Notes from Security Whitepaper Flashcards

1
Q

Overview of Security Processes Part 1

A

About 20% of exam. Read this whitepaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shared security model

A

AWS secures underlying infrastructure

You’re responsible for what you put on it and connect to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS responsibilities

A

protecting infrastructure that runs their services (hardware, software, networking, facilities)

security configuration of managed services (dynamoDB, RDS, Redshift, MapReduce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAAS responsibilities

A

EC2, S3, VPC, are your responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Storage decommissioning

A

AWS decommissions storage devices using DoD or NIST standards

All decommissioned magnetic storage devices are degaussed, physically destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission Protection

A

You can use HTTPS, VPC, VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Amazon Corporate Segregation

A

AWS production network is segregated from their corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network monitoring and protection

A

AWS protects from

DDOS, MITM
IP Spoofing, Port scanning, Packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does AWS prevent IP spoofing?

A

AWS host based firewall infrastructure prevents instances from sending traffic with source iP or MAC different from its own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port scanning

A

Unauthorized port scans are violation of TOS

Have to request permission in advance to scan your own services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS Credentials

A
Passwords
MFA
Access Keys (for services, API requests)
Key Pairs (for SSH)
Certificates (can secure cloud front with it)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Trusted Advisor

A

inspects your AWS environment and recommends ways to save money, improve performance, alters common security misconfigurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Instance Isolation

A

Xen hypervisor isolated instances

AWS firewall resides in hypervisor layer, between physical and virtual NIC’s.

All packets must pass through hypervisor (firewall) layer

Physical RAM separated similarly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe zeroing of disks and RAM

A

Instances don’t have access to raw disks

Disk virtualization automatically resets every block of storage used

Memory allocated to guests is set to zero when it’s unallocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Guest OS permissions for AWS

A

instances are completely controlled by the customer.

AWS has no access to them or the guest OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe AWS EC2 Firewall

A

EC2 provides complete firewall solution, mandatory inbound firewall has default deny-all mode

Requires customers to explicitly open ports

17
Q

Describe AWS Guest OS Encryption

A

AWS can encrypt EBS volumes and snapshots with AES-256 But only with bigger instance types (M3, C3, R3, G2)to prevent performance hit

Encryption occurs on servers that host the instances, encrypting data as it moves between instances and EBS storage

18
Q

What can ELB do for security?

A

Terminate SSL on the load balancer

Lets you ID originating IP address of clients connecting to servers, whether using HTTPS or TCP load balancing

19
Q

Direct Connect

A

Lets you bypass ISP’s

Use rack space in the facility with AWS direct connect

Uses 802.1q VLANs so your direct connection can be partitioned, letting you access public and private AWS resources