Module 6: Security Flashcards

1
Q

What is the AWS Shared Responsibility Model?

A
  1. Customer is Responsible for the security “in” the Cloud
  2. AWS is responsible for the security “of” of the Cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What items are Customers responsible for the security “in” the Cloud?

A
  1. Operating System
  2. Application
  3. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What items is AWS responsible for the security “in” the Cloud?

A
  1. Physical
  2. Network
  3. Hypervisor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Multi-Factor Authentication (MFA)?

A

Provides an extra layer of security for your AWS account through password and then a second form of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AWS Identity and Access Management (IAM)?

A

Enables you to manage access to AWS services and resources securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Components of AWS Identity and Access Management (IAM)

A
  1. Root User
  2. Users
  3. Group
  4. Policies
  5. Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are IAM Root Users?

A

Access and control any resource in the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are IAM Users?

A

Identity that you create in AWS. It represents the person or application that interacts with AWS services and resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are IAM Groups?

A

Collection of IAM users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are IAM Policies?

A

Document that allows or denies permissions to AWS services and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Principle of Least Privilege?

A

A user is granted access to only what they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of an IAM Policy

A
  1. Effect: Allow or Deny
  2. Action: List any AWS API Call
  3. Resource: Which AWS resource the API Call is for
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IAM Role?

A

You can assume to gain temporary access to permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Functions of an IAM Role

A
  1. Associated permissions
  2. Allow or Deny
  3. Assumed for temporary amounts of time
  4. No username or password
  5. Access to temporary permissions to:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an AWS Organization?

A

A central location to manage multiple AWS accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Service Control Policy (SCP)?

A

Specify the maximum permissions for member accounts in the organization.

16
Q

Features of an AWS Organization

A
  1. Centralized management
  2. Consolidated billing
  3. Hierarchical groupings of accounts
  4. AWS service and API actions Access control
17
Q

What are Organizational Units (OUs)?

A

In AWS Organizations, you can group accounts into organizational units (OUs) to make it easier to manage accounts with similar business or security requirements.

18
Q

What is AWS Artifact?

A

Service that provides on-demand access to AWS security and compliance reports and select online agreements

19
Q

Sections of AWS Artifact

A
  1. AWS Artifact Agreements
  2. AWS Artifact Reports
20
Q

What are AWS Artifact Agreements?

A

You can review, accept, and manage agreements for an individual account and for all your accounts in AWS Organizations

21
Q

What are AWS Artifact Reports?

A

Provide compliance reports from third-party auditors

22
Q

What is the Customer Compliance Center?

A

Read customer compliance stories to discover how companies in regulated industries have solved various compliance, governance, and audit challenges

23
Q

What is a Denial-of-Service (DoS) Attack?

A

A deliberate attempt to make a website or application unavailable to users.

24
Types of DoS Attacks
1. UDP Flood 2. HTTP Level Attacks 3. Slowloris Attack
25
What is a UDP Flood Attack?
Request large amount of requests and fake return addresses
26
What AWS solution prevents UDP Flood Attacks?
Security Groups
27
What is an HTTP Level Attack?
Bots making large amount of requests that regular customers can't get in
28
What is a Slowloris Attack?
Attack pretends to have a terribly slow connection
29
What AWS solution prevents Slowloris attacks?
Elastic Load Balancer
30
Types of Distributed Denial-of-Service Attack (DDoS) Tools
1. AWS Shield 2. AWS Shield Advanced
31
What is AWS Shield?
Protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks
32
How is AWS Shield configured?
As network traffic comes into your applications, AWS Shield Standard uses a variety of analysis techniques to detect malicious traffic in real time and automatically mitigates it
33
What is AWS Shield Advanced?
Paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks
34
What is AWS Key Management Service (AWS KMS)?
Enables you to perform encryption operations through the use of cryptographic keys
35
What are Cryptographic Keys?
Random string of digits used for locking (encrypting) and unlocking (decrypting) data
36
What is AWS WAF?
Web application firewall that lets you monitor network requests that come into your web applications by working together with Amazon CloudFront and an Application Load Balance by using a web access control list (ACL) to protect your AWS resources
37
What is Amazon Inspector?
Helps to improve the security and compliance of applications by running automated security assessments
38
What is Amazon GuardDuty?
Service that provides intelligent threat detection for your AWS infrastructure and resources by identifying threats by continuously monitoring the network activity and account behavior within your AWS environment.