Security and Compliance Flashcards
Which service has a feature to download a report including the status of passwords and MFA devices?
IAM
Where do you create access keys for accessing AWS via the CLI?
IAM
Where do you control access to mobile and web applications?
Cognito
What does Macie do?
Uses ML to discover and protects sensitive data in S3
What does Shield do?
It is a managed DDoS protection service, giving notifications of suspected attacks and assistance from AWS during the attack.
Pillar of the Well-Architected Framework that includes the use of information gathered through a workload process evaluation to drive adoption of new services or resources when they become available?
Performance Efficiency - the effective use of resources to meet demand.
What are the 6 pillars of the Well-Architected Framework?
Cost optimisation
Operational excellence
Reliability
Performance efficiency
Sustainability+Security
CORPS
Whose responsibility is it to manage the Lambda runtime environment?
AWS
Whose responsibility is it to manage the versions of Lambda function code?
Your’s
Which service automatically and continually scans an S3 bucket for mobile app users’ addresses?
Macie - uses ML to discover sensitive data stored on Amazon S3
Which is the most efficient AWS feature to allow a company to restrict IAM users from making changes to a common admin IAM role created in all accounts in their organisation?
Service control policies (SCPs).
A feature of Organizations that allows you to create permissions/guardrails that apply to all accounts in a given organization
What is the best way to give S3 access to all applications running on an EC2 instance?
Use an instance profile to pass an IAM role with S3 permissions to the EC2 instance.
Why would you not use a policy to give S3 access to all applications running on an EC2 instance?
Policies are used to manage permissions for IAM users, groups, and roles, not applications
How would you solve an issue of an employee not being able to perform any RDS actions on the Clients table?
Add the user to the group that has the necessary permission policy.
Create an identity-based policy.
Who is responsible for managing network traffic?
You. Includes security group firewall configuration.
Who is responsible for maintaining networking components?
AWS. Includes generators, uninterruptible power supply (UPS) systems, computer room air conditioning (CRAC) units, fire suppression systems, etc.
What is GuardDuty?
An intelligent threat detection system than uncovers unauthorised behaviour.
Which services can be used to prevent DDoS attacks?
AWS Shield Standard provides free protection against common and frequently occurring DDoS attacks.
Shield Advanced provides enhanced protections and 24/7 access to AWS experts for a fee, and is supported on Route 53, CloudFront, Elastic Load Balancing, AWS Global Accelerator.
Web Application Firewall (WAF) offers a “rate-based” rule that protects you from web-layer DDoS attacks, brute-force login attemps, and bots.