Security and Compliance Flashcards

1
Q

How does a security group filter traffic

A

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. Security groups act at the instance level, not at the subnet level. Security groups are stateful — if you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules. A security group evaluates all rules before deciding whether to allow traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a NACL(Network Access Control List) work and at what level does it provide network security

A

A Network Access Control List (NACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets (i.e. it works at the subnet level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Aws GuardDuty protect your aws account

A

Aws GuardDuty protects your AWS account by monitoring malicious activity and detecting threats?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Aws Artifact

A

AWS Artifact is a self service portal for, central resource that apply to compliance-related information that matters to your organization. (It provides on-demand access to AWS’ security and compliance reports and select online agreements). (Reports available in AWS Artifact include our Service Organization Control (SOC) reports, Payment Card Industry (PCI) reports) and certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When it comes to the aws shared responsbility model what is AWS responsible for

A

AWS is responsible for “Security of the Cloud”. This includes protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services. Therefore, patching networking infrastructure is the responsibility of AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When it comes to the aws shared responsbility model what is the customer responsible for

A

The customer is responsible for security “in” the cloud. This covers things such as services and communications protection; Identity and Access Management; and patching guest OS and applications. Customers are responsible for managing their data including encryption options and using Identity and Access Management tools for implementing appropriate access control policies as per their organization requirements. Therefore, these three options fall under the responsibility of the customer according to the AWS shared responsibility model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Aws Waf provide security for your aws cloud network.

A

WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to an Amazon API Gateway API, Amazon CloudFront or an Application Load Balancer. AWS WAF also lets you control access to your content. AWS WAF has to be enabled by the customer and comes under the customer’s responsibility. it only works at the application layer (layer 7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Aws Shield standard

A

AWS Shield is a managed service that protects against Distributed Denial of Service (DDoS) attacks for applications running on AWS. AWS Shield Standard is enabled for all AWS customers at no additional cost. AWS Shield Standard automatically protects your web applications running on AWS against the most common, frequently occurring DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Aws Shield Advanced

A

For higher levels of protection against attacks, you can subscribe to AWS Shield Advanced. As an AWS Shield Advanced customer, you can contact a 24x7 DDoS response team (DRT) for assistance during a DDoS attack. Customers need to subscribe to Shield Advanced and need to pay for this service. It falls under customer responsibility per the AWS Shared Responsibility Model.

AWS Shield Advanced provides expanded DDoS attack protection for web applications running on the following resources: Amazon Elastic Compute Cloud, Elastic Load Balancing (ELB), Amazon CloudFront, Amazon Route 53, AWS Global Accelerator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aws Shield Advanced provides protection for which web applications running on which resources

A

AWS Shield Advanced provides expanded DDoS attack protection for web applications running on the following resources: Amazon Elastic Compute Cloud, Elastic Load Balancing (ELB), Amazon CloudFront, Amazon Route 53, AWS Global Accelerator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Amazon Inspector work

A

Summary answer: Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices.

Amazon Inspector is an automated, security assessment service that helps you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of information does the Aws Credentials report store.

A

You can generate and download a credential report that lists all users in your account and the status of their various credentials, including passwords, access keys, and MFA devices. You can use credential reports to assist in your auditing and compliance efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of IAM Role

A

An IAM Role is an IAM identity that you can create in your account that has specific permissions. An IAM role is similar to an IAM user in that it is an (AWS identity with permissions policies that determine what the identity can and cannot do in AWS.) When you assume a role, it provides you with temporary security credentials for your role session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Aws Key management service used for

A

AWS Key Management Service (KMS) makes it easy for you to create and manage cryptographic keys and control their use across a wide range of AWS services and in your applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Aws IAM user access keys work

A

AWS IAM user access keys - Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). Access keys consist of two parts: an access key ID and a secret access key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does IAM advisor tool work

A

Access advisor shows the service permissions granted to a user and when those services were last accessed.

17
Q

What are IAM Policies and how do they work

A

IAM policies define permissions for an action

18
Q

What is the IAM Credentials report

A

You can generate and download a credential report that lists all users in your account and the status of their various credentials, including passwords, access keys, and MFA devices

19
Q

What type of service does the aws personal health dashboard provide

A

AWS Personal Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that might affect you.

20
Q

Aws STS(Security Token Services) provides what type of credentials when it comes to access to your aws resources

A

AWS Security Token Service (AWS STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users).

21
Q

How does AWS Sign-on(SSO) work

A

WS Single Sign-On (SSO) makes it easy to centrally manage access to multiple AWS accounts and business applications and provide users with single sign-on access to all their assigned accounts and applications from one place.

22
Q

What type of service is IAM and what type of access does it provide aws users

A

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
IAM is a global service. Users created within IAM can access their accounts all around the world, and deploy resources in every region.

23
Q

What type of service does Amazon Detective provide

A

Amazon Detective can analyze trillions of events from multiple data sources such as Virtual Private Cloud (VPC) Flow Logs, AWS CloudTrail, and Amazon GuardDuty, and automatically creates a unified, interactive view of your resources, users, and the interactions between them over time.

24
Q

Which task require root user access

A

Change your account settings (account name, root user password, email address, and enable MFA)

  1. Change your AWS support plan
  2. Closing an AWS Account.