Module 6: Security Flashcards

1
Q

What is the AWS Shared Responsibility Model?

A
  1. Customer is Responsible for the security “in” the Cloud
  2. AWS is responsible for the security “of” of the Cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What items are Customers responsible for the security “in” the Cloud?

A
  1. Operating System
  2. Application
  3. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What items is AWS responsible for the security “in” the Cloud?

A
  1. Physical
  2. Network
  3. Hypervisor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Multi-Factor Authentication (MFA)?

A

Provides an extra layer of security for your AWS account through password and then a second form of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AWS Identity and Access Management (IAM)?

A

Enables you to manage access to AWS services and resources securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Components of AWS Identity and Access Management (IAM)

A
  1. Root User
  2. Users
  3. Group
  4. Policies
  5. Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are IAM Root Users?

A

Access and control any resource in the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are IAM Users?

A

Identity that you create in AWS. It represents the person or application that interacts with AWS services and resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are IAM Groups?

A

Collection of IAM users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are IAM Policies?

A

Document that allows or denies permissions to AWS services and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Principle of Least Privilege?

A

A user is granted access to only what they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of an IAM Policy

A
  1. Effect: Allow or Deny
  2. Action: List any AWS API Call
  3. Resource: Which AWS resource the API Call is for
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IAM Role?

A

You can assume to gain temporary access to permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Functions of an IAM Role

A
  1. Associated permissions
  2. Allow or Deny
  3. Assumed for temporary amounts of time
  4. No username or password
  5. Access to temporary permissions to:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an AWS Organization?

A

A central location to manage multiple AWS accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Service Control Policy (SCP)?

A

Specify the maximum permissions for member accounts in the organization.

16
Q

Features of an AWS Organization

A
  1. Centralized management
  2. Consolidated billing
  3. Hierarchical groupings of accounts
  4. AWS service and API actions Access control
17
Q

What are Organizational Units (OUs)?

A

In AWS Organizations, you can group accounts into organizational units (OUs) to make it easier to manage accounts with similar business or security requirements.

18
Q

What is AWS Artifact?

A

Service that provides on-demand access to AWS security and compliance reports and select online agreements

19
Q

Sections of AWS Artifact

A
  1. AWS Artifact Agreements
  2. AWS Artifact Reports
20
Q

What are AWS Artifact Agreements?

A

You can review, accept, and manage agreements for an individual account and for all your accounts in AWS Organizations

21
Q

What are AWS Artifact Reports?

A

Provide compliance reports from third-party auditors

22
Q

What is the Customer Compliance Center?

A

Read customer compliance stories to discover how companies in regulated industries have solved various compliance, governance, and audit challenges

23
Q

What is a Denial-of-Service (DoS) Attack?

A

A deliberate attempt to make a website or application unavailable to users.

24
Q

Types of DoS Attacks

A
  1. UDP Flood
  2. HTTP Level Attacks
  3. Slowloris Attack
25
Q

What is a UDP Flood Attack?

A

Request large amount of requests and fake return addresses

26
Q

What AWS solution prevents UDP Flood Attacks?

A

Security Groups

27
Q

What is an HTTP Level Attack?

A

Bots making large amount of requests that regular customers can’t get in

28
Q

What is a Slowloris Attack?

A

Attack pretends to have a terribly slow connection

29
Q

What AWS solution prevents Slowloris attacks?

A

Elastic Load Balancer

30
Q

Types of Distributed Denial-of-Service Attack (DDoS) Tools

A
  1. AWS Shield
  2. AWS Shield Advanced
31
Q

What is AWS Shield?

A

Protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks

32
Q

How is AWS Shield configured?

A

As network traffic comes into your applications, AWS Shield Standard uses a variety of analysis techniques to detect malicious traffic in real time and automatically mitigates it

33
Q

What is AWS Shield Advanced?

A

Paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks

34
Q

What is AWS Key Management Service (AWS KMS)?

A

Enables you to perform encryption operations through the use of cryptographic keys

35
Q

What are Cryptographic Keys?

A

Random string of digits used for locking (encrypting) and unlocking (decrypting) data

36
Q

What is AWS WAF?

A

Web application firewall that lets you monitor network requests that come into your web applications by working together with Amazon CloudFront and an Application Load Balance by using a web access control list (ACL) to protect your AWS resources

37
Q

What is Amazon Inspector?

A

Helps to improve the security and compliance of applications by running automated security assessments

38
Q

What is Amazon GuardDuty?

A

Service that provides intelligent threat detection for your AWS infrastructure and resources by identifying threats by continuously monitoring the network activity and account behavior within your AWS environment.