Security Flashcards

1
Q

The _____ ______ ______ outlines your responsibilities vs. ____’s when it comes to security compliance

A
  1. Shared Responsibility Model, AWS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ___-_____ ______ describes design principles and best practices for running workloads in the cloud. It has __ pillars you can lean on when you are designing Cloud Ecosystems

A

Well-Architected Framework, 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The 6 Pillars of a Well-Architected Framework:

A
  1. Operational Excellence:
  2. Security:
  3. Reliability:
  4. Performance Efficiency
  5. Cost Optimization
  6. Sustainability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS is responsible for security __ the cloud.
You are responsible for security __ the cloud.

A

OF, IN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Global infrastructure elements include : _____, ___ ______, and ___s

A

Regions, Edge Locations, AZs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Software infrastructure includes: all ______ services like RDS, S3, ECS, Lambda, patching of the ____ OS (firmware updates, etc.), and data access ______.

A

managed, host, endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

YOU are responsible for ___ the services are implemented and managing your _______ _____

A

HOW, APPLICATION DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

you are responsible for the _____ OS, which includes updates and security patches

A

Guest,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are responsible for your application code and ______ _______. You should frequently scan for and patch vulnerabilities in your code.

A

Installed Software:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are responsible for ______ traffic protection, which includes security group ______ configuration.

A

network, firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Configuration Management:
    ____ configures infrastructure devices,
    ____ configure databases and applications
A

AWS, You

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ ______ (pilar) Focuses on creating applications that effectively support production workloads.

A
  1. Operational Excellence:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ Focuses on putting mechanisms in place that help protect your systems and data. Recommends using ______ , ______ and assigning only the _____ ______

A
  1. Security:, automation, encryption, least privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ Focuses on designing systems that work consistently and recover quickly

A
  1. Reliability:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ ______ (pilar) Focuses on the effective use of computing resources to meet system and business requirements. Use _______ architectures first - leverage AWS services whenever possible, they are optimized for the cloud

A
  1. Performance Efficiency, serverless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ ______ (pilar) Focuses on delivering optimum and resilient solutions at the least cost to the user
- utilize ______-_______ pricing (whenever possible)

A
  1. Cost Optimization, consumption-based
17
Q

_________ Focuses on environmental impacts, especially energy consumption and efficiency

A
  1. Sustainability
18
Q

Use Cases - the 6 Pillars in the Real World:
____________
- you can use CloudTrail to log all of the actions in your AWS account

A
  1. Security
    - you can use CloudTrail to log all of the actions in your AWS account
19
Q

Use Cases - the 6 Pillars in the Real World:
_________ _________
- you can use AWS ____ _____ for version control to enable tracking of code changes and to version-control ____________ templates, which define your infrastructure as code

A
  1. Operational Excellence, Code Commit, CloudFormation
20
Q

Use Cases - the 6 Pillars in the Real World:
___________
- you can use ____ for databases for reliability, and multi-AZ deployments for enhanced availability. If one AZ fails, a backup ____ instance that can absorb the database traffic

A
  1. Reliability, RDS, RDS
21
Q

Use Cases - the 6 Pillars in the Real World:
________ -________
- you can use AWS _______ to run code on demand (in response to events) with reduced administration

A
  1. Performance Efficiency, Lambda
22
Q

Use Cases - the 6 Pillars in the Real World:
______ __________
- you can use S3 _______-_______, which automatically moves your data between access tiers based on your usage patterns

A
  1. Cost Optimization, Intelligent-Tiering
23
Q

Use Cases - the 6 Pillars in the Real World:
____________
- you can use EC2 ____ ______ to ensure you are maximizing utilizaion (and scale in, when demand is low)

A
  1. Sustainability, Auto Scaling
24
Q

________ defines WHO can access your resources
- root user, individual users, groups, roles

A
  1. Identities
25
Q

________ defines WHAT resources they can access

A
  1. Access
26
Q

_____________
- is where you present your identity (username) and provide verification (password)

A
  1. Authentication
27
Q

___________
- determines which services and resources the authenticated identity has access to
- permissions are typically granted through a policy - code

A
  1. Authorization
28
Q

______
Are entities you create in IAM to represent the person or application needing to access your AWS resources

A

Users:

29
Q

________ ______
- you create them through IAM and are used for everyday tasks
- have no permissions by default, you need to assign them

A

Individual Users

30
Q

_________ can be users - create a user in IAM and generate access keys for an ______ running on-premises that needs access to your cloud resources

A
  • applications, application
31
Q

________
A collection of IAM users. User ______ enable you to specify permissions for all users within that _____.

A

Groups: Groups, group.

32
Q

You assign users to ______, and then assign the appropriate permissions to the _____.

A

groups, group

33
Q

______ lets you apply the same access controls to a large set of users
- if you want to remove the privileges for a user, you just need to remove them from the _____

A

Groups, group

34
Q

IAM groups are not the same and EC2 security groups - EC2 security groups act as ______ , while IAM groups are a ________ of _____

A

Firewall, collection, users

35
Q

_____ and ______ _______
Allows you to control access to your AWS services and resources, and provides a downloadable report that lists all the users in your account and their credential status.

A

Identity and Access Management

36
Q

____ define access permissions and are temporarily assumed by an IAM user or service. they are assigned to users or groups

A

Roles

37
Q

_____ are assumed by any user or service that needs it, and helps you avoid sharing long-term credentials like access keys and protect your instances from unauthorized access.

A

Roles

38
Q

you can grant users in one AWS account access to resources in another AWS account using _____

A

Roles