Security & Compliance Flashcards

1
Q

In a shared responsibility Model AWS is responsible for

A

protecting and securing their infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a shared responsibility Model you are responsible for how the services are implemented and

A

managing your application’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are AWS responsibilities regarding EC2 instances (2)

A
  • Patching the host operating system
  • Security of the physical server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are AWS responsibilities regarding Lamda (2)

A
  • Operating system
  • Software dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With Lambda the Customer is responsible for (2)

A
  • Storage of sensitive data
  • IAM for permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With EC2 the Customer is responsible for (3)

A
  • Patching the guest operating system
  • Security controls
  • Installed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 5 pillars of the Well-Architected Framework describe design principles and best practices for running workloads in the cloud. They are;

C.O.R.P.S.

A
  • Cost OptimIzation
  • Operational Excellence
  • Reliability
  • Performance Efficiency
  • Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operational Excellence involves Creating applications that support production workloads 3 key takeaways are:

  • Script
  • Plan
  • Deploy
A
  • Script Operations as Code
  • Plan for failure
  • Deploy Smaller reversible changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance Efficiency involves the effective use of computing resources to meet

A

system and business needs while removing bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security focuses on putting mechanisms in place that protect your systems and data you can do this by (3)

  • Track
  • Encrypt
A
  • Encrypt Data in transit and at rest
  • Track who did what and when
  • Automate Security Tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reliability Design systems that work consistently and recover quickly (3)

  • Scale
  • Reduce
  • Test
A
  • Scale horizontally for resilience
  • Reduce Idle resources
  • Test Recovery Procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cost OptimIzation has three main takeaways (3)

  • Use consumption-based
  • Implement cloud
  • Measure
A

pricing
financial management
overall efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use Cases for Operational Excellence: You can use AWS CodeCommit for version control to enable

A

tracking of code changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use Cases for Performance Efficiency: You can use AWS Lambda to

A

run code with zero administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use Cases for Security: You can use CloudTrail to configure central logging of

A

all actions performed in your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use Cases for Reliability: You can use Multi-AZ deployments for enhanced availability and reliability of

A

RDS databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Use Cases for Cost OptimIzation: You can use S3 Intelligent-Tiering to automatically move your data

A

between access tiers based on your usage patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In AWS Users are entities you create in IAM to represent

A

the person or application needing access to your AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A group is a collection of IAM users that helps you apply common

A

access controls to all group members.

20
Q

In AWS Roles can be assumed by

A

any user or service that needs them.

21
Q

AWS Policies help you manage permissions for IAM users, groups, and roles by creating a policy document in

A

JSON format and attaching it.

22
Q

Real-world use cases for IAM: Using Roles help you avoid sharing long-term credentials

A

like access keys

23
Q

IAM credential report: Lists all users and status of passwords, access keys, and MFA device. This is best used for

A

auditing and compliance

24
Q

Do not confuse security groups for EC2 with IAM groups. EC2 security groups

A

act as firewalls, while IAM groups are collections of users.

25
Q

What can only the root user do? (3)

A
  • Modify your support plan
  • Modify email address
  • Close your account
26
Q

What changes can AWS Config help you identify within EC2?

A

Network

Software

OS/system-level updates, and more.

27
Q

GuardDuty identifies malicious or unauthorized activities in your AWS account using

A

machine learning

28
Q

GuardDuty identifies threats by continuously monitoring _________ activity and ________ within your AWS environment.

A

network, account behavior

29
Q

Inspector has built-in rules to access your EC2 instances to find

A

vulnerabilities and report by the level of severity.

30
Q

Artifact is a central repository for

A

compliance reports from third-party auditors who have audited AWS

31
Q

Artifact Use Case? (2)

A
  • Service Organization Controls (SOC) reports
  • Payment Card Industry (PCI) reports
32
Q

Cognito controls access to mobile and web applications by assisting with user ______________ & ____________

A

Sign-up and sign-in

Provides authentication and authorization

33
Q

Cognito- Use Case: allows your users to sign in to your application through

A

social media accounts like Facebook and Google

34
Q

Key Management Service (3)

A
  • Generate, Store, and Control Keys
35
Q
  • Enable MFA for privileged users.
  • Implement strong password policies.

Are examples of which Service best practices?

A

IAM best practices

36
Q

Cloud HSM allows you to meet corporate, and regulatory compliance requirements for data security by using

A

dedicated hardware for security in the cloud.

37
Q

CloudHSM is a Hardware Security Module (HSM) used to

A

Generate and manage your own encryption keys

38
Q

When using CloudHSM AWS does not have access

A

to your encryption keys

39
Q

Secrets Manager Allows you to manage and retrieve

A

secrets (passwords or keys).

40
Q

Secrets Manager integrates with which three services?

A

RDS
Redshift
DocumentDB

41
Q

Amazon Inspector helps to improve the security and compliance of applications by

A

running automated security assessments.

42
Q

Amazon Inspector is a service that checks applications for

A

security vulnerabilities and deviations from security best practices.

43
Q

From within AWS Artifact you can review,

A

accept, and manage agreements with AWS.

44
Q

With AWS Roles you can assume a role to perform a task in a single session and access is assigned

A

using policies.

45
Q
  • Create individual users instead of using root.
  • Use roles for Amazon EC2 instances.
A

IAM Best Practices

46
Q

Using Roles helps you protect your instances from

A

unauthorized access.

47
Q

GuardDuty works by looking for threats on your account that are associated with

A

common techniques used by attackers.