Security Flashcards
attack that attempts to make your website or application unavailable to your end users
DDoS Attack
DDoS attack that is referred to as a SYN flood. Works on the transport layer (TCP)
Layer 4 DDoS Attack
Reflection attacks include things such as NTP, SSDP, DNS, CharGEN, and SNMP attacks
Amplification Attack
Occurs where a web server receives a flood of GET or POST requests usually from a botnet or large number of compromised computers
Layer 7 attack
Enable operational and risk auditing, governance, and compliance of your AWS account. visibility into your user and resource activity
CloudTrail
increases visibility into your user and resource activity by recording AWS actions and API calls
CloudTrail
Service that provides two levels of protection against DDoS attacks(Layer 3 and 4): Standard and Advanced
AWS Shield
Provides expanded DDoS attack protection for your Amazon EC2 instances, Elastic Load Balancing load balancers, Amazon CloudFront distributions, and Amazon Route 53 hosted zones
AWS Shield
Service that lets you monitor HTTP and HTTP requests that are forwarded to CloudFront or a Load Balancer
AWS WAF
Threat detection service that uses machine learning to continuously monitor for malicious behavior
Amazon GuardDuty
service automatically applies your WAF rules across your accounts and resources, even as you add new resources.
Firewall Manager
Service that uses machine learning and pattern watching to discover sensitive (PII, PHI, financial data) data stored in S3. Used for HIPAA and GDPR compliance
Macie
automatically assesses applications for vulnerabilities or deviations from best practices. Used to perform vulnerability scans on both EC2 instances and VPC
Amazon Inspector
Detailed list of security findings prioritized by level of severity in Inspector
Assessment Findings
Analysis to check for ports reachable from outside the VPC
Network Assessments
Is an inspector agent required for Network Assessments?
No
Vulnerable software (CVE) host hardening (CIS Benchmarks), and security best practices
Host Assessments
Is an inspector agent required for Host Assessments
Yes
managed service that makes it easy for you to create and control the encryption keys used to encrypt your data
Key Management Service
Provides you with centralized control of the lifecycle and permissions of your keys
KMS
Key that is a logical representation of a master key. Includes metadata such as the key id creation date, description, and key state.
Customer master key (CMK)
Is a physical computing device that safeguards and manages digital keys and performs encryption and decryption functions
Hardware security model (HSM)
Primary way to manage access to your AWS KMS CMK is with
Policies
policies attached to resources
resource-based policies
Easily general and use your own encryption keys on the AWS Cloud
CloudHSM
Dedicated HSM to you with full control of the underlying hardware
CloudHSM
Service that securely stores, encrypts, and rotates your database credentials and other secrets
Secrets Manager
Capability of AWS Systems manager that provides secure, hierarchical storage for configuration data management and secrets management
Parameter Store
Used if you need more than 10,000 parameters, key rotation, or the ability to generate passwords using CloudFormation
Secrets Manager
Web Address using an object owners own security credentials to grant time-limited permission to download objects from S3
Presigned URL
Provide access to multiple restricted files
Presigned Cookies
Service allows you to create manage and deploy public and private SSL certificates for use with other AWS services
Certificate Manager
Does Certificate manager allow you to not pay for SSL certificates?
Yes
Can Certificate manager automate the renewal of you SSL
Yes
Service that you can continually audit your AWS usage to make sure you stay compliant
Audit Manager
Automated service that produces reports specific to auditors for compliance
Audit Manager
Source to get compliance-related information that matters to you. Used to download compliance reports for audits
AWS Artifact
Provides authentication, authorization, and user management for your web and mobile apps in a single service
Cognito
two main components of Cognito are
User pools and identity pools
Directories of users that provide sign-up and sign-in options for your application users
User pools
Allows you to give you users access to other AWS services
Identity pools
Service to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activites
Detective
Pulls data from your AWS resources and used machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to quickly figure out the root cause of your security issues
Detective
Used to deploy physical firewall protection across your VPCS. (Physical firewall that is managed by AWS)
Network Firewall
Service that provides an intrusion prevention system (IPS)
Network Firewall
Service that filters your network traffic before it reaches your internet gateway
Network Firewall