Security and Compliance Flashcards
Managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS
AWS Shield
A web application firewall that helps protect your web applications or APIs against common web exploits and bots that may affect availability, compromise security, or consume excessive resources
AWS WAF
Service that lets you create, manage, and control cryptographic keys across your applications and more than 100 AWS services
Amazon Key Management Service (KMS)
Service that lets you manage and access your keys on FIPS-validated hardware, protected with customer-owned, single-tenant HSM instances that run in your own Virtual Private Cloud (VPC).
AWS CloudHSM
A service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources
AWS Certificate Manager
Central resource for compliance-related information
AWS Artifact
A threat detection service that continuously monitors your AWS accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation. Service checks VPC, DNS, and CloudTrail Logs
AWS GuardDuty
An automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure
AWS Inspector
A service that enables you to assess, audit, and evaluate the configurations of your AWS resources
AWS Config
Data security and data privacy service that uses machine learning (ML) and pattern matching to discover and protect sensitive data
Amazon Macie
Service that monitors and records account API activity across your AWS infrastructure, giving you control over storage, analysis, and remediation actions
AWS CloudTrail
Service that provides you with a comprehensive view of your security state in AWS and helps you check your environment against security industry standards and best practices
AWS Security Hub
Service that automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations
Amazon Detective
What are the behaviors considered AWS abuse?
Spam
Port Scanning
Denial-of-service (DoS) attacks
Intrusion attempts
Hosting prohibited content
Distributing malware
What are the actions exclusively permitted to the root user account?
Change account settings
Close AWS account
Change or cancel your AWS support plan
Register as a seller in the Reserved Instance Marketplace