Security and Compliance Flashcards
What acts like built-in firewalls per instance for your virtual servers?
Security groups
Security groups act like built-in firewalls for your virtual servers — the rules you create define what is allowed to talk to your instances and how.
Although network access control lists can be used to block or deny traffic, these operate at the subnet level (covering all instances in the subnet with the same ruleset), not per instance as the question specifies. Route tables tell traffic where it should go next to reach its destination, and an Availability Zone is a collection of data centers — which isn’t relevant in this question.
Network access control lists
Network access control lists ensure the proper traffic is allowed in the subnet.
Like a cross walk light - only peeps allowed into street at right time
Microsoft has announced a new patch for its operating system. For a platform-as-a-service solution, who would be responsible for applying the patch?
AWS - The platform-as-a-service model removes the need for organizations to manage the underlying infrastructure (usually hardware and operating systems) and allows you to focus on the deployment and management of your applications.
The customer is responsible for patching the operating system for infrastructure-as-a-service solutions, but AWS is responsible for patching the operating system for platform-as-a-service solutions.
A huge department store sells products online and in-person. Most of their customers use credit cards instead of cash when making purchases. For security purposes, the credit card data must be encrypted at rest. Which services allow the department store to generate and store the encryption key used to secure the credit card numbers?
Key Management Service (KMS) - KMS allows you to generate and store encryption keys.
AND
CloudHSM - CloudHSM is a hardware security module (HSM) used to generate and store encryption keys.
Identity and Access Management (IAM)
IAM allows you to control access to your AWS services and resources.
A customer has created an Administrators group in IAM containing 5 users. What does the customer attach to the group to ensure all the users have the needed administrative access?
IAM policy
Policies can be attached to a group to ensure all users in the group have the same access. AWS even has a managed policy, Administrator Access, you can use.
IAM service role
An IAM service role is a role that an AWS service assumes to perform actions. Roles are not associated with a specific user or group.
Macie
Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS —> used to protect your data!
Macie uses machine learning to discover sensitive data stored on Amazon S3. Macie automatically detects a large and growing list of sensitive data types, including personally identifiable information (PII) such as names, addresses, and credit card numbers.
GuardDuty
While GuardDuty has built-in detection for Amazon S3, it only uncovers unauthorized behavior, not personally identifiable information (PII).
Bucket access policy
A bucket access policy can be attached directly to an S3 bucket to limit access to specific users.
Access keys
Access keys are long-term credentials for an IAM user.
Which of the following is an AWS Well-Architected Framework design principle related to operational excellence?
Deploy smaller, reversible changes.
This is a design principle related to operational excellence. Smaller changes can easily be reverted, if necessary.
Under the shared responsibility model, which task is AWS’ responsibility when managing AWS Lambda functions?
Managing the Lambda runtime environment — AWS is responsible for the Lambda runtime environment.
You are responsible for managing the versions of your application code
Well-Architected Framework - Performance Efficiency
This Performance Efficiency pillar focuses on the effective use of resources to meet demand. In this pillar, you would use the information gathered through the evaluation process to actively drive adoption of new services or resources. You would also define a process to improve workload performance, and you would need to stay up-to-date on new resources and services.
Well-Architected Framework - Operational Excellence
The Operational Excellence pillar focus on building applications that effectively support your workloads.
IAM credential report
The IAM credential report lists all the users and the status of their various credentials, including passwords, access keys, server certificates, and MFA devices.
AWS Artifact
Artifact offers on-demand access to AWS security and compliance reports.