Security Flashcards

1
Q

What model do we use for security in AWS?

A

The shared responsibility model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is specified in the shared responsibility model in AWS ?

A

What is the responsibilities for both the AWS side of things as well as the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shared Responsibility Model - Customer

A

Customer data
Platform, applications, Identity and Access Management (IAM)
Operating systems, and network and firewall configuration
Client-side data encryption, server-side data encryption, and networking traffic protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shared Responsibility Model - Amazon Web Services (AWS)

A

Software: Compute, storage, database, networking
Hardware: Regions, Availability Zones, Edge Locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software: Compute, storage, database, networking
Hardware: Regions, Availability Zones, Edge Locations
Is responsibility of ?

A

Amazon Web Services (AWS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Customer data
Platform, applications, Identity and Access Management (IAM)
Operating systems, and network and firewall configuration
Client-side data encryption, server-side data encryption, and networking traffic protection
Is responsibility of ?

A

Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tasks are the responsibilities of customers? (Select TWO.)

Maintaining network infrastructure
Patching software on Amazon EC2 instances
Implementing physical security controls at data centers
Setting permissions for Amazon S3 objects
Maintaining servers that run Amazon EC2 instances

A

Patching software on Amazon EC2 instances
Setting permissions for Amazon S3 objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When you create AWS account you are given ___ ?

A

AWS account root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you are given AWS account root user?

A

When you create AWS account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can control any resource in the account?

A

The AWS account root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can the AWS account root user control and access?

A

any resource in the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What MFA stands for?

A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best practice when you create AWS account?

A

To turn MFA on and not use the root user for everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you create in Amazon IAM ?

A

IAM users and later you can set up permissions for that user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the least privileged principle :

A

A user is granted access only to what they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How you give permissions to IAM users?

A

With IAM policy (json document)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe IAM groups

A

You can add IAM users to a group and then attach IAM policy to that group, by doing so the policy applies to every user in the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe AWS IAM roles

A

Associated permissions, allow or deny , assumed for temporary amounts of time, no username or password (but it is similar), access to temporary permissions, AWS resources/users/external identities/applications/other AWS resources

19
Q

AWS Identity and Access Management (IAM) abbreviation

A

AWS IAM

20
Q

What is AWS Organizations ?

A

A central location to manage multiple AWS accounts

21
Q

Charachteristics of AWS Organizations

A

Centralized management
Consolidated billing
Hierarchical groupings of accounts
AWS service and API actions access control

22
Q

In AWS Organizations, you can centrally control permissions for the accounts in your organization by using what service ? Also it enables you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.

A

service control policies (SCPs)

23
Q

What are service control policies (SCPs) used for?

A

In AWS Organizations, you can centrally control permissions for the accounts in your organization by using service control policies (SCPs).Also it enables you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.

24
Q

In AWS Organizations, you can group accounts into what to make it easier to manage accounts with similar business or security requirements?

A

organizational units (OUs)

25
Q

What does AWS Artifacts provide?

A

AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and select online agreements. AWS Artifact consists of two main sections: AWS Artifact Agreements and AWS Artifact Reports.

26
Q

a service that provides on-demand access to AWS security and compliance reports and select online agreements?

A

AWS Artifacts

27
Q

Which tasks can you complete in AWS Artifact? (Select TWO.)

Access AWS compliance reports on-demand.
Consolidate and manage multiple AWS accounts within a central location.
Create users to enable people and applications to interact with AWS services and resources.
Set permissions for accounts by configuring service control policies (SCPs).
Review, accept, and manage agreements with AWS.

A

Access AWS compliance reports on-demand.
Review, accept, and manage agreements with AWS.

28
Q

What is DDoS?

A

Distributed denial-of-serice

29
Q

What service protects applications against DDoS attacks. And also it provides two levels of protection: Standard and Advanced.

A

AWS Shield

30
Q

Describe AWS Shield

A

AWS Shield is a service that protects applications against DDoS attacks. AWS Shield provides two levels of protection: Standard and Advanced.

31
Q

Describe Encryption

A

Securing a message or data in a way that only authorized parties can access it

32
Q

AWS Key Management Service abbreviation ?

A

Amazon KSM

33
Q

What does Amazon KSM stand for?

A

Amazon Key Management Service

34
Q

Describe Amazon Inspector

A

Improves security and compliance of your AWS deployed apps by running an automated security assessment against your infrastructure. It checks for security best practices

It checks applications for security vulnerabilities and deviations from security best practices, such as open access to Amazon EC2 instances and installations of vulnerable software versions.

After Amazon Inspector has performed an assessment, it provides you with a list of security findings. The list prioritizes by severity level, including a detailed description of each security issue and a recommendation for how to fix it.

35
Q

What service consists of the following three parts :
Network configuration reachability piece
Amazon agent
Security assessment service

A

Amazon Inspector

36
Q

Amazon inspector is composed out of three parts, which are they?

A

Network configuration reachability piece
Amazon agent
Security assessment service

37
Q

Describe Amazon GuardDuty

A

It analyzes continuous streams of metadata generated from your account and network activity(found on AWS CloudTrail events, Amazon VPC Flow Logs and DNS logs)
It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment.
If GuardDuty detects any threats, you can review detailed findings about them from the AWS Management Console. Findings include recommended steps for remediation. You can also configure AWS Lambda functions to take remediation steps automatically in response to GuardDuty’s security findings.

38
Q

What AWS KMS used for?

A

You can use AWS KMS to create, manage, and use cryptographic keys.You can also control the use of keys across a wide range of services and in your applications.

39
Q

What is AWS WAF (web application firewall)

A

Web application firewall that lets you monitor network requests that come into your web applications. (It uses web access control list (ACL) to protect the AWS resources)

40
Q

Which statement best describes an IAM policy?

An authentication process that provides an extra layer of protection for your AWS account
A document that grants or denies permissions to AWS services and resources
An identity that you can assume to gain temporary access to permissions
The identity that is established when you first create an AWS account

A

A document that grants or denies permissions to AWS services and resources

41
Q

An employee requires temporary access to create several Amazon S3 buckets. Which option would be the best choice for this task?

AWS account root user
IAM group
IAM role
Service control policy (SCP)

A

IAM role

42
Q

Which statement best describes the principle of least privilege?

Adding an IAM user into at least one IAM group

Checking a packet’s permissions against an access control list

Granting only the permissions that are needed to perform specific tasks

Performing a denial of service attack that originates from at least one device

A

Granting only the permissions that are needed to perform specific tasks

43
Q

Which service helps protect your applications against distributed denial-of-service (DDoS) attacks?

Amazon GuardDuty
Amazon Inspector
AWS Artifact
AWS Shield

A

AWS Shield

44
Q

Which task can AWS Key Management Service (AWS KMS) perform?

Configure multi-factor authentication (MFA).
Update the AWS account root user password.
Create cryptographic keys.
Assign permissions to users and groups.

A

Create cryptographic keys.