IAM - Identity and Access Management Flashcards

1
Q

What is IAM?

A

Indentity and Access Management, a global AWS service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is the root account part of IAM?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who can be a user?

A

Ppl within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can a group contain another group?

A

No, it can only contain user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is it a must for a user to be part of any group?

A

No, inline policies can be applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can a user be part of multiple groups?

A

Yes, it can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are IAM Permissions?

A

Policies defined for users or groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are IAM policies?

A

JSON document that list the access for different services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Permission best practise?

A

The least privilege principle: do not give more permission than a user needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you add permissions to a user without groups?

A

With inline policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the structure of an IAM Policy?

A
  • version: policy language version
  • id: policy id, optional
  • statement: one or more individual statements, required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a Policy Statement consist?

A
  • Sid: statement id, opt
  • Effect: whether the statement allows or denies access(Allow, Deny)
  • Principal: account/user/role to which this policy applied to
  • Action: list of actions this policy allows or denies
  • Resource: list of resources to which the actions applied
  • Condition: conditions for when this policy is in effect, opt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What password policies can be set in IAM?

A
  • Set minimum pw lengt
  • Require specific character
    1. including uppercase letter
    2. lowercase letter
    3. numbers
    4. non-alp. num. char.
  • Allow all IAM users to change their own passwords
  • Require users to change their password after some time (pw expiration)
  • Prevent pw reuse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MFA?

A

MFA = pw you know + security device you have
If the pw is stolen or hacked, the account is not compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the MFA options in IAM?

A
  • Virtual MFA devices: Google Auth, Authy … => multiple tokens single device
  • Universal 2nd Factpr Security Key (U2F) => multiple root and IAM users using a single sec key
  • Hardware TOTP token
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can users access AWS ?

A
  • AWS Management Console (protected by password + MFA)
  • AWS Command Line Interface (CLI): protected by access keys
  • AWS Software Developer Kit (SDK) - for code: protected by access keys
17
Q

Who can create an access key?

A

Access Keys are generated through the AWS Console

18
Q

What is AWS CLI?

A

A tool that enables you to interact with AWS services using commands in
your command-line shell.

19
Q

What is AWS SDK?

A
  • AWS Software Development Kit (AWS SDK)
  • Language-specific APIs (set of libraries)
  • Enables you to access and manage AWS services programmatically
20
Q

What are IAM Roles?

A

Permissions assign to AWS services to act on your behalf.

21
Q

What are the common IAM roles?

A
  • EC2 Instance Roles
  • Lambda function roles
22
Q

What are the IAM Security Tools?

A
  • IAM Credentials Report (account-level); a report that lists all your account’s users and the status of their various credentials
  • IAM Access Advisor (user-level); shows the service permissions granted to a user and when those services were last accessed.
23
Q

How to setup AWS CLI?

A
  • Download and install
  • Generate access key
  • Use ‘aws configure’ in cmd
  • Paste your access key
24
Q

What are the part of the Credential Reports?

A

It is a list of all users, with the following data:
* user
* arn
* user_creation_time
* password_last_used
* password_last_changed

25
Q

List some best practies for IAM

A
  • Don’t use the Root account except for AWS account setup
  • one phys. user = one AWS user
  • assign users to groups then permissions to groups
  • create strong pw policy
  • use and enforce MFA
  • create and use Roles
  • use access keys
  • Audit permissions of your accounts
  • never share IAM users & Acccess keys
26
Q

What are the responsibilities of AWS according to Shared Responsibility Model?

A
  • Infrastructure (global network security)
  • Configuration and vulnerability analysis
  • Compliance validation