Security and Compliance Flashcards

1
Q

What acts like built-in firewalls per instance for your virtual servers?

A

Security groups

Security groups act like built-in firewalls for your virtual servers — the rules you create define what is allowed to talk to your instances and how.

Although network access control lists can be used to block or deny traffic, these operate at the subnet level (covering all instances in the subnet with the same ruleset), not per instance as the question specifies. Route tables tell traffic where it should go next to reach its destination, and an Availability Zone is a collection of data centers — which isn’t relevant in this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network access control lists

A

Network access control lists ensure the proper traffic is allowed in the subnet.

Like a cross walk light - only peeps allowed into street at right time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft has announced a new patch for its operating system. For a platform-as-a-service solution, who would be responsible for applying the patch?

A

AWS - The platform-as-a-service model removes the need for organizations to manage the underlying infrastructure (usually hardware and operating systems) and allows you to focus on the deployment and management of your applications.

The customer is responsible for patching the operating system for infrastructure-as-a-service solutions, but AWS is responsible for patching the operating system for platform-as-a-service solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A huge department store sells products online and in-person. Most of their customers use credit cards instead of cash when making purchases. For security purposes, the credit card data must be encrypted at rest. Which services allow the department store to generate and store the encryption key used to secure the credit card numbers?

A

Key Management Service (KMS) - KMS allows you to generate and store encryption keys.
AND
CloudHSM - CloudHSM is a hardware security module (HSM) used to generate and store encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identity and Access Management (IAM)

A

IAM allows you to control access to your AWS services and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A customer has created an Administrators group in IAM containing 5 users. What does the customer attach to the group to ensure all the users have the needed administrative access?

A

IAM policy

Policies can be attached to a group to ensure all users in the group have the same access. AWS even has a managed policy, Administrator Access, you can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM service role

A

An IAM service role is a role that an AWS service assumes to perform actions. Roles are not associated with a specific user or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Macie

A

Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS —> used to protect your data!

Macie uses machine learning to discover sensitive data stored on Amazon S3. Macie automatically detects a large and growing list of sensitive data types, including personally identifiable information (PII) such as names, addresses, and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GuardDuty

A

While GuardDuty has built-in detection for Amazon S3, it only uncovers unauthorized behavior, not personally identifiable information (PII).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bucket access policy

A

A bucket access policy can be attached directly to an S3 bucket to limit access to specific users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access keys

A

Access keys are long-term credentials for an IAM user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an AWS Well-Architected Framework design principle related to operational excellence?

A

Deploy smaller, reversible changes.

This is a design principle related to operational excellence. Smaller changes can easily be reverted, if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Under the shared responsibility model, which task is AWS’ responsibility when managing AWS Lambda functions?

A

Managing the Lambda runtime environment — AWS is responsible for the Lambda runtime environment.

You are responsible for managing the versions of your application code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Well-Architected Framework - Performance Efficiency

A

This Performance Efficiency pillar focuses on the effective use of resources to meet demand. In this pillar, you would use the information gathered through the evaluation process to actively drive adoption of new services or resources. You would also define a process to improve workload performance, and you would need to stay up-to-date on new resources and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Well-Architected Framework - Operational Excellence

A

The Operational Excellence pillar focus on building applications that effectively support your workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAM credential report

A

The IAM credential report lists all the users and the status of their various credentials, including passwords, access keys, server certificates, and MFA devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AWS Artifact

A

Artifact offers on-demand access to AWS security and compliance reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Secrets Manager

A

Secrets Manager allows you to manage and retrieve secrets (passwords or keys).

19
Q

A customer is managing multiple AWS accounts using AWS Organizations. What can the customer use to restrict the same permissions across all AWS accounts managed under AWS Organizations using minimal effort?

A

Service control policies

AWS Organizations provides central governance and management for multiple accounts. Organization service control policies (SCPs) allow you to create permissions guardrails that apply to all accounts within a given organization.

There is no such thing as an IAM organization policy.

20
Q

Which of the following AWS services can help you assess the fault tolerance of your AWS environment?

A

AWS Trusted Advisor can help you assess the fault tolerance of your AWS environment. AWS Inspector can help you assess your security.

21
Q

A company is configuring IAM for its new AWS account. There are 5 departments with between 5 to 10 users in each department. How can they efficiently apply access permissions for each of these departments and simplify management of these users?

A

Create policies for each department that define the permissions needed. Create an IAM group for each department and attach the policy to each group. Add each department’s members to their respective IAM group.

By creating an IAM group, all like users can be managed all at one time. Once the permissions are defined within the policy, it can be attached to the IAM group, allowing them access to the resources/services stated within the policy.

Policies assign permissions, not IAM roles.

22
Q

Which service powers the creation of encrypted EBS volumes for Amazon EC2?

A

Key Management Service (KMS)

When you create an encrypted Amazon EBS volume, you’re able to specify a KMS customer master key.

23
Q

AWS Shield

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS.

24
Q

What does a developer need in order to log in to an EC2 instance via SSH from their local machine?

A

Public & private key and a SSH client
A key pair, consisting of a private key and a public key, is a set of security credentials you use to prove your identity when connecting to an instance. Amazon EC2 stores the public key.

An SSH client is a program that allows establishing a secure connection from your local laptop to an EC2 instance

NOT - Key Management System (KMS) generated key
KMS is used to generate keys for encrypting and decrypting data..

25
Q

How can a customer meet corporate, contractual, and regulatory compliance requirements for data security by using dedicated hardware in the cloud?

A

CloudHSM allows customers to meet compliance requirements for data security by using dedicated hardware

26
Q

You would like to give an application running on one of your EC2 instances access to an S3 bucket. What is the best way to implement this?

A

Assign the instance an IAM role

The recommended method to assign permissions to apps running in EC2 is to use IAM roles

27
Q

A new application needs temporary access to resources in AWS. How can this best be achieved?

A

Create an IAM role and have the application assume the role. – Roles define access permissions and are temporarily assumed by an IAM user or service.

NOT policy – A policy cannot be attached directly to an application. A policy can be attached to a role, and the application could assume the role

28
Q

Principal (in IAM)

A

A principal is a person or application that uses the AWS account root user, an IAM user, or an IAM role to sign in and make requests to AWS.

29
Q

Resource (in IAM)

A

Resources are the user, group, role, policy, and identity provider objects that are stored in IAM. As with other AWS services, you can add, edit, and remove resources from IAM.

30
Q

Entities (in IAM)

A

IAM entities are the users (IAM users and federated users) and roles that are created and used for authentication.

31
Q

Identities (in IAM)

A

Identities are the IAM resource objects that are used to identify and group. You can attach a policy to an IAM identity. These include users, groups, and roles.

32
Q

How does AWS Shield Standard help protect your environment?

A

By blocking DDOS attacks.

AWS Shield Standard is included at no extra cost, but will only block DDoS attacks on your AWS resources. It will not scan the contents of incoming or outgoing traffic (this is a function of WAF) and will not protect your environment from viruses.

33
Q

Network ACL

A

A network access control list (NACL) is an optional layer of security for your VPC that ensures the proper traffic is allowed into the subnet.

34
Q

Security group

A

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to 5 security groups to the instance.

Security groups act AT THE INSTANCE LEVEL, NOT THE SUBNET LEVEL

35
Q

AWS Shield Advanced

A

AWS Shield Advanced provides enhanced protections and 24/7 access to AWS experts for a fee.

36
Q

Access keys

A

Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK).

Access keys consist of two parts: an access key ID and a secret access key

37
Q

GuardDuty

A

GuardDuty is an intelligent threat detection system that uncovers unauthorized behavior. — think guard dog that protects against unwanted behaviors

38
Q

Which following statement is true of newly created security groups with their default rules?

A

ew security groups allow only outbound traffic and block all incoming traffic.

By default, new security groups start with only an outbound rule to allow all traffic to leave the instances. You must add rules to enable any inbound traffic.

39
Q

Resource groups

A

You can use resource groups to organize your AWS resources. Resource groups make it easier to manage and automate tasks on large numbers of resources at one time

40
Q

Tagging

A

Tagging assists with the organization of resources, but not directly managing those resources. Amazon Web Services allows customers to assign metadata to their AWS resources in the form of tags. Each tag is a simple label consisting of a customer-defined key and an optional value that can make it easier to manage, search for, and filter resources by purpose, owner, environment, or other criteria.

41
Q

Your organization is multi-national and uses multiple AWS Regions. Which AWS service can be used to route users to the nearest data center to reduce latency?

A

Route 53 is a DNS service that routes users to applications. Amazon Route 53 effectively connects user requests to infrastructure running in AWS (e.g., Amazon EC2 instances, Elastic Load Balancing load balancers, or Amazon S3 buckets) and can also be used to route users to infrastructure outside of AW

42
Q

Which of the following is TRUE when considering subnets in a VPC?

A

By default, all subnets within a VPC can communicate with each other, without needing any other resources or configuration.

43
Q

A small startup is configuring its AWS Cloud environment. Which AWS service will allow grouping these users together and applying permissions to them as a group?

A

IAM allows you to control access to your AWS services and resources.

Resource groups help you organize resources like EC2 instances, not users.

44
Q

AWS X-Ray

A

AWS X-Ray provides an end-to-end view of requests as they travel through your application, and shows a map of your application’s underlying components. You can use X-Ray to analyze from simple three-tier applications to complex microservices applications consisting of thousands of services.