Security and Compliance Flashcards
What are AWS responsibilities in their shared responsibility model?
a. AWS global infrastructure
b. Building security
c. Networking components
d. Software
What are customer responsibilities in the AWS shared responsibility model?
a. Application data
b. Security configuration
c. Patching
d. Responsible for the guest operating system, which includes updates and security patches
e. Identity and access management
f. Network traffic
g. Installed software
Who do you contact to report abuse of AWS resources?
AWS Trust & Safety team
What are the 5 pillars of the AWS Well-Architected Framework?
- Operational excellence
- Security
- Reliability
4 . Performance efficiency - Cost optimization
What are permissions of a root user?
Can close your account, change email address, and modify your support plan
What is an IAM policy?
Manages permissions of IAM users, groups and roles by creating a policy document in JSON format
What is AWS WebApp Firewall (WAF)?
Helps protect your web apps against common web attacks such as cross-site scripting attacks and SQL injection
What is AWS Shield?
i. Managed DDoS protection service
ii. Always-on detection
iii. The standard version of Shield is free. Provides free protection against common and frequently occurring attacks
iv. Shield Advanced is a premium service: Advanced provides enhanced protections and 24/7 access to AWS experts for free. Integrated with other services such as AWS CloudFront, Route 53, and ELB
Which AWS services is supported by AWS Shield Advanced?
CloudFront, Route 53, Elastic Load Balancing, and AWS Global Accelerator
What is AWS Macie?
Helps you discover and protect sensitive data.
i. Uses machine learning
ii. Evaluates S3 environments
iii. Uncovers personally identifiable information
What is AWS Config?
Allows you to assess, audit, and evaluate the configurations of your resources.
a. Tracks config changes over time
b. Delivers config history file to S3
c. Notifications via SNS of every config change
What is AWS GuardDuty?
a. Is an intelligent threat detection system that uncovers unauthorized behavior
b. Uses machine learning
c. Built in detection for EC2, S3, and IAM
d. Reviews CloudTrail, VPC flow logs, and DNS logs
What is AWS Inspector?
a. Works with EC2 instances to uncover and report vulnerabilities. Only works with EC2 instances
b. Agent installed on EC2 instance
c. Reports vulnerabilities found
d. Checks access from the internet, remote root login, vulnerable and software version
What is AWS Artifact?
a. Offers on-demand access to AWS security and compliance reports
b. Central repository for compliance reports from third party auditors
c. SOC2 reports and PCI reports
d. Lets you review, accept, and manage agreements with AWS
What is AWS Keys Management Service (KMS)?
a. Allows you to generate, control, and store encryption keys
b. AWS manages encryption keys
c. Automatically enabled for certain services