Security Flashcards

1
Q

What is the shared responsibility model?

A

The shared responsibility model divides into customer responsibilities (commonly referred to as “security in the cloud”) and AWS responsibilities (commonly referred to as “security of the cloud”).

You can think of this model as being similar to the division of responsibilities between a homeowner and a homebuilder. The builder (AWS) is responsible for constructing your house and ensuring that it is solidly built. As the homeowner (the customer), it is your responsibility to secure everything in the house by ensuring that the doors are closed and locked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are customers responsible for in the shared responsibility model?

A

Customers are responsible for the security of everything that they create and put in the AWS Cloud.

When using AWS services, you, the customer, maintain complete control over your content. You are responsible for managing security requirements for your content, including which content you choose to store on AWS, which AWS services you use, and who has access to that content. You also control how access rights are granted, managed, and revoked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is AWS responsible for in the shared responsibility model?

A

AWS is responsible for security of the cloud.

AWS operates, manages, and controls the components at all layers of infrastructure. This includes areas such as the host operating system, the virtualization layer, and even the physical security of the data centers from which services operate.

AWS is responsible for protecting the global infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure includes AWS Regions, Availability Zones, and edge locations.

AWS manages the security of the cloud, specifically the physical infrastructure that hosts your resources, which include:
Physical security of data centers
Hardware and software infrastructure
Network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is first user role/identity when you create an AWS Account?

A

Root User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IAM Policy?

A

An IAM policy is a document that allows or denies permissions to AWS services and resources.

IAM policies enable you to customize users’ levels of access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the security principle “least privilege”?

A

Follow the security principle of least privilege when granting permissions.

By following this principle, you help to prevent users or roles from having more permissions than needed to perform their tasks.

For example, if an employee needs access to only a specific bucket, specify the bucket in the IAM policy. Do this instead of granting the employee access to all of the buckets in your AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an IAM Group?

A

An IAM group is a collection of IAM users. When you assign an IAM policy to a group, all users in the group are granted permissions specified by the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When should an IAM role be used?

A

IAM roles are ideal for situations in which access to services or resources needs to be granted temporarily, instead of long-term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As best practice, what should be enabled for all root users and IAM users?

A

Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does AWS Organizations do?

A

You can use AWS Organizations to consolidate and manage multiple AWS accounts within a central location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Service Control Policies?

A

SCPs enable you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which identities and resources can SCPs be applied to?

A

In AWS Organizations, you can apply service control policies (SCPs) to the organization root, an individual member account, or an OU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AWS Artifact?

A

AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and select online agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS Artifact consists of two main sections: What are they?

A

AWS Artifact Agreements and AWS Artifact Reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What AWS service protects against Ddos attacks?

A

AWS Shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two levels of service for AWS Shield?

A

AWS Shield Standard automatically protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks.

AWS Shield Advanced is a paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks.

17
Q

What is Amazon Key Management Service?

A

AWS Key Management Service (AWS KMS) enables you to perform encryption operations through the use of cryptographic keys. A cryptographic key is a random string of digits used for locking (encrypting) and unlocking (decrypting) data. You can use AWS KMS to create, manage, and use cryptographic keys

18
Q

What 2 types of encryption does Amazon Key Management Service provide?

A

Data in storage (encryption at rest) and data in transit (encryption in transit)

19
Q

What is Amazon WAF?

A

AWS WAF is a web application firewall that lets you monitor network requests that come into your web applications.

20
Q

What is a Web Access Control List (ACL)?

A

When a request comes into AWS WAF, it checks against the list of rules that you have configured in the web ACL. If a request did not come from one of the blocked IP addresses, it allows access to the application.

21
Q

What is Amazon Inspector?

A

Amazon Inspector helps to improve the security and compliance of applications by running automated security assessments.

22
Q

What is Amazon Guard Duty?

A

Amazon GuardDuty is a service that provides intelligent threat detection for your AWS infrastructure and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment.