Security and Compliance Flashcards
AWS Command Line Interface (CLI)
allows you to access resources in your AWS account through a terminal or command window. Access keys are needed when using the CLI and can be generated using IAM
USER>SSH Client on laptop>EC2 Instance
Uses private key users public key
EC2 Groups Vs. IAM Groups
EC2 security groups act as firewalls
IAM groups are collections of users
Roles
Roles define access permissions and are temporarily assumed by an IAM user or service
- You assume a role to perform a task in a single session
- Access is assigned using policies
Roles help you avoid sharing long term credentials like access keys and protect your instances from unauthorized access
EC2 Instance> S3 Bucket Upload> S3
Policies
Manage permissions for IAM users, groups, and roles by creating a policy document in JSON format and attaching it.
User + POLICY + RDS
(JSON)
{ "Version"....", "Statement":[ { "Action":rds*, "Effect": "Allow", "Resource": [...] } ] }
IAM Credential Report
Lists all users in your account and the status of their various credentials
Lists all users and status of passwords, access keys and MFA devices
Used for auditing and compliance
Web Application Firewall (WAF)
Helps protect your web applications against common web attacks
- Protects apps against common attack patterns
- Protects against SQL injection
- Protects against cross-site scripting
Shield
Managed Distributed Denial of Service (DDoS) protection service
- Always-on detection
- Shield standard is free
- Shield Advanced is a paid service
Shield Standard Vs. Shield Advanced
Standard- Provides free protection against common and frequently occurring attacks
Advanced- Provides enhanced protections and 24/7 access to AWS experts for a fee
Shield Advanced is supported on several services
- CloudFront
- Route 53
- Elastic Load Balancing
- AWS Global Accelerator
Macie
Helps your discover and protect sensitive data
- Uses machine learning
- Evaluates S3 environment
- Uncovers personally identifiable information (PII)
config
Allows you to assess, audit, and evaluate the configurations of your resources
- Track configuration changes over time
- Delivers configuration history file to S3
- Notifications via Simple Notification Service (SNS) of every configuration change
GuardDuty
Is an intelligent threat detection system that uncovers unauthorized behavior
- Uses machine learning
- Built-in detection for EC2, S3, and IAM
- Reviews CloudTrail, VPC Flow Logs, and DNS logs
Inspector
Works with EC2 instances to uncover and report vulnerabilities
- Agent installed on EC2 Instance
- Reports vulnerabilities found
- Checks access from the internet, remote root login, vulnerable software versions, etc.
Artifact
Offers on-demand access to AWS security and compliance reports
- Central repository for compliance reports from third-party auditors
- Service Organization Controls (SOC) reports
- Payment Card Industry (PCI) reports
Cognito
Help you control access to mobile and web applications
- Provides authentication and authorization
- Help you mange users
- Assists with user sign-up and sign-in