Section 4 Flashcards

1
Q

Network ACL

A

tied to a subnet, stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Group

A

tied to an instance, stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stateful

A

Any changes applied to an incoming rule will be automatically applied to the outgoing rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateless

A

Any changes applied to an incoming rule will -NOT- be applied to the outgoing rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supports allow rules only, eg. You cannot deny a certain IP address from establishing a connection

A

Security Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Supports allow and deny rules. eg. You can block an IP address from establishing a connection

A

Network ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

KMS

A

Key Management Service, create and manage keys and control the use of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS Managed Keys

A
  • AWS generated on customer’s behalf
  • Rotated once every three years automatically
  • Cannot be deleted
  • Scope of use- limited to a specific AWS service
  • Key accessed Policy- AWS Managed
  • User access management- IAM policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Customer Managed Keys, CMK

A
  • Customer Generated
  • Rotated once a year automatically
  • Can be deleted
  • Scope of use- Controlled via KMS/ IAM policy
  • Key Access Policy- AWS Managed
  • User Access Management- IAM Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Custom Key Stores

A
  • Configured cloud HSM Cluster

- Most secure way to store keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS Shield Standard

A

Automatically applied, Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Shield Advanced

A
  • Access to DDoS response team
  • Cost Protection
  • Customizable protection
  • $3000/M
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web Application Firewall

A

lets you monitor web requests that are forwarded to an Amazon API Gateway, CloudFront distribution, or an Application LoadBalancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS Firewall Manager

A

central management of firewall rules across accounts and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM

A

Identity and Access Management, used to control who is authenticated and authorized to use resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programmatic Access

A

Enables an access key ID and secret access key for the AWS, API, CLI, SDK, and other development tools

17
Q

Management Console Access

A

Enables a password that allows users to sign-in to the AWS Management Console

18
Q

IAM User

A

has permanent long-term credentials and is used to directly interact with AWS services

19
Q

IAM Group

A

a management convenience to manage the same set of permissions for a set of IAM users

20
Q

IAM Role

A

entity with permissions to make AWS service requests

  • not for user’s to login as
  • for resources to interact with each other