Introduction to Security & Architecture on AWS Flashcards
Acceptable Use Policy
AWS’s policy for acceptable and unacceptable uses of their cloud platform. All users must agree with this policy to have an account on the platform.
Examples:
- Sending unsolicited mass emails is prohibited
- Hosting or distributing harmful content is prohibited
- Penetration tests are allowed for a list of specific services
Least Privilege Access
When granting permission for a user to access AWS resources, you should grant them the minimum permissions needed to complete their tasks and no more.
Shared Responsibility Summary
AWS Responsibility:
AWS is responsible for the security of the cloud
Customer Responsibility:
Customer is responsible for security in the cloud
AWS Responsibility
Access & Training for Amazon Employees
Global Data Centers & Underlying Network
Hardware for Global Infrastructure
Configuration Management for Infrastructure
Patching Cloud Infrastructure & Services
Customer Responsibility
Individual Access to Cloud Resources & Training
Data Security & Encryption (both in transit and at rest)
Operating System, Network, and Firewall Configuration
All Code Deployed onto Cloud Infrastructure
Patching guest OS and custom applications
Pillars of the Well-architected Framework
Cost Optimization
- Achieving minimal costs for the desired value
Operational Excellence
- Running and monitoring systems for business value
Performance Efficiency
- Using resources efficiently to achieve business value
Reliability
- Enabling infrastructure to recover from disruptions
Security
- Protecting information and business assets
Reliability on AWS
Fault Tolerance
Being able to support the failure of components within your architecture
High Availability
Keeping your entire solution running in the expected manner despite issues that may occur
Common Compliance Standards
PCI-DSS
- Compliance standard for processing credit cards
HIPAA
- Compliance standard for healthcare data
SOC 1, SOC 2, SOC 3
- Third-party reviews of operational processes
FedRAMP
- Standards for US government data handling
ISO 27018
- Standard for handling PII
Compliance Services
AWS Config
- Provides conformance packs for standards
AWS Artifact
- Provides self-service access to reports
Amazon GuardDuty
- Provides intelligent threat detection
Jane’s company is building an application to process credit cards
They will be processing cards directly and not through a service
Their bank needs a PCI DSS compliance report for AWS
Where would Jane go to get the information?
Solution: AWS Artifact
Tim’s company is considering a transition to the cloud
They store personal information securely in their system
Tim’s CTO has asked what the company’s responsibility is for security
What would you tell Tim’s CTO?
Solution: Review the Shared Responsibility Model
Ellen is a solutions architect at a startup
They are building a new tool for digital asset management
Ellen is curious how to best leverage the capabilities of AWS in this application
What resources would you recommend for Ellen and her team?
Solution: AWS Well Architected Framework
What portal provides self-service access to compliance reports?
AWS Artifact
What service continually monitor AWS resources and provides conformance packs for specific compliance standards?
AWS Config
What service provides intelligent threat detection?
AWS GuardDuty
AWS Identity & Access Management (IAM)
Service that controls access to AWS resources
Using the service is free
Manages both authentication and authorization
Supports identity federation through SAML providers including Active Directory
AWS IAM Identities
Users
Account for a single individual to access AWS resources
Groups
Allows you to manage permissions for a group of IAM users
Roles
Enables a user or AWS service to assume permissions for a task
Policies in AWS IAM
A JSON document that defines permissions for an AWS IAM identity (principal)
Defines both the AWS services that the identity can access and what actions can be taken on that service
Can be either customer managed or managed by AWS
AWS IAM Best Practices
Multi-Factor Authentication
Provides additional security with either a physical or virtual device that generates a token for login
Least Privilege Access
Users should only be granted access to AWS resources that are required for their current tasks
Amazon Cognito overview
A managed service that enables you to handle
authentication and aspects of authorization for your
custom web and mobile applications through AWS
Amazon Cognito details
User directory service for custom applications
Provides UI components for many platforms
Provides security capabilities to control account access
Enables controlled access to AWS resources
Can work with social and enterprise identity providers
Amazon Cognito Identity Providers
- Amazon
- Microsoft Active Directory
- SAML 2.0 Providers
Sylvia manages a team of DevOps engineers for her company
Each member of her team needs to have the same access to cloud systems
It is taking her a long time to attach permissions to each user for access
What approach would help Sylvia manage the team’s permissions?
Solution: Use an IAM Group for the team
Edward works for a startup that is building a mapping visualization tool
Their EC2 servers need to access data stored within S3 buckets
Edward created a user in IAM for these servers and uploaded keys to the server
Is Edward following best practices for this approach? If not, what should he do?
Solution: Use an IAM Role with EC2
William is leading the effort to transition his organization to the cloud
His CIO is concerned about securing access to AWS resources with a password
He asks William to research approaches for additional security
What approach would you recommend to William for this additional security?
Solution: Use Multi-factor Authentication (MFA)
On-premise Data Integration Services
AWS Storage Gateway
Hybrid-cloud storage service
AWS DataSync
Automated data transfer service
AWS Storage Gateway
Integrates cloud storage into your local network
Deployed as a VM or specific hardware appliance
Integrates with S3 and EBS
Supports three different gateway types
- Tape Gateway
- Volume Gateway
- File Gateway
AWS Storage Gateway Types
File Gateway
Stores files in Amazon S3 while providing cached low-latency local access
Tape Gateway
Enables tape backup processes to store data in the cloud on virtual tapes
Volume Gateway
Provides cloud based iSCSI volumes to local applications
AWS DataSync
Leverages the DataSync agent deployed as a VM on your network
Integrates with S3, EFS, and FSx for Windows File Server on AWS
Greatly improved speed of transfer due to custom protocol and optimizations
Charged per GB of data transferred
Data Processing Services
AWS Glue
Managed Extract, Transform, and Load (ETL) Service
Amazon EMR
Big-data cloud processing using popular tools
AWS Data Pipeline
Data workflow orchestration service across AWS services
AWS Glue
FULLY managed ETL (extract, transform, and load) service on AWS
Supports data in Amazon RDS, DynamoDB, Redshift, and S3
Supports a serverless model of execution
Amazon EMR
Enables big-data processing on Amazon EC2 and S3
Supports popular open-source frameworks and tools
Operates in a clustered environment without additional configuration
Supports many different big-data use cases
Supported Amazon EMR Frameworks
Apache Spark Apache Hive Apache HBase Apache Flink Apache Hudi Presto