Module 3: Securing access Flashcards

1
Q

AWS shared responsibility model

A

Security of the cloud => AWS
Security in the Cloud => Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design principles of the security pillar

A

1) Implement a strong identity foundation
2) Protect data in transit and at rest
3) Apply security at all layers
4) Keep people away from data
5) Maintain traceability
6) Prepare for security events
7) Automate security best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to implement identity foundation

A

Use policies to grant or deny access to AWS resources.
Use the principle of least priviledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you implement encryption?

A

By using Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to protect data in transit and at rest?

A

Use encryption using TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication (Who)?

A

Important to identify who is accessing. The who can be a person or an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you protect data at rest

A

Through client side encryption which encrypts data before it is sent or server side encryption that encrypts data after it is sent but before it is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Do we allow or do we deny the request once we know who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you do with Identity and Access Management (IAM)

A

configure access, grant credentials to user and groups. Distribute it accross services.
Integration with Microsoft active directory and other identity providers.
Support MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM Resource

A

Is the user group policy or identity provider object stored in IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM entity

A

The object used for authentification. They include user and roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM identity

A

An identity identifies user and groups or role. You can attach policies to identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM principal

A

Person or application using the account to authenticat and make requests. (The who behind it (app or user))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM user

A

entity you create that represent the person or application interacting with AWS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAM Group

A

Collection of users. Use groups to grant same set of permissions to multiple users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IAM Role

A

Similar to user but short term credentials for the duration of the session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM Policy

A

Document explicitely listing permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credentials needed for signing into the AWS management console

A

Username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Credentials needed to run commands in the Command Line Interface (CLI)

A

AWS access Key

18
Q

Credentials needed to make programmatic calls to AWS

A

AWS Access Key

19
Q

What is an AWS Access Key?

A

Combination of access key ID and a secret access key

20
Q

Best practice for security

A

1) Least priviledge
2) Enable MFA
3) Require human users to acces AWS with temporary credentials
4) Rotate access key for use care requiring lng term credentials
5) Use strong, Complex passwords
6) Secure local credentials
7) Use AWS Organizations
8) Enable Cloud trails
9) Protect the root user

21
Q

Least priviledge

A

Grant the strictly minimal permissions to perform tasks

22
Q

Enable MFA

A

Just do it. A lot of types exist

23
Q

Human access with temporary credentials

A

Do this through entity assigning roles to the accounts

24
Q

Rotate access key

A

For programmatic access so that they change regularly

25
Q

Strong passwords

A

Duh. Password manager…

26
Q

Secure credentials

A

Password manager again

27
Q

Use organization

A

To consolidate billing, and access control

28
Q

Enable Cloudtrail

A

Create logs to record the access to the ressources

29
Q

Protect the root user

A

Limit the use of the root user as much as possible it has complete access to everything

30
Q

How to protect the root user

A

Do not use it. Create an admin user with permissions to most task

31
Q

How to set up an admin user

A

Log in as root and set up MFA for it
Create admin and add MFA download the key
Log out of the root user
Log in to the admin user
Create your user accounts

32
Q

Use case for roles

A

Assign role to another AWS accounts needing ressources on yours.
Assign roles to user outside of your company
Assign role to a mobile app because it is not good to have credentials in there
Assign role to an app running on an EC2 because you don’t want to store the credentials there either

33
Q

2 types of policies

A

identity based policies
Ressources based policies

34
Q

Identity based policies

A

Attached to IAM User. What ressources can access the user

35
Q

Resource based

A

Attached to an AWS resource. What user can access the ressource

36
Q

Format of a policy

A

JSON

37
Q

Process to allow access

A

Is there explicit denial policy?=> If not then goes to check is there an explicit allow => If yes then allow.Otherwise denies all.

38
Q

IAM policy document structure

A

Version
Statement
Effect
Principal
Action
Resource
Condition

39
Q

Policy version

A

Version of the policy language you want to use

40
Q

Policy Statement

A

Defining what is allowed or denied based on conditions

41
Q

Policy effect

A

Allow or deny

42
Q

Policy Principal

A

Account, user or role concerned by the policy

43
Q

Policy Action

A

Action allowed .”s3:GetObject” for example

44
Q

Policy Resource

A

Resources that the policy action applies to

45
Q

Policy Condition

A

Set of rules that must be met for the rule to apply