Misc Exam Tips and Security Best Practices Flashcards
Directory Service AD Connector
vs
Simple AD
Simple AD is cheap AD compatible service with commons directory features
AD Connector lets you connect local AD to AWS
How do you create Cross-Account access with IAM?
create an IAM role with two policies attached
permissions policy grants user of the role permissions to carry out tasks on the resource
Trust policy specifies which trusted accounts are allowed to grant its users permissions for the role
Trust policy on the role in the trusting account is 1/2 of the permissions. Other half is a permissions policy attached to the user in the trusted account allowing that user to switch to or assume the role
https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html
Have a good understanding of how Route53 supports all of the different DNS record types, and when you would use certain ones over others.
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html
Know when Elastic IP’s are free or not
If you add EIP’s to an instance you are charged for each of them per hour.
Even charged when these addresses are associated with stopped instance or unattached interface. to encourage people to use them efficiently
High level areas that Trusted Advisor covers
https://aws.amazon.com/premiumsupport/trustedadvisor/
Cost Optimization Fault Tolerance Performance Security Service Limits
How to troubleshoot timeout error when connecting to instance in a VPC
Need a security group allowing inbound traffic from public IP on proper port
Need a route sending outbound traffic to the internet gateway for the VPC
Network ACL’s must allow inbound, outbound traffic
How to troubleshoot timeout error when connecting to instance in a VPC
Need a security group allowing inbound traffic from public IP on proper port
Need a route sending outbound traffic to the internet gateway for the VPC
Network ACL’s must allow inbound, outbound traffic
Know some use cases for Simple Workflow Services
https://aws.amazon.com/swf/faqs/
Amazon SWF enables applications for a range of use cases, including media processing, web application back-ends, business process workflows, and analytics pipelines, to be designed as a coordination of tasks. Tasks represent invocations of various processing steps in an application which can be performed by executable code, web service calls, human actions, and scripts.
Know how to setup consolidated billing and cross-account access so department resources are isolated from each other but accounting can oversee it all
http://jayendrapatil.com/aws-consolidated-billing/
Know how to make changes to AutoScaling Group
Know what you can, can’t change
Can specify only one launch configuration for ASG at a time
Cannot modify launch config after creating it
If you need to change it, create a new one and update your ASG with the new one. Existing instances aren’t affected but new ones use the new config
How do DynamoDB, Elasticache, S3 compare to each other for durability and latency
DynamoDB - durable, can pay for strong consistency
Elasticache - great speed, not so durable
S3 - eventual consistency, lower latency
https://d0.awsstatic.com/whitepapers/AWS%20Storage%20Services%20Whitepaper-v9.pdf
Compare bucket policies, IAM policies, ACLS for use in S3 and examples of when to use each
IAM Policies
grants users fine granular control to S3 bucket or objects while retaining control over what users do
Bucket Policies
rules apply broadly to all S3 resources
Can restrict access access based on IP address, HTTP referrer
ACLs
Grant specific permissions (read, write, full control) to specific users for individual bucket or object
When and how to encrypt snapshots
public snapshots of encrypted volumes NOT supported
can share encrypted snapshot with specific accounts
How to use ELB cross-zone load balancing to evenly distribute traffic to EC2 instances in multiple AZ’s
http://jayendrapatil.com/tag/elastic-load-balancer/
Autoscaling Lifecycle Hooks
Lifecycle hooks enable you to perform custom actions by pausing instances as an Auto Scaling group launches or terminates them. For example, while your newly launched instance is paused, you could install or configure software on it.
Each Auto Scaling group can have multiple lifecycle hooks. However, there is a limit on the number of hooks per Auto Scaling group.
Where does bastion host (jump server) reside
public subnet
How do you establish cross-account access?
In the trusting account (A) create IAM policy that grants trusted account (B) access to the resources.
Account B can delegate that access to its IAM users
Account B cannot delegate more access to its users than it has been granted by account A
Steps for Identity Federation
Enterprise user access identity broker application
identity broker authenticates users against corporate identity store
identity broker has permission to access AWS security token service to request temporary credentials
Enterprise users can get a temporary URL that gives them access to API’s or Management Console.
Describe EC2 key usage for AWS Linux AMI
When new linux instance is created, EC2 asymmetric key pairs are generated. Or you can create your own
When instance is launched, public key is appended to local user’s ~/.ssh/authorized_keys file
User authenticates using the private key on their computer
Describe EC2 key usage for AWS Windows AMI
When new Windows instance launched the EC2CONFIG service creates random Windows Administrator password and encrypts it with the EC2 Public Key
User gets the password from the AWS Console or CLI and providing the correct EC2 Private Key to decrypt it
The password authenticates to Windows
Describe a Resource Policy
Where the user creates resources and then wants to allow other users to access them.
The policy is attached to the resource and describes who can do what with it
The user is control of the resource
Describe a Capability policy (AKA user-based permissions in the IAM documentation)?
Used to enforce company-wide access policies
Assigned to IAM users directly or through an IAM Group
Can be assigned to a role that’s assumed at run time
Define what capabilities the user is allowed or denied tt perform
they can override resource based policies by explicit denying them
Can IAM policies restrict access to a specific source IP address range, or certain days and times?
Yes
Are resource and capability policies cumulative?
Yes
A user’s effective permissions are the union of a resource policy and the capability permissions granted directly or through group membership