Management, Governance and Billing Flashcards

1
Q

Audit requests to AWS Organizations for creating new accounts by federated users

A

use CloudTrail and look for the federated identity user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Employees have created individual AWS accounts not under control. Security team need them in AWS Organizations

A

Send each account an invitation from the central organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Need to restrict ability to launch specific instance types for a specific team/account

A

Use an organizations SCP to deny launches unless the instance type is T2, create an IAM group in the account granting access to T2 instances to the relevant users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Need to ensure that S3 buckets are NEVER deleted in a production account

A

Use an SCP to deny the s3:DeleteBucket API action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Need to create user-defined cost allocation tags for new account

A

Use Tag Editor in new account to create user-defined tags and then use the billing and cost management console in the payer account to mark them as cost allocation tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Separate departments must operate in isolation and only use pre-approved services

A

Use AWS Organizations to create accounts (Organizations API) and SCPs to control the services available for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Developers can manipulate IAM policies/roles and need to block them from some services

A

Use an SCP to block those services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS bill is increasing and unauthorized services are being used across accounts

A

Use AWS Organizations with an SCP to restrict the unauthorized services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuring AWS SSO for an Organizations master account. Directory created and full access enabled

A

Next step is to create a permission set and associate with directory users and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process to create a custom dashboard in CloudWatch for custom metrics after installing agent on EC2

A

Create metric filters and select custom metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Need to test notification settings for CloudWatch alarm with SNS

A

Use the set-alarm-state CLI command to test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

App with EC2 and RDS is running slowly and suspected high CPU

A

Use CloudWatch metrics to examine resource usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site uses CloudFront and S3. Users accessing content that does not exist or they don’t have access to

A

Check the 4XXErrorRate metric in CloudWatch to understand the extent of the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Script generates custom CloudWatch metrics from EC2 instance and clock is configured incorrectly by 30 mins

A

CloudWatch will accept the custom metric data and record it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Need to collect logs from many EC2 instances

A

Use the unified CloudWatch Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

External auditor needs to check for unauthorized changes to AWS account

A

Create an IAM user, assign an IAM policy with read access to CloudTrail logs on Amazon S3

17
Q

Need to identify who is creating EIPs and not using them

A

Use CloudTrail and query logs using Athena to search for EIP address events

18
Q

S3 bucket holds sensitive data. Must monitor object upload / download activity including AWS account and IAM user account of caller and time of API call

A

Use AWS CloudTrail and enable data event logging

19
Q

Need to record any modifications or deletions of CloudTrail logs in an S3 bucket

A

Enable CloudTrail log file integrity validation and enabled MFA delete on the bucket

20
Q

Large increase in requests to SQS. Need to determine the source of the calls

A

Use CloudTrail to audit API calls

21
Q

Need to ensure that S3 buckets have logging enabled without stopping users creating them

A

Auto remediate with AWS Config managed rule S3_BUCKET_LOGGING_ENABLE

22
Q

Need to provide real-time compliance reporting for security groups to check that port 80 is not being used

A

Use the AWS Config restricted-common-ports rule and add port 80

23
Q

Company wants to limit the AMIs that are used. Need to review compliance with the policy

A

Create an AWS Config rule to check that only approved AMIs are used

24
Q

Need to automatically disable access keys that are greater than 90 days old

A

Use Config rule to identify noncompliant keys and use Systems Manager Automation to remediate

25
Q

Need to address concerns about exposing sensitive data in buckets without restricting ability to create them

A

Use AWS Config rules to identify public buckets and send SNS notification to security team

26
Q

Need to ensure CloudFormation deployment changes are tracked for governance

A

Use AWS Config

27
Q

Company needs to verify that specific KMS CMK is used to encrypted EBS volumes

A

Use AWS Config with the encrypted-volumes managed rule and specify the key ID of the CMK

28
Q

Need to create replica of existing infrastructure in new account. AWS Service Catalog is used

A

Most efficient option is to share the portfolio with the new accounts and import into those other accounts

29
Q

Users have a specialized EC2 instance config and don’t want to configure EC2 settings but need to launch/terminate instances. Special instance must only be available to them

A

Use CloudFormation template with AWS Service Catalog portfolio and grant permissions to users

30
Q

Shared portfolio is imported into a second AWS account controlled by a different administrator

A

Admin can add products from the imported portfolio to a local portfolio

31
Q

Need to monitor costs per user in an account

A

Activate the createdBy tag and analyze with AWS Cost Explorer

32
Q

How to check for underutilized EC2 instances?

A

Use AWS Cost Explorer to generate resource optimization recommendations

33
Q

Bill is increasing over time, need to determine the cause of increased cost

A

Use AWS Cost Explorer

34
Q

Need breakdown of costs per project in a single account using Cost Explorer

A

Do this by activating cost allocation tags and creating and applying resource tags

35
Q

Need to check that security best practices are being followed for the AWS account root user

A

Use AWS Trusted Advisor security checks to review configuration of root user

36
Q

Costs rising and need to be alerted when a specific spending limit is forecast to be exceeded

A

Use AWS Budgets

37
Q

Company needs to track the allocation of reserved instances in consolidated bill

A

Use the AWS Cost and Usage report

38
Q

Company needs to integrate AWS maintenance events that may affect their resources into an operations dashboard

A

Use the AWS Health API