security Flashcards

1
Q

Which of the below are you responsible for when storing data in S3?

Making sure that enough space has been provisioned for your data

Backing up your data

Making sure there is enough physical storage available for your data

Making sure your data is not corrupted

Replicating your data to another Availability Zone if redundancy is needed

A

Backing up your data

EXPLANATION:
Under the Shared Responsibility Model for managed services, AWS takes responsibility for managing all the hardware (including access, patching and other maintenance). When it comes to S3, this includes all aspects of capacity management, therefore it is an AWS responsibility to make sure that they never run out of storage. Replication to another AZ is also AWS’s responsibility in an applicable storage tier - note that the question asks for AZ replication - not Regional Replication which would normally be the customer’s responsibility to configure. AWS is also responsible for managing data corruption and resolving it if corruption is detected - however if it cannot fix the corruption, or if data is lost, AWS bears no responsibility for the loss - therefore it is a customer’s responsibility to make sure there data is backup up as needed - either though versioning in S3, or through 3rd party tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the below statements are correct in relation to security responsibilities in AWS?

AWS is responsible for the security IN the cloud

As an AWS customer, you are responsible for the security OF the cloud

AWS is responsible for the security OF the cloud

As an AWS customer, you are responsible for the security IN the cloud

A

AWS is responsible for the security OF the cloud

As an AWS customer, you are responsible for the security IN the cloud

EXPLANATION:
AWS is responsible for the security OF the cloud - the security of components that run the cloud service. The customer is responsible for security IN the cloud – that is, the security of their AWS resources and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are components of the Security Pillar of the AWS Well-Architected Framework?

Technical Account Management
Detective Controls
Infrastructure protection
Customer Service
IAM
A

Detective Controls
Infrastructure protection
IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A consulting firm is conducting a Sarbanes-Oxley compliance audit of your IT operations. The auditor requests visibility to logs of event history across your AWS-based employee expense system infrastructure. Which AWS service will record and provide give you the information you need?

AWS Compliance Manager
AWS Systems Manager
AWS CloudWatch Logs
AWS CloudTrail

A

AWS CloudTrail

EXPLANATION:
AWS CloudTrail provides visibility to API call activity for AWS infrastructure and other services. AWS Cloudwatch Logs might be part of a centralized logging solution, but all API event information will come from CloudTrail. AWS Systems Manager can process EC2 logs only, and AWS Compliance Manager is not a service offered by AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following are components of the AWS Assurance Program?

Certifications/Attestations
Compliance with Laws and Regulations
Customer Testimonials
Following industry best practices
Partner Validations
A

Certifications/Attestations
Compliance with Laws and Regulations

EXPLANATION:
Certifications/Attestations and Compliance with Laws and Regulations are cornerstones of the of the AWS Assurance Program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the recommended way to give your applications running in EC2 permission to other AWS resources?

Create an IAM Role with appropriate permissions and assign it to the instance.
Create an IAM Group with appropriate permissions and assign it to the instance.
Create an Root Access Key and use it in the application.
Create an IAM User with appropriate permissions and assign it to the instance.

A

Create an IAM Role with appropriate permissions and assign it to the instance.

EXPLANATION:
You should use IAM Roles wherever possible to enable applications running on EC2 instances to access other AWS resources. This is the most secure method to do so. It is not possible to assign an IAM Group or User to an instance, and although using the Root Keys in you application would work this is HIGHLY insecure and should never be done, as the Root Keys have access to absolutely everything in your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following are components of the AWS Risk and Compliance Program?

Security Principles
Information Security
Control Environment
Identity and Access Management
Environment Automation
Risk Management
Physical Security
A

Information Security
Control Environment
Risk Management

EXPLANATION:
Control Environment, Risk Management and Information Security are all components of the AWS Risk and Compliance Program. Control Environment includes policies, processes and control activities that are in place to secure the delivery of AWS’ service offerings. AWS management has developed a strategic business plan which includes risk identification and the implementation of controls to mitigate or manage risks as part of the Risk Management component. AWS has implemented a formal information security program designed to protect the confidentiality, integrity, and availability of customers’ systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to use an AWS service to assess the security and compliance of your EC2 instances. Which of the following services should you use?

AWS Trusted Advisor
AWS WAF
AWS Shield
AWS Inspector

A

AWS Inspector

EXPLANATION:
AWS Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. AWS Trusted Advisor can give security recommendations about your AWS resources, but not within EC2 instances themselves. AWS Shield and WAF can protect EC2 instances, but don’t possess any capabilities to assess their security and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A purchasing department staff member is setup as an AWS user in the company’s procurement AWS account. At each month-end, the staff member needs access to an application running on EC2 in the company’s accounts payable AWS account to reconcile reports. Which of the following provides the most secure and operationally efficient way to give the staff member access to the accounts payable application?

Configure Active Directory integration so that you can federate the staff member’s access to the accounts payable AWS account
Create a user for the staff member in the accounts payable AWS account
Invoke an AWS Lambda function to run the application in the accounts payable AWS account
Have the user request temporary security credentials for the application by assuming a role

A

Have the user request temporary security credentials for the application by assuming a role

EXPLANATION:
The staff member should be given the ability to assume a role programmatically with the permissions necessary to run the accounts payable application. Setting up another AWS user for the staff member in the accounts payable account will require the presentation of hard credentials programmatically. Both federation and Lambda will require the use of a role as well, but with the added overhead of maintaining Active Directory or the Lambda function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the below are TRUE statements when it comes to data security in AWS?

AWS is responsible for the security of the hardware the data resides on
The customer is responsible for managing who can access the data
The customer is responsible for the security of the hardware the data resides on
AWS is responsible for the security of the software that manages the data
AWS is responsible for managing who can access the data
The customer is responsible for the security of the software that manages the data

A

AWS is responsible for the security of the hardware the data resides on
The customer is responsible for managing who can access the data
AWS is responsible for the security of the software that manages the data

EXPLANATION:
Under the Shared Responsibility Model, AWS takes responsibility for managing all the hardware (including access, patching and other maintenance) and software required to deliver the service - which includes security. The customer is responsible for who can access the data itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are components of the AWS Risk and Compliance Program?

Identity and Access Management
Control Environment
Physical Security
Environment Automation
Security Principles
Risk Management
Information Security
A

Control Environment
Risk Management
Information Security

EXPLANATION:
Control Environment, Risk Management and Information Security are all components of the AWS Risk and Compliance Program. Control Environment includes policies, processes and control activities that are in place to secure the delivery of AWS’ service offerings. AWS management has developed a strategic business plan which includes risk identification and the implementation of controls to mitigate or manage risks as part of the Risk Management component. AWS has implemented a formal information security program designed to protect the confidentiality, integrity, and availability of customers’ systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You would like to give an application running on one of your EC2 instances access to an S3 bucket - what is the best way to implement this?

Use an IAM user for the application
Assign the instance an IAM role
Make the bucket public
Give the application a set of Access Keys

A

Assign the instance an IAM role

EXPLANATION:
The recommended method to assign permissions to apps running in EC2 is to use IAM roles. Making the bucket public could work, but will also expose all the data to the internet and is not secure. The other methods are also less secure than using IAM roles and are not recommended in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are using your corporate directory to grant your users access to AWS services. What is this called?

Role-based Access
Federated Access
Multifactor Authentication Access
User Group Access

A

Federated Access

EXPLANATION:
Federated Access is when you use an external directory, such as your coroporate one, to grant users in that directory access to AWS resources. Role-based and User group are more used to definied which resources a user is able to access once they have access, not the method by which they gain that access. Multifactor Authentication Access is the concept of a user requiring 2 secrets to be able to access the resources - usually their password and a 1 time code provided by a device under their control (e.g. a mobile phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the below are TRUE statements when it comes to data security in AWS?

The customer is responsible for the security of the software that manages the data
AWS is responsible for the security of the hardware the data resides on
AWS is responsible for the security of the software that manages the data
The customer is responsible for the security of the hardware the data resides on
The customer is responsible for managing who can access the data
AWS is responsible for managing who can access the data

A

AWS is responsible for the security of the hardware the data resides on
AWS is responsible for the security of the software that manages the data
The customer is responsible for managing who can access the data

EXPLANATION:
Under the Shared Responsibility Model, AWS takes responsibility for managing all the hardware (including access, patching and other maintenance) and software required to deliver the service - which includes security. The customer is responsible for who can access the data itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly