IAM | Networking | Security Flashcards
What are subnets used to control? 3
Subnets are used to control network traffic, isolate resources, and define the scope of network communication within your VPC.
What is a NAT Gateway?
allows private subnets within your VPC to access the internet while preventing inbound traffic from the internet.
Explain how a NAT (Network Address Translation) Gateway works?
Translates private IP addresses of resources in your VPC to public IP addresses, allowing them to communicate with the internet while remaining secure.
What is Network Access Control List (NACL) in Amazon VPC?
Stateless firewalls that control inbound and outbound traffic at the subnet level.
What is Route 53?
A: Amazon Route 53 is a highly scalable and reliable domain name system (DNS) web service provided by AWS
How does route 53 work?
Translates domain names into IP addresses and routes internet traffic to appropriate resources based on DNS records
Such as EC2 instances, load balancers, and S3 buckets etc…
What is a policy in IAM?
An IAM policy is a JSON document that defines permissions and specifies what actions are allowed or denied on AWS resources.
What can an IAM policy be attached to? 3….
Users: IAM policies can be attached directly to individual IAM users to grant or restrict their access to AWS resources.
Groups: IAM policies can be attached to IAM groups, allowing all users within the group to inherit the permissions defined in the policy.
Roles: IAM policies can be attached to IAM roles, which can then be assumed by users or services to temporarily obtain the permissions granted by the policy.
What is IAM access key rotation?
Regularly updating access keys (access key ID and secret access key) associated with IAM users to enhance security.
What is the benefit of utilizing key rotation in AWS?
It helps mitigate the risk of unauthorized access and potential misuse of compromised or leaked credentials.
The minimum requirement for an IAM policy document consists of the following components: 5
Version
Statement
Effect
Action
Resource
What is the function of a statement within an IAM policy document?
The statement defines the permissions and access control rules. At least one statement is required in the policy document.
{ "Version": "2012-10-17", "Statement": [ {
What is the function of Effect, Action, and Resource within an IAM policy document?
Effect: The effect specifies whether the statement allows or denies access.
Action: The action specifies the specific actions or operations that are allowed or denied.
Resource: The resource specifies the AWS resources to which the permissions apply.
What is happening within this policy?
~~~
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “AllowS3ReadAccess”,
“Effect”: “Allow”,
“Action”: [
“s3:GetObject”,
“s3:ListBucket”
],
“Resource”: [
“arn:aws:s3:::my-bucket”,
“arn:aws:s3:::my-bucket/*”
]
}
]
}
~~~
In this example, the policy grants the “s3:GetObject” and “s3:ListBucket” actions on the “my-bucket” S3 bucket and its contents.
How can you secure data at rest in AWS? 3
Amazon S3 with server-side encryption
Amazon RDS with encryption, and
AWS Key Management Service (KMS) for managing encryption keys.
What is AWS CloudTrail?
It records API calls and delivers log files for tracking user activity and detecting security incidents.
What does AWS Shield protect against?
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS attacks.