M4: AWS Cloud Security Flashcards

Module 4

1
Q

Shared responsibility model

A

AWS responsibility for security of the cloud, customer in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security of the cloud

A

Physical security of data centres, hardware, software which hosts OS, network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IaaS

A

Provides building blocks for cloud IT (eg EC2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PaaS

A

Remove the need to manage underlying infrastructure - hardware, OS… (Eg lambda, RDS) But customer responsible for security group configurations, firewalls…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM policies

A

In JSON and define permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM entities are…

A

IAM users, IAM groups and IAM roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM user

A

Provides a way for a person, application or service to authenticate to AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM group

A

Arches the same policies to multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM role

A

Can have permission policies arched to it and can be used to delegate temporary access to users or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of access possible for users

A
  1. Programmatic

2. Management console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MFA stand for?

A

Multi factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you generate MFA token?

A
  1. Virtual MFA-compliant applications
  2. U2F security key devices
  3. Hardware MFA devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Default for IAM users

A

No permissions to access any resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Principle of least privilege

A

All permissions need to be granted explicitly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How widely do IAM policies apply

A

The scope is global: apply across all AWS regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity - based policies

A

Permission policies attached to a principal identity - managed or inline.

17
Q

Managed policies

A

Standalone identity - based policies that can be attached to multiple users, groups and roles in your AWS account.

18
Q

Managed policies

A

Standalone identity - based policies that can be attached to multiple users, groups and roles in your AWS account.

19
Q

Inline policies

A

Policies that you create and name, and that are embedded directly into a single user group or role.

20
Q

Resource based policies

A

JSON policy documents that are attached to a resource. Inline only. E.g. ACL.

21
Q

ACL

A

Access control list

22
Q

IAM explicit deny statement

A

Takes precedence over explicit allow statement.

23
Q

IAM policy simulator

A

Test and troubleshoot IAM policies

24
Q

IAM role

A

Can attach permission policies to. Does not have any log in credentials, usually temporary change in permissions. Eg to grant access to your account to third parties so they can perform an audit on your resources.

25
Best practises for securing an AWS account
1. Securing login with MFA 2. Delete root user access keys 3. Create individual IAM users and use principle of least privilege for permissions 4. Use groups to assign permissions to IAM users 5. Configure a strong password policy 6. Delegate using rules instead of sharing credentials 7. Monitor account activity using CloudTrail
26
CloudTrail
Logs all API requests in your account Enabled by default Stores 90 days
27
AWS Organizations security features
1. Organizational units with their policies 2. Integrates with IAM 3. Service control policies: maximum permissions that member accounts in the organization can have
28
AWS Key Management Service
Create and manage encryption keys Handles encryption automatically Secure and resilient service that uses hardware security modules validated under Federal Information Processing Standards
29
Amazon Cognito
Control access to AWS resources from application, sign on. Can be used with HIPPA, workloads compliant with Payment card industry data security standard
30
AWS Shield
Managed distributed denial of service protection service
31
Data at rest
Data physically stored on disk or tape
32
Data at rest encryption
Can encrypt file systems, eg EFS. Then all data transferred between EC2 and mounted EFS is encrypted. Alternatively, AWS Storage Gateway.
33
Data in transit
Data that is moving across a network | Transport layer security used
34
AWS certificate manager
Provision, manage and deploy SSL and TLS certificate
35
S3 bucket access
Private by default 1. Block public access 2. IAM policies 3. Bucket policies 4. Setting ACLs on buckets and objects 5. AWS Trusted Advisor can check permissions on buckets
36
AWS Config
Used to access, audit, evaluate the config of AWS resources. Regional service.