IAM Advanced Flashcards

1
Q

What is AWS Organizations?

A

A global service, to manage multiple AWS Accounts at the same time.

You have a main account called “Management Account”.
The other accounts are called “Member Accounts”.
**Member accounts can only be part of 1 organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does account billing work when using AWS Organizations?

A

Billing is centralized for all accounts, in the management account.

Discounts for quantity of resources also is aggregated.

Shared reserved instances and savings plan usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are OUs in aws organizations?

A

They are like groups of types of aws accounts.

Root OU is always for Management account

Example:
1 OU for Dev aws member accounts
1 OU for Prod aws member accounts

You can create OUs inside other OUs.
For example an HR OU and and a Finance OU inside the Prod OU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages of using aws organizations with OUs?

A

Thanks to having multiple accounts, you have better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Service Control Policies? (SCP)

A

IAM Policies applied to OUss or member aws accounts to restrict all users and roels within that account.

They dont apply to management account.

SCPs have inheritance policies, so if you apply a deny to an OU, all accounts and children OUs in this OU will have the deny applied.

If you apply an allow on an x OU, OUs inside the x will also inherit the allow policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a great permission boundary use case?

A

To limit a specific user permissions without changing any iam policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are IAM Permission boundaries?

A

Its like an allow policy you can attach to users and roles (NOT GROUPS). And its a json with specific permissions in a statement. But those defined permissions are the boundary of the user, meaning it can’t do more than that configured policy for the boundary.

You still need iam permissions on top of it to grant access to the user or role.

The IAM Policy needs to match or be contained in the IAM Permission boundary for the user to have any permissions.

If you have a user with a boundary that only includes allow statement for EC2, and you configure a iam policy giving it access to read on S3, it won’t work. The user wont have any permssions until you give it access to any api call on EC2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AWS Identity Center?

A

A service for SSO for all your aws accounts within an organization.
Also SSO for Windows EC2 instances (Like an ad domain)
Also external SAML enabled apps like Ms 365, salesforce, etc.

It uses an identity provider, which can be built-in from identity center, or external like Active Directory, okta, etc.

You have “permission sets” for access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is AWS Directory services?

A

Integration with Microsoft AD.

1) AWS Managed Ms AD
2) Connector
3) Simple AD

AWS Managed Ms AD can be connected with on premises ad with trust relationship.

The connector is a proxy to redirecto to your on premises AD.

Simple AD is ad compatible directory managed by aws, can’t be connected to on permises AD.

Both support MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is AWS Control Tower?

A

Easy way to set up and govern a secure and compliant multi-account aws environment based on best practices.

It uses aws organizations to create accounts.

Automates setup of your environment in a few clicks
Automates policy management using “guardrails”
Detect policy violations and remediate automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are control tower guardrails?

A

Preventive guardrails:
Applies aws orgs SCPs to all accounts with restricted service access.
Detective guardrials:
Detect non compliance using aws config: Ex: Identified untagged resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When configuring permissions for EventBridge to configure a Lambda function as a target you should use ………………….. but when you want to configure a Kinesis Data Streams as a target you should use …………………..
*Identity-based policy, Identity-based policy
*resource-based policy, Identity-based policy
*Identity-based policy, resource-based policy
*resource-based policy, resource-based policy

A

*resource-based policy, Identity-based policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly