Security And Compliance Flashcards

1
Q

Client is responsible for the security in the cloud for:

A

Installed applications
Patching the guest operating system
Security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

according to the shared responsibility model, AWS is responsible for

A

EC2 service
Patching the host operating system
Security of the physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For the Lambda security model, the client is responsible for:

A

Security of code
Storage of sensitive data
IAM permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For the Lambda security model, AWS is responsible for:

A

Lambda service
Upgrading Lambda languages
Operating system
Underlying infrastructure
Software dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The 6 pillars of the Well Architected Framework

A

Operational excellence
Security
Reliability
Performance efficiency
Cost optimization
Sustainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Principle of least privilege 

A

Give a user the minimum access required to get the job done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a collection of IAM users that helps you apply common access controls to all group members:

A

A Group. Used to group users that perform a similar task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EC2 security groups act as ________, while IAM groups are a collection of ______.

A

Firewalls, users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ define access permission and are temporarily assumed by an IAM user or services.

A

Roles

Whenever a user assumes a role, they have access to the resource according to what is stated in the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ manage permissions for IAM groups, users, and roles by creating a _____ document in JSON format and attaching it.

A

Policies, policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM best practices

A

MFA for privileged users
Strong password policies
Create individual users instead of using the root for everything
Use roles for EC2 instances instead of long-term credentials like access keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM Credential Report

A

Lists all users in your account and the status of their credentials. Lists password status, access keys, MFA devices. Used for auditing and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ prevent unauthorized access to your networks by inspecting incoming and outgoing traffic against security rules you’ve defined.

A

Firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Web Application Firewall (WAF)

A

Helps protect your web apps against common web attacks, including:
SQL injection
Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ cause traffic jams on websites or web apps to cause them to get overwhelmed and crash.

A

Distributed Denial of Service ( DDoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a managed DDoS protection service

A

Shield.

There’s shield standard and advanced. Standard is free, and advanced supports several services.

17
Q

_____ uses ML to discover and protect sensitive data.

A

Macie.

Evaluates S3 environment

18
Q

Services supported by Shield

A

CloudFront
Elastic load balancer
Route 53
Global Accelerator

19
Q

____ allows you to assess, audit, and evaluate the configurations of your resources.

A

Config.

Tracks changes to various resources over time
Notifications via SNS of every config change

20
Q

An intelligent threat detection system that uncovers unauthorized or malicious activities in your AWS account.

A

GuardDuty

Uses ML to detect patterns
Built in detection for EC2, S3, IAM.
Detect unusual API calls in your account

21
Q

Works with EC2 instances to uncover and report vulnerabilities.

A

Inspector

An agent installed in EC2 instances. Works with EC2 only.

22
Q

Offers on demand access to security AND compliance reports.

A

Artifact

Central repository for reports from third party auditors.
Service Organization Control (SOC) reports.
Payment Card Industry (PCI) reports.

23
Q

Provides authentication and authorization to mobile and web applications, helps manage users, and controls access to mobile and web apps.

A

Cognito

24
Q

A(n) __________ “scrambles” data before sending it to someone. The person receiving the data will need a ___________ to unscramble the data and read it.

A

Encryption key, decryption key

25
Q

Allows you to generate and store encryption keys.

A

Key Management Service (KMS)

AWS manages the encryption keys.
Example: create encrypted EBS volumes

26
Q

CloudHSM

A

A hardware security module (HSM) used to generate encryption keys.

You manage your own keys, not AWS.
Dedicated hardware for security

27
Q

Allows you to manage and retrieve secrets.

A

Secrets Manager.

Encrypt secrets at rest.
Integrates with services.
Example: retrieve database credentials by calling the secrets manager API instead of hard coding it in plain text.