Security And Compliance Flashcards
Client is responsible for the security in the cloud for:
Installed applications
Patching the guest operating system
Security controls
according to the shared responsibility model, AWS is responsible for
EC2 service
Patching the host operating system
Security of the physical server
For the Lambda security model, the client is responsible for:
Security of code
Storage of sensitive data
IAM permissions
For the Lambda security model, AWS is responsible for:
Lambda service
Upgrading Lambda languages
Operating system
Underlying infrastructure
Software dependencies
The 6 pillars of the Well Architected Framework
Operational excellence
Security
Reliability
Performance efficiency
Cost optimization
Sustainability
Principle of least privilege 
Give a user the minimum access required to get the job done
What is a collection of IAM users that helps you apply common access controls to all group members:
A Group. Used to group users that perform a similar task.
EC2 security groups act as ________, while IAM groups are a collection of ______.
Firewalls, users
_____ define access permission and are temporarily assumed by an IAM user or services.
Roles
Whenever a user assumes a role, they have access to the resource according to what is stated in the policy.
______ manage permissions for IAM groups, users, and roles by creating a _____ document in JSON format and attaching it.
Policies, policy
IAM best practices
MFA for privileged users
Strong password policies
Create individual users instead of using the root for everything
Use roles for EC2 instances instead of long-term credentials like access keys
IAM Credential Report
Lists all users in your account and the status of their credentials. Lists password status, access keys, MFA devices. Used for auditing and compliance.
______ prevent unauthorized access to your networks by inspecting incoming and outgoing traffic against security rules you’ve defined.
Firewalls.
Web Application Firewall (WAF)
Helps protect your web apps against common web attacks, including:
SQL injection
Cross-site scripting
_____ cause traffic jams on websites or web apps to cause them to get overwhelmed and crash.
Distributed Denial of Service ( DDoS) attacks