Security Flashcards

1
Q

What is a DDOS attack?

A

Distributed denial of service
Flooding your server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Layer 4 DDOS attack, and what else is it known by?

A
  • AKA “Syn Flood”.
  • The attacker sends SyN packets and ignores the AYN-ACK.
  • Makes the server hang
  • This exhausts the supply of TCP connections.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a common Layer 7 attack?

A

Floods, GET/POST requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CloudTrail for?

A
  • Logging AWS API Calls.
  • Every API call in AWS is logged.
    • User Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CloudTrail Log?

A
  • API Call metadata
  • Identity of the API caller
  • Time of call
  • Source IP of the call
  • Request
  • Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Shield?

A

Free DDOS protection

Layer 3 and 4 attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does AWS Shield Advanced give you? How much is it?

A
  • Enhanced protection against more sophisticated attacks
  • Real-time protection
  • 24/7 access to a live DDOS response team
  • Protect your bill against higher fees due to DDOS
  • $3000/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Protects against Layer 7 attacks?

What protects against Layer 3 and 4 attacks?

A
  • Layer 7 - AWS WAF
  • Layer 3 and 4 - AWS Shield/Shield Advanced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is AWS WAF?

A
  • Web Application Firewall
  • Protects against application layer 7 attacks
  • Common attacks
    • HTTP/HTTPS
    • Cross-site scripting
    • SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can you control for using WAF?

A
  • IP addresses
  • Query strings
  • Country of origin
  • Request headers
  • Presence of SQL code (SQL injections)
  • Presence of scripts (cross-site scripting)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Guard Duty?

A
  • Machine learning-based threat detection
  • looks for things like known malicious IPs, port scanning, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you use AI and automation to protect your AWS account

A

Guard Duty -→ Lambda!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AWS Macie for?

A

Automated monitoring S3 buckets for PII

Can send alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AWS Inspector?

A
  • Automated security assessment service
  • Works with
    • Network
    • EC2’s
  • think “vulnerability scans”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of assessments does AWS Inspector do?

A
  • Network Assessments
  • Host Assessments (with an installed agent)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is KMS

A

Key management system

Managed service you use to generate keys.

Starts with the customer managed Key

17
Q

What is Secrets Manager? How is it accessed?

A
  • Secures, encrypts, rotates database and other credentials
  • Accessed programmatically rather than being hardcoded
18
Q

What happens when you enable rotation in secrets manager?

A
  • The credential is immediately rotated. This could be a good scenario question
19
Q

What is Parameter Store

A
  • Stores secret values inside systems manager.
    • Plain text or encrypted data.
  • Free
20
Q

What are the limits in Parameter store?

A
  • Limited to 10,000 values
  • Does not rotate the keys
  • Cannot generate keys using Cloud Manager
21
Q

How can you temporarily share S3 objects?

A
  • Pre-signed URL
  • Pre-signed cookie
22
Q

How can you share an S3 object in a shared bucket?

A

Pre-signed URL

23
Q

How can you grant access to multiple objects in a private bucket?

A

Pre-signed cookies

24
Q

What can you apply policies to?

A
  • Identities (group, user)
  • Resource
25
Q

If a privilege isn’t explicitly allowed in a policy …

A

Its implicitly denied.

26
Q

What are two common attacks you can protect against using AWS WAF

A
  • Cross-site scripting
  • SQL injection
27
Q

What AWS services allow you to import 3rd party certificates?

A

IAM Certificate Store

ACM (Aws Certificate Manager)

28
Q

AWS Shield protects your applications that use which AWS services?

A
  • ELB
  • Cloud Front
  • Route 53
  • EC2
  • Global Accelerator