Security and Compliance Flashcards
The Shared Responsibility Model
Shared Responsibility between you and AWS: AWS is responsible for securing the cloud, and you are responsible for securing the things you put into it.
In the shared responsibility model, AWS is responsible for:
Their global infrastructure, Building Security, Networking Components, and their Software.
In the shared responsibility model, YOU are responsible for:
Your application data, security configurations, patching, network traffic, and your application code.
5 Pillars of a Well-Architected Framework
Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization
Operational Excellence
Effectively support production workloads. EX: Using CodeCommit
Performance Efficiency
effectively using cloud resources to meet requirements while removing bottlenecks. EX: Using Lambda to respond to events
Cost Optimization
Delivering optimum solutions at the least cost EX: using S3 intelligent tiering
Identity and Access Management (IAM)
Controlling access to your AWS tools and resources. Define who has access to what, and what they can do with that access.
IAM Users
entities created to represent the person OR SERVICE that needs access. They’re created under your account, so you will be billed for anything they do!
The principle of least priviledge
Only give users the bare minimum level of access required to do their job.
IAM Groups
A collection of Users with common access controls. EX: Developers, Admins, or Analysts may need access to different things
IAM Roles
define access permissions, are temporarily assumed by a User. EX: They put on their developer hat.
Access is granted using policies, and roles are great for protecting against unauthorized access, and to avoid sharing access keys
IAM Policies
JSON documents that manage permissions for whatever it is attached to: Users, Groups, and Roles
Best Practices for IAM
Enable MFA for privileged users
Create individual users instead of using root
Implement strong PW policies
Use roles for EC2 instances
IAM Credential Report
Generates a list of all Users in your account, and the status of their credentials. Used for auditing and compliance.