Section 15: Amazon S3 Security Flashcards
Security feature that forces users to generate a code on a device before doing important operations on S3
S3 MFA Delete
Web browser based security mechanism that allows requests to other origins while visiting the main origin page
S3 Cross-Origin Resource Sharing (CORS)
True/False: Any admin account can update S3 MFA Delete settings on a bucket
False - Only the root account can configure this
Option that allows you to log all access to S3 buckets for audit purposes
S3 Access Logs
Feature that lets you create a URL that allows temporary access to files in S3 buckets
S3 Pre-Signed URLs
S3 Object lock mode that prevents object version from being overwritten or deleted by any user - including the root user
Compliance
S3 Object lock mode that prohibits most users from overwriting or deleting an object version
Governance
S3 Object lock mode that protects the object indefinitely, but can be placed and removed from this mode by certain users as needed
Legal Hold
Your client wants to make sure that file encryption is happening in S3, but he wants to fully manage the encryption keys and never store them in AWS. You recommend him to use…
SSE-C
A company you’re working for wants their data stored in S3 to be encrypted. They don’t mind the encryption keys stored and managed by AWS, but they want to maintain control over the rotation policy of the encryption keys. You recommend them to use…
SSE-KMS
Your company does not trust AWS for the encryption process and wants it to happen on the application. You recommend them to use…
Client-Side Encryption
You have a website that loads files from an S3 bucket. When you try the URL of the files directly in your Chrome browser it works, but when the website you’re visiting tries to load these files it doesn’t. What’s the problem?
CORS is wrong
Feature that defines a way for client web applications that are loaded in one domain to interact with resources in a different domain
Cross-Origin Resource Sharing (CORS)
You suspect that some of your employees try to access files in an S3 bucket that they don’t have access to. How can you verify this is indeed the case without them noticing?
Enable S3 Access Logs and analyze them using Athena
You are looking to provide temporary URLs to a growing list of federated users to allow them to perform a file upload on your S3 bucket to a specific location. What should you use?
S3 Pre-Signed URLs