Security Flashcards

1
Q

What is Shared Responsibility model?

A

Customers – Security in the cloud

Controls the content, security of content and access to it

AWS – Security of the cloud

Controls all the physical and global infrastructure, including:

  1. Physical security of data centres
  2. Hardware and soft infrastructure
  3. Network infrastructure
  4. Virtualisation infrastructure
  5. AWS Regions, AZs and Edge Locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AWS Identity and Access Management? (IAM)

A

Manage access to AWS services and resources securely

Helps configure access based on your company’s specific operational and security need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is AWS Account Root User?

A

Owner of the account (e.g. owner of the coffee shop)

Should use MFA when logging in as root user

Root user shouldn’t be used for everyday tasks, instead create IAM user & assign permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are IAM Users?

A

Create individual IAM users for each person who needs to access AWS

Assign the necessary permissions as users have no permissions by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IAM Policy?

A

A document that allows or denies permissions to AWS services

Follows the security principle of least privilege when granting permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an IAM Group?

A

Assign permissions to a group and add multiple users to the group for convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an IAM Role?

A

An identity that you can assume to gain temporary access to permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an MFA?

A

Provides an extra layer of security for your AWS account by requiring multiple pieces of info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can AWS Organisations do?

A

Can centrally control permissions for the accounts in your org by using service control policies (SCPs) which restrict the AWS services & that users/roles in each account can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are AWS Artifacts?

A

Provides on-demand access to AWS security and compliance reports

Artifact Agreements – review, accept & manage agreements in AWS

Artifact Reports – access compliance reports on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Customer Compliance Centre?

A

Contains resources to help you learn more about AWS compliance

Here you can read customer compliance stories on how they solved compliance challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Denial of Service (DoS) Attacks?

A

A deliberate attempt to make a website or application unavailable to users

Attackers will often overload the capacity of an website/app, denying legitimate users

Distributed DoS (DDoS) is when the attack comes from multiple sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AWS Shield?

A

Protects applications against DDoS attacks.

Provides standard or advanced protection:

Shield Standard – Protects AWS customers at no cost from the most common DDoS attacks. Detects malicious traffic in real time and automatically mitigates it

Shield Advanced - Provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks. Integrates with CloudFront, Route 53, ELB and AWS WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the additional Security Services?

A

AWS Key Management Service (AWS KMS)

You must ensure app data is secure in storage (encryption at rest) & when transmitted (encryption in transit)

KMS enables you to perform encryption operations by using cryptographic keys

Can specify which IAM users and roles are able to manage keys

AWS WAF

Web app firewall that lets you monitor requests that come into your web apps

Works with CloudFront and an app load balancer

AWS WAF controls traffic by using a web access control list (ACL)

If you have blocked certain IP addresses in the ACL, AWS WAF denies entry

Amazon Inspector

Performs automated security assessment against your apps (basically a vulnerability scanner)

Checks deviations of security best practices, vulnerabilities, and weaknesses in EC2 instances

Amazon Guard Duty

Provides intelligent threat detection for your AWS infrastructure and resources

Continuously monitors network activity and account behaviour within your AWS environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly