IAM, ACCOUNTS AND AWS ORGANISATIONS Flashcards

1
Q

IAM Identity Policies

A

policy permissions that tell AWS what resources can or can’t be accessed using the identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What takes priority when reading a IAM Policy?

A

If you have a explicit Deny statement that Always takes president over an explicit allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What if there is No explicit deny or allow on an IAM Policy ?

A

the AWS resource are by default denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Inline policies

A

attached policies to an individual accounts

used for special or exceptional allow or Deny for managed policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managed Policies

A

reusable low management overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM Users

A

identity used for anything that requiring long-term AWS access ex. Humans, applications or service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Access Keys used for ?

A

Humans using CLI and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM user account limit

A

5,000 IAM users per account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Account Group limits

A

IAM users can be member of 10 groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM Groups

A

containers for IAM users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can IAM groups have policies attached to them ?

A

groups can have policies attached to them inline/managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cons of IAM Groups

A
  • no nesting
  • no built in All users group
  • 200 groups per account (soft limit can be increased )
  • not an identity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can’t you do with an IAM group that you can do with IAM user?

A

Groups can not be login to and as such are not a true identity so they can’t be references as a principal in a policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Principal

A

Physical person, application, device, or process which wants to authenticate with AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM user vs IAM role

A

single principal

Long time usage

can have policies attached to the, Both Inline and manages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAM Role vs IAM User

A

Multiple principles internal or external

more than 5,000 users

generally used on a temporary basis

Has trust and permission policy

17
Q

Trust Policy

A

controls which identities can assume that role

18
Q

Permissions Policy

A

roles can be refences in resource policies

19
Q

What operation is done to allow IAM roles to function If an IAM role is created in the CLI?

A

Temporary security credentials are generated by

AWS secure token service called

STS:AssumeRole

If done in the UI the credentials are always add when creating the IAM role

if done in the UI the credentials have to be added to the IAM role before being able to use it with AWS resources

20
Q

Wayne is a worker at Galaxe who works at the help desk. Wayne is in the Help desk group and and as such he only has read access. But there are cases where he would need Read access What solution can you provide?

A

We can make an IAM role called emergency role where if situation is need Wayne can take on that role and gain write access.

21
Q

Company A has over 5,000 user under their existing Microsoft active directory. Those users need access to an S3 bucket contain essentials company resources. How could they access the resources? what would be your solution?

A

External accounts can’t be used but we can have those accounts take on IAM role when they need to access S3.

22
Q

AWS Organization

A

allows the management of multiple aws accounts from one AWS account called the management account

23
Q

AWS Organization Consolidated Billing

A

individual billing is removed from the member account of an organization and the management account is use

24
Q

How are you able to access member accounts in AWS organizations?

A

when your invited to AWS account into the organization you have to create the IAM role manually when creating an AWS account in the organization AWS creates the roll for you.

25
Q

What is the name of the role that AWS users when switching into another AWS account under the engagement account

A
26
Q

Service Control Policies

A

account permission boundaries

that limit what a account can do

they don’t grant any permission

27
Q

Can a SPC (service control policy ) restrict what a root user can do ?

A

no, root users themselves can never be restricted. SPC limits what an account can do and so indirectly impacts what a root user can do.

28
Q

FullAWSAccess

A

default policy that is applied when you enable service control policies (SPC)

Allows access to all AWS services

29
Q

Deny List Architecture (SPC)

A

By default all AWS services are allowed which would scale with AWS as new infrastructures are added

to deny a service you would have to create a Deny list

30
Q

Allow List Architecture (SPC)

A

where the default FullAwsAccess is deleted

all resources would then be denied

you would have to create a allows list to grant access to services

31
Q

Cloud Watch Logs

A

A public services that allows store, monitor and access logging data with aws intergrations

32
Q

Cloud Trail

A

Logs API actions that effect an AWS account

enabled by default for 90 days history

33
Q

Management Events

A

management events like creating an EC2 instance or VPC

34
Q

Data Events

A

resource operations performed on or in a resource like objects being added to S3

35
Q

What’s so special about IAM,STS,and CloudFront ?

A

They are global Service events they always log there events in us-east-1

36
Q

can cloud Trail log global events ?

A

yes but it needs to be enabled

37
Q

Trails

A

unit that used to configure a3 and CW logs

38
Q

AWS Security Token Service (AWS STS)

A

is the service that you can use to create and provide trusted users with temporary security credentials that can control access to your AWS resources.

Temporary security credentials work almost identically to the long-term access key credentials that your IAM users can use.