IAM Identity and Access Management Flashcards

1
Q

What does IAM stand for

A

Identity and Access Management, Global Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What account should not be used

A

The Root account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should you use the root account

A

When setting up your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are users

A

People within your org. and can be grouped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can groups contain other groups?

A

No just users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the version variable in a IAM policy

A

Details about the version of the policy, awlways include “2012-10-17”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the id variable in the IAM policy structure

A

an identifier for the policy (optional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the statement in a IAM Policy structure

A

one or more individual statements (required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the SID in a statement of a IAM Policy Structure

A

an identifier for the statement (optional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the SID in a statement of a IAM Policy Structure

A

Whether the statement allows or denies access (Allow, Deny)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Principal in a statement of a IAM Policy Structure

A

account/user/role to which this policy applied to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Action in a statement of a IAM Policy Structure

A

List of actions this policy allows or denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Resource in a statement of a IAM Policy Structure

A

List of resources to which the actions applied to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Condition in a statement of a IAM Policy Structure

A

Conditions for when this policy is in effect (optional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In AWS how can you setup a password policy

A
Requiring a minimum password length
Require specific character types like
-including uppercase letter
-lowercase letters
-numbers
-non-alphanumeric characters
Allow all IAM users to change their own passwords 
Require users to change passwords
Prevent password re-use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main benefit of MFA

A

If a password is stolen or hacked, the account is not compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Virtual MFA device

A

uses a software application to generate an authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two virtual MFA devices used for AWS

A

Google authenticator and Authy

19
Q

What is a universal 2nd factor (U2f) Security Key

A

A physical device that holds a security key

20
Q

What are the two MFA devices for aws

A

Hardware Key Fob MFA device and GOVCloud Hardware Key Fob

21
Q

What are the three ways to access AWS

A

Aws Management Console
AWS CLI
Aws Software Developer Kit

22
Q

How are Access Keys generated?

A

Through the AWS console

23
Q

What is the Access Key ID for

24
Q

What is the secret Access Key for

25
What is the AWS CLI
A tool that enables you to interact with AWS services using commands in your command-line shell
26
Where can you develop scripts to manage your resources
in the AWS CLI
27
What are common roles in AWS
EC2 Instance roles Lambda Function Roles Roles for CloudFormation
28
What are IAM roles
is an IAM identity that you can create in your account that has specific permissions
29
What are the two most common IAM Security Tools
IAM Credentials Report - | IAM Access Advisor
30
What is the IAM Credentials Report
A report that lists all your accounts users and the status of their various credentials
31
what is the IAM Access advisor
Shows the service permissions granted to a user and when those services were last accessed You can use this information to revise your policies
32
What are The IAM Guidelines and Best Practices
Dont use the root account except for AWS account setup One physical user = One AWS user Assign users to groups and assign permissions to groups Create a strong password policy Use and enforce the use of MFA Create and use roles for giving permissions to AWS services Use Access Keys for Programmatic Access (CLI/SDK) Audit permissions of your account with the IAM Credentials Report Never share IAM users and Access Keys
33
What responsibilities does AWS have
Infrastructure (global network security) Configuration and vulnerability analysis Compliance validation
34
What responsibilities do you have as a IAM user
Users, Groups, Roles, Policies management and monitoring Enable MFA on all accounts Rotate all your keys often Use IAM tools to apply appropriate permissions Analyze access patterns and review permissions
35
What is a user
mapped to a physical user, has a password for AWS COnsole
36
What are groups
Container for users only
37
What are policies
JSON document that outlines permissionses for users or groups
38
What are Roles for
EC2 instances or AWS services
39
How do you implement Security
Security MFA + Password policy
40
What is the AWS CLI
manages your aws services using the command line
41
What is the AWS SDK
Manage your AWS services using a programming language
42
What are Access Keys
Passwords that allows access AWS through the CLI or SDK
43
What is an audit IAM
Credential Reports and IAM Access Advisor