Security and Compliance Flashcards

Security and Compliance

1
Q

Patch Management - like for RDS its AWS responsibility but for EC2 software patch management is customer responsibility
Awareness and Training -like AWS gives this to their employees and you give it to your employees
Configuration Management

A

Shared Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The attacker uses BOT requests to the application server which is unable to service genuine user’s requests due to overload from BOT requests.

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Free and enabled for all customers against DDoS attack
Provides Layer 3 and 4 attacks and reflection attacks

A

AWS Shield Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Paid and 24/7 DDoS protection and support

A

AWS Shield Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Filter requests based on rules and placed on Layer 7 like Application Load Balancer, API Gateway and CloudFront.
Protection against web exploits
Define Web ACL - filter based on IP addresses, HTTP header, body and URI strings, geo matching, rate based rules
Protects against SQL Injection and Cross Site Scripting (XSS)

A

AWS WAF(Web Application Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provide protection at Edge location when used along with Shield Architecture
Route 53 is protected by shield and routes the requests to CloudFront. CloudFront is also protected by shield and it caches the content on edge location
Use AWS WAF at CloudFront to filter the requests based on rules
Use Load Balancer on public subnet to scale the load at network level
Then behind load balancer user EC2 instances with ASG

A

CloudFront and Route 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protect VPC overall from Layer 3 to 7.This operates at VPC level unlike Web ACL that operates at subnet level

A

AWS Network Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simulated DDoS attacks, Port, Protocol and Request Flooding is not allowed

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the AWS encryption service and keys are managed by AWS. What is it called?

A

KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS only provisions encryption hardware and encryption keys are managed by customer

A

CloudHSM(Hardware security module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Customer Master Keys
1. Customer managed CMK
2. AWS managed CMK
3. AWS owned CMK
4. Cloud HSM keys(found under custom key store)
For CloudTrail and Glacier S3 encryption is enabled by default

A

CMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service for SSL/TLS certificates

A

ACM(AWS Certificate Manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Store and Rotate passwords (Rotation using custom Lambda function)Integrated with Amazon RDSEncrypted using KMS

A

Secrets Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Portal that provides AWS compliance and AWS agreement documents

A

AWS Artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Detective Service
Detects anomalies in AWS account
Input is from CloudTrail logs, VPC flow logs, DNS logs, S3 logs, EBS logs, Lambda network activity, RDS and Aurora login logs, EKS audit logs and output can be sent to EventBridge to generate SNS or Lambda function

A

Amazon GuardDuty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Run automated security assessments only on running EC2 instances, Lambda functions and Container images
ECR Check for OS, S/w vulnerabilities and network reachability
EC2 Reports its findings into AWS Security Hub and Amazon Event Bridge

A

Amazon Inspector

17
Q

Helps auditing and recording compliance of the AWS resources
It records the configurations and their changes over time

A

AWS Config

18
Q

Fully managed data security and data privacy service uses ML
Alert agains PII

A

AWS Macie

19
Q

Dashboard to manage security across several AWS accounts and automate security checksAggregates alerts from Config, Guard Duty, Inspector, Macie, iAM Access Analyzer, Systems Manager, Firewall, Health, Partnet Network Solutions

A

AWS Security Hub

20
Q

To analyze the root cause of security issues using ML and graphs

A

Amazon Detective

21
Q

Report suspected AWS resources used for abuse or illegal purpose

A

AWS Abuse

22
Q

Change the account settings, such as the account name, the email address, the root user password and root user access keys
View certain tax invoices
Close your account
Restore IAM user permissions
Change or cancel your AWS Support plan
Register as a seller in the Reserved Instance Marketplace
To configure an Amazon S3 bucket to enable MFA
To edit or delete an S3 bucket policy that is getting an invalid VPC ID or VPC endpoint ID
To sign up for GovCloud as well.

A

Root User Priviledges

23
Q

Track API calls made by users within the account

A

CloudTrail

24
Q

To identify which resources are shared externally outside your zone of trust

A

iAM Access Analyzer