Security Flashcards
What is the Shared Responsibility Model?
AWS is responsible for the infrastructure of the cloud
The customer for everything on the cloud
IAM: What is the precedence of a policy item?
Per default everything is denied.
Only an explicit allow leads to an allow.
An explicit deny will always deny.
What is Amazon Inspector?
Automatically assesses applications for vulnerabilities or deviations from best practices.
Gives out a detailed list sorted by severity.
How are API calls secured?
API calls are signed by the AWS secret access key
How is EBS secured?
Access is restricted by the creating IAM account of IAM users with granted access.
EBS volumes are replicated in multiple locations but within the same AZ
Volumes and Snapshots can be encrypted (AES-256)
How does the Elastic LB handle requests?
For HTTPS requests the ELB generated short term session key between the server and the browser (using a long term session key)
Cloudfront: Can HTTPS be enforced?
Yes, HTTP requests will automatically be redirected
S3: What are the four options for data access?
IAM Policies
ACLs
Bucket Policies
Query String Authentification order
DynamoDB: How are requests secured?
The requester needs database and user permissions and every request needs to be signed using HMNAC-SHA-256.
The AWS SDK automatically uses it but HTTP Requests need to contain the signature in the header
RDS: How to secure the database?
Access Control Security Groups Network isolation Encryption Create automatic backups and patches Multi AZ Deployments
SNS: Who initially has access to a topic
Only the user who created the topic
EMR: How are EMR Security Groups created?
One group the the master nodes and one for the slaves
EMR: Can the data be encrypted?
Data needs to be encrypted at rest in S3 and EMR needs a decryption step at the beginning of the process
IAM: What is the default lifespan of a role?
12hrs
IAM: How is a call with a temp. role structured?
The call is signed with the secret key and includes the access key and the security token
What is AWS Cognito?
Simplifies the task of authenticating users, storing, managing credentials and sycning data across platforms and devices.
It uses OAuth or OpenID
What are Amazon Workspaces?
Managed desktop service.
Connects users with Active Directory credentials via PCoIP to AWS.
The Data is shown via videostream and not with actual transmissions
How many keys will each AWS Resource integrated with an AWS KMS (Key Management Service) receive by default?
1
Which of these is the scope of use for an AWS KMS key?
All AWS KMS keys are region-specific, they will only work with the AWS Resources of the same region. The AWS KMS key will only be accessible within the region it was created.
With AWS Trusted Advisor, how many core checks do all customers have access to?
All customers have access to 7 core checks with AWS Trusted Advisor. The 7 core checks are assessing S3 Bucket permissions, Security Group - specific ports unrestricted, IAM Use, MFA on the root account, EBS public snapshots, RDS public snapshots, and finally service limit checks.
Which of these is a required prerequisite to enabling MFA Delete on an S3 Bucket?
Versioning must be enabled to enable MFA Delete on an S3 Bucket. Only the root user may use MFA Delete.
Which of the following do WAF rules span?
The WAF rules span an AWS Region.
What AWS Service manages temporary credentials of IAM Roles?
STS
What is an envelope key and which service does use it?
It encrypts the encryption key - it is used in SSE-KMS
What is the parameter to enforce encryption of S3 PUT requests?
x-amz-server-side-encryption
SSE-S3: x-amz-server-side-encryption: AES256
SSE-KMS: x-amz-server-side-encryption: ams:kms
At what point in time can you encrypt data or buckets in S3?
At any time
Which (one) AWS service protects against DDoS attacks?
AWS Shield
Which services can be used to mitigate DDoS attacks?
CloudWatch Route53 CloudFront ELBs WAFs
What protection does WAF offer?
- Block IP addresses
- Block countries
- Block certain header information
- XSS protection in the request
Which services does (not) WAF integrate?
yes: ALB, CloudFront, API Gateway
no: Classic/Network LBs (it needs to be application aware)
What is AWS Artifact?
Repository for security and compliance documents
When does AWS allow SSL certs to be stored in IAM?
When the region is not supportes by the AWS Certification Manager