Introduction to IAM Flashcards

1
Q

Principle of Shared Responsability Model

A
  • AWS secures the hardware, software, facilities, and networks that run all of its products and services
  • Customers are responsible for securely configuring the services they sign up for and anything they put on those services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The items managed in IAM

A
  • Users
  • Groups
  • Policies
  • Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 advices for creating policies

A
  • Follow the standard security advice of granting least privilege
  • Determine what users need to do, then craft policies for them
  • Create policies for individual resources that identify precisely who is allowed to access the resource, and allow only the minimal permissions for those users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the default accesses of an IAM user

A

Nothing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM permission types

A
  • Identity-based permissions are attached to the IAM user and indicate what the user is permitted to do.
  • Resource-based permissions are attached to a resource and indicate what a specified user (or group of users) is permitted to do with it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM policy types

A
  • Managed policies are standalone policies that you can attach to multiple users, groups, and roles
    • AWS Managed
    • Customer managed
  • Inline Policies are embedded in a principal entity such as a user, group, or role.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The different parts of an ARN (and what is ARN)

A

Amazon Resource Name
- starts with arn:aws
- Identifier for product or service
- AWS region that the resources reside in
- Account number (without hyphens)
- Resource identifer

arn:aws:service:region:account:resourceId

Only one wildcard allowed
For S3, region and account can be empty (because S3 bucket names are globally unique)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rules for evaluating IAM policies

A
  • By default, all requests are denied.
  • An explicit allow overrides this default.
  • An explicit deny overrides any allows.
  • When one policy allows an action and another policy denies an action, the policy that denies the action is applied.
  • Any actions that you didn’t explicitly allow are denied
  • Any actions that you explicitly deny are always denied
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you authenticate API requests?

A

Credentials are used to authenticate API requests.
They contain:
- access key ID
- secret access key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are SSL sessions used for?

A

Secure Sockets Layer (SSL) sessions are used to authenticate API requests in the same as access keys do. However, SSL sessions are intended for temporary use and must be paired with a session token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are IAM user credentials used for? What do they contain?

A

IAM user credentials are used to provide sign-in access to the AWS Management Console.
They contain username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you setup the AWS credentials?

A
  1. Create a credentials profile in these locations based on the operating system:
    • For Linux, macOS, or Unix: ~/.aws/credentials
    • For Windows: C:\Users\USERNAME .aws\credentials
  2. Add the aws_access_key_id and aws_secret_access_key that you received when you set up your account and downloaded your AWS credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the security requirement for requests to AWS services?

A

Requests to AWS services must be signed. Requests are signed by using the access key ID and secret access key of an AWS account or of an IAM user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly