Security Flashcards
What is the shared responsibility model?
Defines customer and AWS’s role of security in the cloud
Customer- Responsible for security IN the cloud
AWS- Responsible for security OF the cloud
What is the principle of least privilege?
The principle that states that you give users (or services) nothing more than those privileges required to perform their intended function (and only when they need them)
What are the 4 security facets of the cloud?
1) Identity
2) Authentication
3) Authorization
4) Trust
Define what the identity facet is? and provide an example…
Identify facet- Who are you?
e.g. Root account user, IAM user, temporary security credentials
Define what the authentication facet is? and provide an example…
Prove that you are who you say you are…
e.g. MFA or client-side SSL certificate
Define what the authorization facet is? and provide an example…
Are you allowed to do this?
e.g. IAM policies
Define what the trust facet is? and provide an example…
Do other entities that I trust say they trust you?
e.g. Cross account access, SAML-based federation and web identity federation
What are the 7 steps in a typical authentication flow (SAML)?
1) User-agent requests access from the service provider
2) The service provider tells the user-agent to request access from the identity provider
3) The user agent requests access from the identity provider
4) The identity provider says please authenticate e.g. password or SSL cert
5) User-agent provides password
6) The identity provider tells the service provider to let them in
7) The service provider tells the user agent it can access the service
What is SAML 2.0? and can it be used to authorise and authenticate?
SAML 2.0 is an XML based standard for exchanging authorization and authentication identities between security domains.
What is SAML 2.0 best suited for?
Single sign-on for enterprise users
What is OAuth 2.0? and can it be used to authorise and authenticate?
OAuth 2.0 is a JSON web token (JWT) based standard for exchanging authorization NOT AUTHENTICATION
It works by issuing a token to a client. The application then validates the token with authorization server. Supports delegate access.
What is OAuth 2.0 best suited for?
Best suited for API authorization between apps
What is OpenID connect? and can it be used to authorise and authenticate?
Identity layer built ontop of OAuth 2.0 adding AUTHENTICATION.
Uses REST/JSON message flows. Supports web clients, mobile clients and javascript clients
What is OpenID connect best suited for?
Single sign on for customers…. Think mobile apps!
name 5 tools used for account management…
1) AWS organisations
2) Service control policies- Sub-account restrictions
3) Tagging
4) Resource groups
5) Consolidated billing
Name and describe 5 different account structures…
1) Identity account structure
2) Logging account structure
3) Publishing account structure (common repo for AMI, containers, code)
4) IT security account (consolidated security and logging)
5) Central IT account structure (define and share services and standardise assets)
What is AWS organisations?
Policy-based management for multiple AWS Accounts. Accounts are split into organisational units. simplifies things!
e.g. HR, automotive, consumer products
What is consolidated billing?
A way to consolidate billing across multiple organisational units
What is consolidated security?
A way to consolidate security across multiple organisational units
What is a service control policy?
Service control policies (SCPs) are a type of organization policy that you can use to manage permissions in your organization.
What is a security group? and what is meant by a default security group?
A virtual firewall for individual assets (e.g. EC2, RDS, AWS workspaces…)
Default SG:
Allows all inbound traffic from other instances associated with the default security group. The security group specifies itself as a source security group in its inbound rules.
Allows all outbound traffic from the instance.
Does a security control inbound or outbound traffic or both? and which protocols are included?
Both!
TCP, UDP, ICMP or custom protocols
How are inbound rules defined?
By SOURCE IP, subnet or other security group
How are outbound rules defined?
By DESTINATION IP, subnet or other security group
Is a security group stateful or stateless? and what does this mean?
Security groups are stateful — if you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules. Responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.
What is a NACL?
Network Access Control List
An additional level of security got a VPC that acts as a firewall
What traffic does the default NACL allow?
All inbound and outbound traffic