Security and Compliance Flashcards

1
Q

The Shared Responsibility Model

A

Shared Responsibility between you and AWS: AWS is responsible for securing the cloud, and you are responsible for securing the things you put into it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the shared responsibility model, AWS is responsible for:

A

Their global infrastructure, Building Security, Networking Components, and their Software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the shared responsibility model, YOU are responsible for:

A

Your application data, security configurations, patching, network traffic, and your application code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 Pillars of a Well-Architected Framework

A

Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operational Excellence

A

Effectively support production workloads. EX: Using CodeCommit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Performance Efficiency

A

effectively using cloud resources to meet requirements while removing bottlenecks. EX: Using Lambda to respond to events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cost Optimization

A

Delivering optimum solutions at the least cost EX: using S3 intelligent tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity and Access Management (IAM)

A

Controlling access to your AWS tools and resources. Define who has access to what, and what they can do with that access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM Users

A

entities created to represent the person OR SERVICE that needs access. They’re created under your account, so you will be billed for anything they do!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The principle of least priviledge

A

Only give users the bare minimum level of access required to do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM Groups

A

A collection of Users with common access controls. EX: Developers, Admins, or Analysts may need access to different things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM Roles

A

define access permissions, are temporarily assumed by a User. EX: They put on their developer hat.
Access is granted using policies, and roles are great for protecting against unauthorized access, and to avoid sharing access keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAM Policies

A

JSON documents that manage permissions for whatever it is attached to: Users, Groups, and Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Best Practices for IAM

A

Enable MFA for privileged users
Create individual users instead of using root
Implement strong PW policies
Use roles for EC2 instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM Credential Report

A

Generates a list of all Users in your account, and the status of their credentials. Used for auditing and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

Prevents unauthorized access to your network by inspecting traffic against security rules that you’ve defined

17
Q

Web-Application Firewall (WAF)

A

Used to protect against common attack patterns, such as SQL Injection and Cross-Site Scripting.

18
Q

DDoS

A

Distributed Denial of Service - an attack that attempts to crash a webapp by overloading the network traffic

19
Q

AWS Shield

A

DDoS protection service

20
Q

AWS Macie

A

Discover and protect sensitive data in S3, using Machine Learning

21
Q

AWS Config

A

Allows you to assess, audit, and evaluate the configurations of your resources. Records configuration changes and tracks them over time.

22
Q

AWS Guard Duty

A

ML based threat detection system for EC2, S3 and IAM. Reviews logs and identifies events that are associated with common attacks

23
Q

AWS Inspector

A

Uncover and report vulnerabilities in EC2. Installed on an instance to check access from the internet, remote root log ins, and vulnerable software versions

24
Q

AWS Artifact

A

On-demand access to AWs security and compliance reports. Includes audits from 3rd parties.

25
Q

Encryption

A

Encodes data so that it can’t be read by unauthorized users. Uses one key to encode, and another to decode.

26
Q

Data In Flight

A

Data that is moving from one location to another

27
Q

Data At Rest

A

Data that is stored, or inactive (not moving)

28
Q

AWS Key Management Services (KMS)

A

AWS managed services that generates and stores encryption keys. Auto-enabled for certain services, great for encrypting EBS volumes

29
Q

CloudHSM

A

“Hardware Security Module” used to generate encryption keys. NOT managed by AWS. Necessary to meet requirements for dedicated security hardware.

30
Q

Secrets Manager

A

Manage and retrieve secrets (pws or keys). Encrypts secrets at rest, and integrates with Redshift, RDS, and DocumentDB. Useful for retrieving credentials needed within application code.