Module 6 - Security Flashcards
What is the model that describes the responsibility of the customer and of AWS?
Shared responsibility model
What enables you to manage access to AWS services and resources securely.
AWS Identity and Access Management (IAM)
What is the principle of least privilege?
A user is granted access only to what they need.
Suppose that your company has multiple AWS accounts. You can use ________ to consolidate and manage multiple AWS accounts within a central location.
AWS Organizations
What can you use to centrally control permissions for the accounts in your organization?
Service control policies (SCPs)
What is AWS Artifact?
It is a service that provides on-demand access to AWS security and compliance reports and select online agreements.
Suppose that your company needs to sign an agreement with AWS regarding your use of certain types of information throughout AWS services. You can do this through _______
AWS Artifact Agreements.
Next, suppose that a member of your company’s development team is building an application and needs more information about their responsibility for complying with certain regulatory standards. You can advise them to access this information in ________
AWS Artifact Reports.
___________ automatically protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks.
AWS Shield Standard
________ is a paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks.
AWS Shield Advanced
What is AWS Key Management Service (AWS KMS)
It allows you to use cryptographic keys to access your encrypted data whether at rest or on transit
What is a web application firewall that lets you monitor network requests that come into your web applications?
AWS WAF
To perform automated security assessments, they decide to use __________
_________ helps to improve the security and compliance of applications by running automated security assessments. It checks applications for security vulnerabilities and deviations from security best practices, such as open access to Amazon EC2 instances and installations of vulnerable software versions.
Amazon Inspector
______ is a service that provides intelligent threat detection for your AWS infrastructure and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment.
Amazon GuardDuty