Security & Compliance Flashcards
Compliance Frameworks
ISO PCI HIPAA FedRAMP NIST SAS70 SOC1 FISMA FIPS140-2
How to mitigate DDoS attacks?
Minimize the attack surface area - use ALB with WAFs Be ready to scale to absorb attacks - use auto scaling groups Safeguard exposed resources - Learn normal behaviour of your application
- It’s a free service that protects all AWS customers on Elastic Load Balancing, Amazon CloudFront and Route 53.
- It protects against SYN/UDP floods, reflection attacks, and other Layer 3 and Layer 4 attacks.
AWS Shield
- provides a always-on flow-based monitoring of network traffic and active application monitoring to provide near real-time notifications of DDoS attacks.
- DDoS Response Team 24x7 to manage and mitigate application layer DDoS attacks
- Protects your AWS bill against higher fees due to Elastic Load Balancing, CloudFront and Route 53 usage spikes during a DDoS attack.
- $3000 a month
AWS Shield Advanced
What services can you use to mitigate DDoS attacks?
- CloudFront
- ELBs
- Route53
- WAF
- Autoscaling
- CloudWatch
How can you get a report of all of the users in your account who uses MFA?
Get credential reports on the IAM console.
Which service is used to grant users limited and temporary access to AWS resources.
User can come from three sources:
- Federation (typically done with Active Directory)
- Federation with Mobile Apps
- Cross Account Access
Security Token Service
Joining a list of users in one domain (such as IAM) with a list of users in another domain (such as AD, Facebook, etc), what does this define?
- Federation
- Identity Broker
- Identity Store
- Identity?
Federation
A service that allows you to take an identity from point A and join it (federate it) to point B, what does this define?
Identity Broker
Services like AD, Facebook, Google, etc., what does this define?
- Federation
- Identity Broker
- Identity Store
- Identity?
Identity Store
A user of a service like Facebook, etc., what does this define?
- Federation
- Identity Broker
- Identity Store
- Identity?
Identity
How does STS work?
- Authenticate against third party first (AD, Facebook, Google)
- Then you authenticate against STS.
- STS will give you a token.
- When you try and access your AWS resource
- That resource will check that token against IAM
- If everything’s correct it will give you access to the platform.
4 Main services for Security & Logging
- AWS CloudTrail - API Calls
- AWS Config - Alerts any changes
- AWS CloudWatch
- VPC Flow Logs
How can you control access to Log Files?
3 ways
- IAM users, groups, roles and policies
- S3 bucket policies
- MFA
How can you obtain alerts on Log File Creation and Misconfiguration?
- Alerts when logs are created or fail:
- CloudTrail notifications
- AWS Config Rules
- Alerts are specific, but don’t divulge detail:
- CloudTrail SNS notifications only point to log file location
How can you manage changes to AWS Resources and Log files?
Log changes to system components:
- CloudTrail
- AWS Config Rules
Controls exist to prevent modifications to logs:
- IAM and S3 controls and policies
- CloudTrail log file validation → you can see if somebody modified log files
- CloudTrail log file encryption