Security and Compliance Flashcards

1
Q

Customers shared responsibility

A

Responsibility for the security in the cloud
* Customer data
* platform
* Applications
* IAM
* OS, Network and firewall configs
* client side data encryption and data integrity configs
* server side encryption
* networking traffic protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS shared responsibility

A

Software
* compute
* storage
* database
* networking

Hardware/Global infrastruture
* regions
* availability zones
* edge locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the aws compliance programs

A
  • Certifications / attestations.
  • Laws, regulations, and privacy.
  • Alignments / frameworks.

it varies among AWS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS IAM

A

it helps you securely control access to AWS resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Trusted Advisor

A

its an assitant that helps one provision your resources following AWS best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Personal Health Dashboard

A

A personalized view of the health of AWS services, and alerts when your resources are impacted

  • it prompts the user with alerts and notifications on AWS scheduled activities, pending issues and planned charges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the AWS support plans

A
  • Basic
  • Developer
  • Business
  • Enterprise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Basic

A
  • email support only
  • for billing and acct
  • 7 trusted advisor checks
  • $0/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Developer

A
  • Tech support via email (reply ~ 24 hrs)
  • No third party support
  • General guidance <24hrs
  • System Impaired < 12hrs
  • 7 trusted advisor checks
  • $29/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business

A
  • Tech support via email (reply ~ 24 hrs)
  • Tech support via chat, phone, anytime 24/7
  • General guidance <24hrs
  • System Impaired < 12hrs
  • Production system impaired < 4hrs
  • Production system down < 1hrs
  • all trusted advisor checks
  • $100/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enterprise

A
  • Tech support via email (reply ~ 24 hrs)
  • Tech support via chat, phone, anytime 24/7
  • General guidance <24hrs
  • System Impaired < 12hrs
  • Production system impaired < 4hrs
  • Production system down < 1hrs
  • Business-critical down <15m
  • personal concierge
  • TAM (Technical Account Manager: someone that knows AWS in and out, he helps reduce the bill)
  • all trusted advisor checks
  • $15,000/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

security group

A

-it acts as a virtual firewall by controlling the traffic both inbound and outbound.

  • it acts tn the instance level
  • you can change a security group associated with an ec2 instance if the instance is in the running state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Amazon VPC

A

It enables you to launch AWS resources into a virtual network that you have already defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

subnet

A

A range of Ip addresses in your VPC

  • security groups and NACL are used to protect resources in a subnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Subnet

A

uses resources that can be connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private subnet

A

uses resources that wont be connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Route Table

A

A set of rules (called routes) that are used to determine where network traffic is directed.

18
Q

Internet Gateway

A

A gateway that you attach to your VPC to enable communication between resources in your VPC and the internet.

  • you can only have 1 gateway in your VPC
19
Q

Which resource does Amazon Inspector perform network accesibility checks on

A

Amazon EC2 instance`

20
Q

IAM role

A

it is an IAM identity that you can create in your account that has specific permisions.

  • similar to IAM users
21
Q

IAM user group

A

a collection of IAM users

22
Q

IAM User

A

it is an entity that u can create in AWS to represent the person or application that uses it to interact with AWS

  • they have access to Access keys
    – Acces key ID
    – secret access key
23
Q

IAM Policies

A

are used to manage access in AWS by attaching them to IAM identities (users, user groups, or roles) or AWS resources

24
Q

Amazon Macie

A

it is a managed security service which can be used to detect personally identifiable information (PII) such as names, password, credit card numbers from large amounts of data stored in Amazon s3 bucket.

  • it uses ml to protect sensitive data like passwords
25
Q

AWS Shield

A

It is used for defecting against DDOS attacks

26
Q

AWS shield advance

A

For higher level of protection against Attacks targets in your web applications running on Amazon EC2, elastic load balancing,, cloud front and Route 52 resources

you can subscribe to AWS shield advanced

27
Q

AWS CloudTrail

A

It is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account

28
Q

Network ACL

A

Network access control list is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.

  • it is a subnet level
29
Q

AWS Secrets Manager

A

it i sused to store and manage secrets used to access database or other resources in AWS

  • it is used to securely store and automatically rotate credentials for databases hosted on RDS
30
Q

AWS Systems manager Parameter Store

A

it is used to store config data and secrets securely in a plain or encrypted format

31
Q

Ama

A
32
Q

Amazon detective

A

Amazon Detective automatically collects log data from your AWS resources and uses machine learning (ML), statistical analysis, and graph theory to build a linked dataset that you can use to conduct more efficient security investigations.

  • it is passive protection
  • makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities
33
Q

Amazon Detective

A

is an automated security assessment service that helps you test the network accessibility of your Amazon EC2 instances and the security state of your applications running on the instances

34
Q

Amazon security Hub

A

is a service that gives you aggregated visibility into your security and compliance status across multiple AWS accounts

35
Q

AWS WAF

A

helps Protect your web applications from common exploits

  • it is launched with
    - Amazon cloud front
    - Application load balancer
    - Amazon API Gateway
    - AWS AppSync
36
Q

AWS Security

A

Used to download AWS security and compliance documents

37
Q

Security Groups

A

Security groups allow specific inbound and outbound traffic at the resource level (such as an EC2 instance)

  • it is resource/instance level
38
Q

AWS Firewall Manager

A

It makes it possible to manage VPC security groups, AWS Shield Advanced and WAF rules on one platform even across multiple AWS accts.

39
Q

AWS Security Hub

A

It is a full-view, single-look, comprehensive depiction of the security state of the customer’s AWS environment.

40
Q

AWS IAM Access Analyzer

A

AWS Identity and Access Management (IAM) is a web service that helps you securely control access to
AWS resource