Identity and Access Management Flashcards

1
Q

What is a web service that helps you securely control access to AWS resources

A

AWS Identify and Access Management (IAM)

You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources

IAM Principals must be authenticated to send requests

A PRINCIPAL is person or application that can make a request for an action or operation on an AWS resource

When creating IAM you never need to select a region b/c all regions are in all the accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the best way to organize users and applying policies?

                                      Policies
                                      Roles
                                      Users
                                      Groups
A

Groups

-used for ORGANIZING users and applying policies

the main reason to use groups is to apply permissions to users using policies

  • users have NO permissions by default
  • the user gains the permissions applied to the group through the policy
  • you CANNOT nest a group within a group like we do at State Farm (LDAP groups)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the best way to define permissions?

                                      Policies
                                      Roles
                                      Users
                                      Groups
A

Policies

  • used for DEFNING permissions
  • policies are documents that define permissions and are written in JSON (Java Script Object Notation)
  • Identity-based policies can be applied to users, groups, and roles
  • Resource based policies apply to resources such as S3 buckets or DyanmoDB tables
  • Policies define the permissions for the identities or resources they are associated with-
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the best way to delegate permissions?

                                      Policies
                                      Roles
                                      Users
                                      Groups
A

Roles

  • Used for DELEGATING permissions and are assumed by users, applications, and services
  • When user accesses the role they are no longer acting as a user - they are acting as the role and have permissions assigned to the role
  • When assuming a role you DON’T need to store credentials so this is a better option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which group represents individual accounts used to login with a user name and password?

                                      Policies
                                      Roles
                                      Users
                                      Groups
A

Users

  • Log in to the AWS Management Console with a user name and password
  • Users are INDIVIDUAL accounts you log in with
  • ROOT USER is the user that created the account
  • —>Root users have full permissions and cannot be restricted
  • —>It is a best practice to avoid using the root user account and enable MFA

-Main credential for an AWS root account is the email addr used to create the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the user that created the account and what is their main credential to access AWS?

A

Root User

  • Main credential for an AWS root account is the email addr used to create the account
  • Root users have full permissions and cannot be restricted
  • It is a best practice to avoid using the root user account and enable MFA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a user connect to CLI (Command Line Interface) and APIs?

A

Access Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What two things does an Access Key consist of?

A

Access keys consist of an access key ID and secret access key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication that uses a second factor in addition to a password is known as…..

A

Multi-factor authentication (MFA)

  1. Something you know - IM user account and password
  2. Something you have - virtual MFA (like Google Authenticator) or physical (like yubikey) which comes from a third party
  3. Something you are - fingerprint (this is not used in AWS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What/who controls the maximum available permissions in an AWS account?

                         Identity and Access Management (IAM)
                         Root User
                         Service Control Policies
                         APIs
A

Service Control Policies (SCP’s) control the maximum available permissions in an AWS account

  • SCP’s are a feature of AWS Organizations
  • Users in the management account are not restricted
  • Tag policies enforce tag standardization
  • SCP’s do not grant permission
  • —>They control the available permissions (take permissions ‘away’)
  • —>Ex: Add control that restricts child account so they can’t create EC2 incidents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly