Security and Compliance Flashcards

1
Q

What is the default level of access a newly created IAM User is granted?

A

By default new IAM Users have no permissions to AWS services. They must be explicitly granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an object in AWS stored as a JSON document that provides a formal statement of one or more permissions.

A

A policy is an object in AWS that, when associated with an identity or resource, defines their permissions. Most policies are stored in AWS as JSON documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do Access Key ID and Secret Access Keys allow?

A

A Key and Secret Key combination are used to access AWS programmatically. To access the console you use an account and password combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Power User Access allows ____.

A

Access to all AWS services except the management of groups and users within IAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you allow cross-account console and programmatic access to an S3 bucket by users in a different account?

A

Setting up a cross account IAM role is currently the only method that will allow IAM users to access cross account S3 buckets both programmatically and via the AWS console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IAM allow?

A

IAM allows you to manage users, groups, roles, and their corresponding level of access to the AWS Platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What level of access does the “root” account have?

A

The root account in an AWS account represents the Owner of the account and can do anything including changing billing details and even close the account. The details for this account should be locked away and only used when absolutely necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is IAM?

A

IAM (Identity Access Management) allows you to manage users and their level of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does IAM use to manage users and their roles?

A

IMA uses groups to which users can be assigned.

The users will then inherit the permissions of the group.The permissions themselves are defined by policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To what in AWS can you access using access keys and secret access keys?

A

Access keys and secret access keys are used to access AWS via the command line or via API, but not via the console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a credential report provide?

A

A credential report provides a download of all users in your account.It gives details such as the last use of passwords, when they need changing, whether it has an access key on the account, whether MFA has been enabled etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does IAM provide access?

A

IAM uses Groups to which people can be assigned to give access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are IAM groups defined?

A

IAM groups are defined using policies which are created using JSON notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IAM used for?

A

Identity Access Management (IAM) is used for assigning roles and permissions to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Within IAM in what are users stored and what is used to set permissions?

A

Groups are used to store users and the users assume the permissions of that group. Group access is determined by JSON notation policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a credential report?

A

A credential report is used as a download of all users in your account. It gives details such as the last use of passwords, when they need changing, whether it has an access key on the account, whether MFA has been enabled etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does IAM use to manage access?

A

IAM uses Groups (to which users can be assigned), and Roles to manage access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A customer has created an Administrators group in IAM containing 5 users. What does the customer attach to the group to ensure all the users have the needed administrative access?

A

IAM policies can be attached to a group to ensure all users in the group have the same access. AWS even has a managed policy, Administrator Access, you can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does WAF do?

A

WAF protects against SQL injection and cross-site scripting attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is WAF?

A

WAF is Web Application Firewall that allows the monitoring of the http and https requests that are forwarded to CloudFront, an Application Load Balancer or API Gateway.

21
Q

What are the 3 different behaviours allowed by WAF?

A

The 3 different behaviours are:-

  • Allow all requests except the ones you specify
  • Block all requests except the ones you specify
  • Count the requests that match the properties you specify
22
Q

What are some of the conditions of web requests that WAF can use to take action?

A

WAF can check:

  • IP addresses that requests originate from
  • The country the request originates from
  • Values in request headers
  • Length of requests
  • Presence of SQL code
23
Q

What is Shield?

A

Shield is a managed Distributed Denial of Service (DDOS) protection service

24
Q

What with services does Shield work?

A

Shield provides DDoS protection and works with:

  • CloudFront
  • Route 53
  • Elastic Load Balancer
  • AWS Global Accelerator.
25
Q

What is Macie used for?

A

Macie is used to find Personally Identifiable Information stored in S3 using Machine Learning and AI.

26
Q

What is Macie?

A

Macie is a security service that uses Machine Learning and NLP (Natural Language Processing) to discover, classify and protect sensitive data stored in S3.It provides dashboards, reports and alerts and can also analyse and query Cloudtrail logs.

27
Q

What is AWS Config?

A

AWS Config is a service that enables you to assess, audit and evaluate the configurations of your AWS resources.

Config allows you to identify changes to various resources over time

28
Q

What is GuardDuty?

A

Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorised behaviour to protect your AWS accounts and workloads.

29
Q

What is Inspector?

A

Inspector works with EC2 instances (only) to uncover and report vulnerabilities

30
Q

What is Artifact?

A

Artefact offers on-demand access to AWS security and compliance reports.

Artifact provides a central repository for AWS’ security and compliance reports via a self-service portal.

31
Q

What is AWS Cognito?

A

Cognito provides authentication, authorisation and user management for web and mobile apps. It allows users to sign-in either directly or through a 3rd party such as Facebook, Amazon, Google or Apple.

32
Q

What are the two main components of AWS Cognito?

A

User pools and Identity pools are the main components of AWS Cognito

33
Q

What is KMS?

A

Key Management Service (KMS) allows you to generate and store encryption keys

34
Q

What is CloudHSM?

A

CloudHSM is a hardware security module (HSM) used to generate and manage encryption keys.

CloudHSM allows you to meet corporate, contractual, and regulatory compliance requirements for data security by using dedicated hardware in the cloud.

35
Q

What is Secrets Manager?

A

Secrets Manager allows you to manage and retrieve secrets (passwords or keys)

It integrates with services such as RDS, Redshift and DocumentDB and encrypts secrets at rest

36
Q

What does data encryption do?

A

Data encryption encodes data so it cannot be read by unauthorized users.

37
Q

How would you create and manage access keys for users that need to access AWS services from the AWS Command Line Interface (CLI)?

A

IAM allows you to create and manage access keys for an IAM user.

38
Q

Does KMS or CloudHSM allow you to manage your own encryption keys?

A

Cloud HSM allows you to manage your own encryption keys that AWS cannot access.

39
Q

What is Secrets Manager and what does it do?

A

Secrets Manager allows you to manage and retrieve secrets (passwords or keys).

It allows you to encrypt secrets at rest, rotate and manage them throughout the lifecycle.

40
Q

What allows you to identify changes to various resources over time?

A

Config allows you to identify changes to various resources over time.

41
Q

With what does Inspector work?

A

Inspector works with EC2 only.

42
Q

What controls access to mobile and web applications?

A

Cognito controls access to mobile and web applications.

43
Q

What identifies malicious or unauthorised activities in your AWS account?

A

GuardDuty allows you to identify malicious and unauthorised activities.

44
Q

Which policy will provide information on performing penetration testing on your EC2 instances?

A

Customer Service Policy for Penetration Testing

AWS customers are welcome to carry out security assessments or penetration tests against their AWS infrastructure without prior approval for Amazon EC2 instances, NAT gateways, elastic load balancers, and 7 other services.

45
Q

A purchasing department staff member is set up as an AWS user in the company’s Procurement AWS account. At each month-end, the staff member needs access to an application running on EC2 in the company’s Accounts Payable AWS account to reconcile reports.

What is the best way to provide secure and operationally efficient access to the Accounts Payable application?

A

Have the user request temporary security credentials for the application by assuming a role

The staff member should be given the ability to assume a role programmatically with the permissions necessary to run the Accounts Payable application.

46
Q

A customer has set up an Amazon S3 bucket and wants to limit access to specific users. What is the most efficient way to do so?

A

Bucket access policy

You can add a bucket access policy directly to an Amazon S3 bucket to grant IAM users access permissions for the bucket and the objects in it.

47
Q

You would like to give an application running on one of your EC2 instances access to an S3 bucket. What is the best way to implement this?

A

Assign the instance an IAM role

The recommended method to assign permissions to apps running in EC2 is to use IAM roles

48
Q

DELETE - Identity v.s. Entity v.s. Principal

A

An entity can authenticate to become a principal in AWS IAM. A principal can have one or more identities (but only ever one at a time). An identity can have identity policies associated with it.