Security and Compliance Flashcards

1
Q

Shared Responsibility Model

A

Security & Compliance responsibility is shared:

AWS - security of the cloud: cloud infrastructure, inc. hardware, software, networking and facilities.

Customer - security in the cloud: data, platforms, apps and software and its patching, and configurations (like rotating credentials, securing API calls, IAM, network traffic protection, firewall config).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shared Responsibility Model: EC2 example

A

AWS:
- EC2 Service
- patching the host ops system
- security of the physical server

Customer:
- installed apps
- patching guest ops system
- security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shared Responsibilities: Patching Infrastructure

A

AWS = patching host infrastructure
Customer = patching guest OS and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shared Responsibilities: Configuration Management

A

AWS = configurating infrastructure devices
Customer = configuring databases and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shared Responsibilities: Awareness and Training

A

AWS = AWS employees
Customer = their own employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security breach or abuse report

A

AWS Trust & Safety team using “Report Amazon AWS abuse”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Well-Architected Framework: 6 Pillars

A
  1. Operational Excellence
  2. Security
  3. Reliability
  4. Performance Efficiency
  5. Cost Optimisations
  6. Sustainability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WAF Pillar: Operational Excellence

A

Create apps that support your production workloads:
- plan for and anticipate failure
- deploy smaller, reversable changes
- script operations as code (terraform)
- learn from failure and refine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAF Pillar: Security

A

Mechanisms that protect your systems and data:
- automated security tasks
- encrypted data in transit and rest
- least privileges assigned
- tracking of who/what/when
- security at all applications layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WAF Pillar: Reliability

A

Design systems that work consistently and recover quickly:
- automatic failure recovery
- scale horizontally for resilience
- manage change through automation
- stop guessing capacity
- test recovery procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WAF Pillar: Performance Efficiency

A

Effective use of computing resources to meet requirements while removing bottlenecks:
- serverless architecture
- multi-region deployment
- delegate tasks to a cloud vendor
- use virtual resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAF Pillar: Cost Optimisation

A

Deliver optimum and resilient solution at the least cost:
- consumption-based pricing
- Cloud Financial Management
- measure efficiency
- pay only for what’s needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WAF Pillar: Sustainability

A

Environmental impact - energy consumption and efficiency:
- sustainable goals
- maximise utilisation
- managed services
- reduce downstream impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IAM

A

Identity and Access Management - allows you to control access to AWS services and resources.

who = Identities i.e. Root User, Individual User, Groups Roles (Apps can be users)
what = Access i.e. Policies (customer & AWS managed), Permissions Boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication vs Authorisation

A

Who vs What
Authentication = present identity and verify (username & password)
Authorisation = which services and resources the identity has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Principle of least privilege

A

Giving user the minimum access required to get the job done.

17
Q

IAM Group

A

A collection of IAM users that helps apply common access controls to all group members using policies and roles.

IAM group is a collection of users vs EC2 group acts as a firewall.

18
Q

Roles

A

Define access permissions and are temporarily assumed by an IAM users and services (e.g. Lambda-Execution Role can list contents of S3 bucket and query DynamoDB).

19
Q

Policies

A

Manage permissions for IAM users, groups, and roles by creating a policy document in JSON format and attaching it.

It can be customer managed or AWS managed (e.g. AmazonS3FullAccess).

20
Q

IAM Best Practice

A
  1. Enable MFA (multi-factor authentication) for privileged users.
  2. Implement strong password policies.
  3. Create individual users instead of using root.
  4. Use rules for Amazon EC2 instances instead of long-term credentials like access keys.
21
Q

IAM Credential Report

A

Lists all users in your account and the status of their various credentials.

22
Q

Firewall

A

Prevents unauthorised access to networks by inspecting incoming and outgoing traffic against defined security rules.

23
Q

WAF

A

Web Application Firewall - helps to protect web apps against common web attacks such as SQL injection or cross-site scripting.

24
Q

DDoS

A

DDoS (Distributed Denial of Service) attack causes a traffic jam on a website or web app to cause it to crash.

25
Q

Shield

A

Managed DDoS protection service, that is free and always on. You can pay for an advanced version, where you ger 24/7 AWS experts.

Supported on CloudFront, Route 53, Elastic Load Balancing, AWS Global Accelerator.

26
Q

Macie

A

Uses ML to evaluate S3 environment to discover and protect sensitive personal data like credit card number or passport number.

27
Q

Config

A

Tracks configuration changes and delivers config history file to S3 to help you assess, audit and evaluate all configs.

You can set up SNS notification for every config change.

28
Q

GuardDuty

A

Treat detection system that uses ML to uncover unauthorised behaviour. It can alert you or take predetermined automated actions.

It has a built-in detection for EC2, S3 and IAM; and actively reviews CloudTrail, VPC Flow Logs and DNS Logs.

29
Q

Inspector

A

Works with EC2, Lambda, container images in ECR and various CI/CD tools to uncover and report vulnerabilities by level of severity.

30
Q

Artifact

A

Central repository for on demand access to AWS security and compliance reports, inc. SOC and PCI reports.

31
Q

Cognito

A

Helps control access to mobile and web applications by providing authentication and authorisation (user management, sign-up and sign-in e.g. sign-in with a social media account).

32
Q

Data in Flight vs Data at Rest

A

In Flight (or in Transit) - moving from one location to another e.g. API querying a database.

At Rest - inactive data or stored for later use e.g. stored in S3.

33
Q

KMS

A

Key Management Service - allows to generate, store and control encryption keys. Managed by AWS.

34
Q

CloudHSM

A

Cloud Hardware Security Module - used to generate encryption keys. AWS does NOT have access to your keys.

35
Q
A