Security Flashcards
What model do we use for security in AWS?
The shared responsibility model
What is specified in the shared responsibility model in AWS ?
What is the responsibilities for both the AWS side of things as well as the customer.
Shared Responsibility Model - Customer
Customer data
Platform, applications, Identity and Access Management (IAM)
Operating systems, and network and firewall configuration
Client-side data encryption, server-side data encryption, and networking traffic protection
Shared Responsibility Model - Amazon Web Services (AWS)
Software: Compute, storage, database, networking
Hardware: Regions, Availability Zones, Edge Locations
Software: Compute, storage, database, networking
Hardware: Regions, Availability Zones, Edge Locations
Is responsibility of ?
Amazon Web Services (AWS)
Customer data
Platform, applications, Identity and Access Management (IAM)
Operating systems, and network and firewall configuration
Client-side data encryption, server-side data encryption, and networking traffic protection
Is responsibility of ?
Customer
Which tasks are the responsibilities of customers? (Select TWO.)
Maintaining network infrastructure
Patching software on Amazon EC2 instances
Implementing physical security controls at data centers
Setting permissions for Amazon S3 objects
Maintaining servers that run Amazon EC2 instances
Patching software on Amazon EC2 instances
Setting permissions for Amazon S3 objects
When you create AWS account you are given ___ ?
AWS account root user
When you are given AWS account root user?
When you create AWS account
What can control any resource in the account?
The AWS account root user
What can the AWS account root user control and access?
any resource in the account
What MFA stands for?
Multi-factor authentication
What is the best practice when you create AWS account?
To turn MFA on and not use the root user for everything.
What can you create in Amazon IAM ?
IAM users and later you can set up permissions for that user.
Describe the least privileged principle :
A user is granted access only to what they need
How you give permissions to IAM users?
With IAM policy (json document)
Describe IAM groups
You can add IAM users to a group and then attach IAM policy to that group, by doing so the policy applies to every user in the group.