IAM: Identity and Access Management Flashcards

1
Q

What AWS service is used to create and manage permissions for users, groups, and roles?

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Identity Policies?

A

Identity Policies are rules that can be attached to an identity and grant or deny access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When Identity Policy statements overlap, which statement takes precedence?

A

Explicit denies have the highest priority, then explicit allows, then implicit denies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should you use a managed policy instead of an inline policy?

A

Managed policies are reusable, whereas inline policies have to be applied as lines of json to each individual identity. If you need to change part of that json, you would have to do it for each identity instead of just once in the managed policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When should you use inline policies?

A

For special or exceptional allow or deny cases on a small set of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an IAM user represent?

A

A human or application that needs to access resources within an AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does an IAM group represent?

A

A collection of users that need the same permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does an IAM role represent?

A

A temporary grant of permissions to specified resources within an AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What scope and level of resilience does IAM have?

A

IAM is a global service with global resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of credentials are used when accessing AWS resources via the command line interface (CLI)?

A

IAM Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many access keys can a single IAM user have?

A

Two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When can you download a secret access key for an IAM user?

A

Only when it is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Are IAM access key mutable or immutable?

A

Immutable. A key cannot be changed; you must create a new key to replace it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of credentials that can be used to authenticate an IAM user?

A

Username/password and access keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the maximum number of IAM users an AWS account can have?

A

5,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the maximum number of groups an IAM user can be a member of?

A

10.

17
Q

Can you log in as an IAM Group?

A

No.

18
Q

Are IAM Policies attached to IAM Users, IAM Groups, or both?

A

Both.

19
Q

Is there a default “All Users” group in IAM?

A

No.

20
Q

How many levels deep can IAM Groups be nested?

A

Zero. IAM Groups cannot be nested.

21
Q

What is the default limit for IAM Groups per AWS account?

A

300, but this can be increased by contacting AWS.

22
Q

What types of IAM stuctures can Resource Policies reference? IAM Users, IAM Groups, or IAM Roles?

A

IAM User and IAM Roles. A Resource Policy cannot reference an IAM Group. IAM Groups are not identities, they are just a collection of identities.

23
Q

What is the difference between an IAM User and an IAM Role?

A

An IAM User represents a single principle (a person or an application) that has certain access rights to resources. An IAM Role is an identity that can be assumed to temporarily grant access rights for a short period of time.

24
Q

What are the two types of policies that can be attached to an IAM Role?

A

A Trust Policy and a Permissions Policy.

The Trust Policy specifies what identities can assume the Role.

The Permissions Policy specifies what access to resources the Role has.

25
Q

What types of identities can be specified in a Trust Policy?

A

Identities in the AWS account (IAM Users, IAM Roles, and AWS Services), identities in other AWS accounts, anonymous identities, and federated identities from other identity providers (Facebook, Google, etc.)

26
Q

How would you provide user login for a mobile or web application that has millions of users?

A

By using federated or web identies and IAM Roles to grant access to the necessary AWS resources.

27
Q

What is a service-linked role?

A

An IAM Role linked to a specific AWS service. These are often auto-generated and cannot be deleted until they are no longer needed.

28
Q

What does the PassRole permission allow?

A

PassRole allows an identity to pass a Role to an AWS service even if the identity itself does not have access to that Role.

29
Q

If the “Principal” attribute appears as a statement in a policy, is the policy most likely an identity policy or a resource policy?

A

Resource policy. The “Principal” attribute will specify which indentities are effected by the statement.