2 instance use an instance profile to obtain temporary credentials in AWS?

A
  1. The EC2 instance contacts the instance metadata service at http://169.254.169.254/latest/meta-data/iam/security-credentials to retrieve the IAM role name associated with the instance profile.
  2. The EC2 instance constructs a specific URL to get the security credentials for the IAM role. The URL is: http://169.254.169.254/latest/meta-data/iam/security-credentials/<rolename></rolename>
  3. The EC2 instance makes a request to the constructed URL and retrieves the temporary credentials, which include an access key, a secret key, and a session token.
  4. An application running on the EC2 instance can then automatically access the credentials by making a request to the constructed URL and use these temporary credentials to make secure API calls to AWS resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly