Security and Compliance Flashcards

1
Q

Briefly outline the responsibilities stated in the shared responsibility model.

A

AWS - ‘of’ the cloud
Customer - ‘in’ the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AWS WAF? What is an example of its potential actions?

A

Web Application Firewall.
Filters specific requests based on rules, e.g. disallow requests from specific countries or disallow requests that are too large from one user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 2 benefits of using AWS Firewall Manager?

A

Centralised place to access and edit.
All rules are applied to new resources as they are created for all accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a DDoS attack tend to work? What AWS service can be used to protect against DDoS attacks?

A

Overwhelming the targeted application servers and thus denying actual legitimate customers access.
AWS Shield and AWS Shield Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AWS Network Firewall?

A

A way to protect your entire VPC at once. Much better than lots of NACLs as it is at the entire VPC level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be managed in AWS Firewall Manager? (4 e.g.s)

A

VPC security groups, network firewall, WAF and Shield Advanced rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is penetration testing?

A

Attacking your own infrastructure to test your security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data at rest and data in transit?

A

Data at rest is that which is sitting in storage or archive.
Data in transit is when the data is being transferred, e.g. from EFS to S3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of penetration testing aren’t you allowed to do without prior approval from AWS?

A

Anything outside 8 services, types are performing DDoS or DoS, port flooding, protocol flooding, request flooding. (Basically attacks where you overload the network infrastructure tend not to be allowed because it could cause problems for AWS themselves).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Artifact?

A

A service that enables access to AWS compliance documentation and AWS agreements for download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does AWS Macie do?

A

Scans S3 buckets to check for sensitive data e.g. emails, names etc.
Can then connect to SNS to alert you to make sure it’s encrypted, for e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can you do in Certificate Manager? Why ACM is it useful for TLS certificates?

A

Lets you provision, manage and deploy SSL/TLS certificates.
Automatically renews TLS certificates.
Provides HTTPS encryption for websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the AWS Abuse team for?

A

Reporting AWS resources that are suspected to be used for abusive or illegal purposes (e.g. spam emailing, port scanning, DDoSing etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 types of KMS keys?

A
  • Customer Managed Key
  • AWS Managed Key
  • AWS Owned Key
  • Cloud HSM Keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 4 key tasks that can only be done by the root user?

A
  • Change account settings such as account name, email, password and root user keys
  • Close the AWS account
  • Change or cancel an AWS support plan
  • Register as a seller in the Reserved Instance Marketplace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between AWS KMS and CloudHSM?

A

With KMS, AWS manages the keys for us, with CloudHSM the customer manages the key themself.

11
Q

What is AWS GuardDuty?

A

A threat discovery service to protect your AWS account using data from CloudTrail, VPC Flow Logs, DNS Logs and others using ML.

11
Q

What is Config?

A

Kind of like version control for the configuration of your AWS services - can see the changes to configurations over time and who made them etc.

12
Q

What does Detective do?

A

Collects data from VPC Flow Logs, CloudTrail and GuardDuty to try and help you find the root cause of flagged security risks with visualisations.

13
Q

What does IAM Access Analyser do?

A

Analyses the accessibility of different resources and whether this is in line with your intentions.
If you have a ‘zone of trust’ that is only members of your organisation but then accidentally share an S3 bucket publicly, this is something that would be flagged by IAM Access Analyser.

14
Q

How is the pricing of Secrets Manager handled?

A

Per secret, per month

15
Q

What is one handy feature with Secrets Manager that will keep security continually high?

A

You can implement rules that force the rotation of secrets, e.g. update password every month

16
Q

What services does Inspector perform automated security assessments on?

A

EC2 instances, container images and Lambda functions