IAM - Users and Groups/Policies/MFA Flashcards

1
Q

What is the role of the root user in AWS IAM?

A

The root user is created by default when you create an AWS account. It should be used only for initial setup and not for daily operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does each IAM user represent?

A

Each IAM user represents an individual person within your organisation, allowing you to manage their permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can an IAM group contain other groups?

A

A: No, an IAM group can only contain users, not other groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the principle of least privilege in AWS IAM?

A

The principle of least privilege means granting users only the permissions they absolutely need to perform their tasks, no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a best practice for managing IAM users?

A

A best practice is to not use the root account for everyday tasks and to organise users into groups with appropriate permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can an IAM user belong to multiple groups?

A

Yes, an IAM user can belong to multiple groups in AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do IAM group policies affect users?

A

Group policies apply to all users within that group. For example, if Alice, Bob, and Charles are in the Developers group, they will all inherit the same policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are inline policies in IAM?

A

Inline policies are attached to individual users rather than to groups. They allow for specific permissions for a single user, regardless of group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the key components of an IAM policy statement?

A

The key components are:

Sid (optional): Statement ID.
Effect: Allow or Deny.
Principal: The entity the policy applies to.
Action: The allowed or denied API calls.
Resource: The resources the actions apply to.
Condition (optional): Specific conditions under which the policy is applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two possible values for the Effect in an IAM policy?

A

The two values are:

Allow: Grants the specified permissions.
Deny: Denies the specified permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first defense mechanism to protect users in AWS?

A

The first defense mechanism is setting up a password policy to enforce stronger passwords for accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What options can you configure in a password policy in AWS?

A

Minimum password length.
Require specific character types (uppercase, lowercase, number, non-alphanumeric).
Allow users to change their own passwords.
Require users to change passwords periodically (e.g., every 90 days).
Prevent password reuse (users cannot revert to previous passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the second defense mechanism to protect users in AWS?

A

The second defense mechanism is Multi-Factor Authentication (MFA), which adds an additional layer of security beyond just passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is MFA recommended for AWS users, especially administrators?

A

MFA is important because it combines something you know (a password) and something you have (a security device), greatly increasing security. Even if the password is compromised, the account won’t be accessed without the second factor (e.g., a physical device like a phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main benefit of using MFA in AWS?

A

The benefit of MFA is that it protects accounts from being compromised, even if the password is stolen, since the attacker would also need the physical device to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the MFA device options in AWS?

A

Virtual MFA device (e.g., Google Authenticator, Authy).
Universal 2nd Factor (U2F) Security Key (e.g., YubiKey by Yubico).
Hardware key fob MFA devices (e.g., Gemalto).

17
Q

What is the difference between a virtual MFA device and a U2F security key?

A

A virtual MFA device (e.g., Google Authenticator, Authy) is software-based and works on a phone. A U2F security key (e.g., YubiKey) is a physical device used to authenticate users.

18
Q

What is an example of a third-party hardware key fob MFA device?

A

An example of a third-party hardware key fob MFA device is one provided by Gemalto.

19
Q

Why is it important to enforce a password policy in AWS?

A

Enforcing a password policy helps protect against brute-force attacks and ensures that users create strong, secure passwords.