Security & Architecture Flashcards
What is IAM?
Identity Access Management
How many EC2 instances can an IAM role be attached to at a given time?
Many
How many IAM roles can be attached to an EC2 instance at one time?
One
How can you test if an IAM Policy works as expected?
Use the IAM Policy Simulator
Can IAM roles and resource based policies be delegated across partitions (i.e. US to China)?
No. IAM roles and resource based policies can only delegate within a single partition.
Can a trusted AWS account give a level of access that exceeds their own level of access?
No. Give access only to entities you trust, and give the minimum level of access necessary. Whenever the trusted entity is another AWS account, that account can in turn delegate access to any of its IAM users. The trusted AWS account can delegate access only to the extent that it has been granted access; it cannot delegate more access than the account itself has been granted.
What are the 5 pillars of the well-architected framework?
- Operational Excellence
- Security
- Reliability
- Performance Efficency
- Cost Optimization
What is Fault Tolerance?
Being able to support the failure of our components within your architecture
What is High Availability?
Keeping your entire solution running in the expected manner despite issues that may occur.
Name 3 of the main Compliance services the AWS offers to help meet Compliance.
AWS Config
- Provides conformance packs for standards
AWS Artifact
- Provides self-service access to reports
- Many of these require that you sign a non-disclouse agreement with AWS
Amazon GuardDuty
- Provides intelligent threat detection
Jane’s company is building an application to process credit cards directly, and not through a 3rd party service. Their bank needs a PCI DSS compliance report for AWS. Where would Jane go to get the information.
AWS Artifact
This service provides the actual report that the bank needs.
Tims company is considering a transistion to the cloud.
They store personal information securely in their system.
Tim’s CTS has asked what the company’s responsbility is for security. Wat would you tell Tims’s CTO?
Depends on services they decide to acquire but assuming they are not using fully managed, serverless service they will need to configure
- IAM groups/role
- Security Groups
- Routing Tables
- Ports VPCs/Subnets
Essentially - know the Shared Responsbility Model
What are policies in IAM?
- A JSON document that defines permissions for an AWS IAM identity (principal)
- Defines both the AWS service(s) that the identity can access and what actions can be taken on that service (authentication & authorization).
- Can either be customer managed (custom policy) or managed by AWS (managed policy).
What are some IAM Best Practices?
- Multi-Factor Authentication
- Least Privilege Access
If you want to generate a report that lists all your account’s users and the status of their various credentials, what report would you run?
IAM credentials Report (account level)
If you wanted to view the service permissions granted to a user and when those services were last accessed, what IAM security tool could you use?
IAM Access Advisor (user -level)
What is a proper definition of IAM Roles?
An IAM entity that defines a set of permissions for making AWS service requests, that will be used by AWS services.
What are the two IAM Security Tools?
IAM Access Advisor
IAM Credentials Report
You need your clients to log in with Twitter and directly interact with your DynamoDB tables. What AWS Service can you use to achieve this?
Cognito Identity Pools
You would like to provide a Facebook login before your users call your API hosted by API Gateway. You need seamlessly authentication integration. Which AWS Service will you use?
Cognito User Pools
You would like to store the users that have successfully logged in to Cognito in RDS. What should you do?
Write a post-authentication hook with Lambda
What are cognito user pools?
- User pools are for authentication (identity verification).
- With a user pool, your app users can sign in through the user pool or federated through a third-party identity provider.
What are Cognito Identity Pools?
- Identity pools are for authorization (access control) - what can a user do?
- You can use identity pools to create unique identities for users and give then access to other AWS services.
Describe use cases for Cognito User Pools
- Design sign-up and sign-in webpages for your app.
- Access and manage user data.
- Track user device, location, and IP address, and adapt to sign-in requests of different risk levels.
- Use a custom authentication flow for your app.
Describe use cases for Cognito Identity Pools
- Give your users access to AWS resources, such as an Amazon Simple Storage Service (Amazon S3) bucket or an Amazon DynamoDB table.
- Generate temporary AWS credentials for unauthenticated users.
You are managing a central AWS account in your company. You need a tool to analyze access control policies in resources such as S3 and determine if resources can be accessed pubicly or from other AWS accounts. What IAM Security Tool can you use to help achieve this?
Create an IAM Access Analyzer and review the findings.
What is IAM Access Analyzer?
A tool that can help identify resources that are shared with external entities.
Several teams share one AWS account, and there is a large number of IAM roles. You need a method to periodically check each IAM role and identify unused roles based on a time window that you define. What compliance tool can be used to help evaluate this?
Periodically trigger an AWS Config rule that invokes a lambda function. The lambda function checks the status of each IAM role.
NOTE: The IAM API provides you with information about when an IAM role was last accessed.
https://aws.amazon.com/blogs/security/continuously-monitor-unused-iam-roles-aws-config/
What is AWS Config?
- A service that enables you to assess, audit, and evaluate the configurations of your AWS resources.
- Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations.
- Helps to determine your overall compliance against the configurations specified in your internal guidelines.
- Periodically triggers your AWS Config rule and will record compliance status.
What is an AWS Config Rule?
- This resource represents your desired configuration settings for specific AWS resources or for an entire AWS account.
- This resource checks the compliance status of your AWS resources.
- You can provide the logic that determines compliance, which enables you to mark IAM roles in use as “compliant” and inactive roles as “non-compliant.”