Security Advance Flashcards
What is Symmetric encryption
Encryption key is given to end user for decryption; same key is used for encryption and decryption
What is Asymmetric encryption
Public key is used for encryption and private key is used for decryption.data is encrypted using private key and it can only be decrypted using private key by end user.no private key is exchanged in this scenario
Which encryption is good for local file storage encryption
Symmetric encryption
Which encryption is used for file transfer
Asymmetric encryption
What is STS?
Security token service generate temporary credentials for assume role functionality
Which is used to control who can assume the role
Trust policy
Can external Identity like Facebook access aws STS?
Yes as long as it is allowed in Trust policy
If you role switch between AWS accounts does it use AWS STS?
Yes
Assume Role AWS STS?
Yes
Cross accounts access using role use AWS STS?
Yes
All identity federation access use AWS STS?
Yes
Do we get new temp credentials when we use AWS STS?
Yes
How to revoke temp credentials issued by AWS STS with out affecting other users?
Add AWS Revoke Older Session inline policy which will deny any sessions older than now
What is Steganography?
Hiding information in image
Does permission boundary affect identity permission?
Yes
Does permission boundary affect resource policy permission?
No
Does permission boundary allow any access?
No it define max permission and identity can have. It act like a wall
What will happen to permissions which are out side of permissions boundary?
Permission which are outside of permissions boundary will have no effect
What are the multiple ways we can provide cross account access to S3
Bucket Policy
Access control policy
Assume Role using AWS STS
If a user upload object in S3 using bucket Policy or access controller list does bucket owner have access to the s3 object?
No
If a user upload object in S3 using assume Role with AWS STS does bucket owner have access to the s3 object?
Yes
When we use Canonical user id?
When we use legacy permissions model
Can we create one access control list for all S3 object?
No we have to create separate ACL for every object; we can’t apply one ACL to multiple objects
Can we use bucket policy to provide access to individual objects?
No bucket policy provide access only to buckets
Can we use ACL to provide access to s3 objects and bucket level permissions?
Yes
Can SAML 2.0 directly access AWS console & CLI?
No it indirectly use on premise id to access AWS console & CLI