Security & Compliance Flashcards
1
Q
DDOS Protection on AWS
A
- Shield Standard (free)
- Sheild Advanced (paid)
- WAF
- Cloud front & Route 53
- Auto Scaling
2
Q
AWS Sheild
A
- Sheild Standard
- Free for every user
- Sheild Advanced
- Optional DDoS mitigation service (3k/month)
- Protect against more sophisticated attacks
- 24/7 access to DDoS response team (DRP)
- Protect against higher fees during spikes due to DDoS
3
Q
AWS WAF (Web Application Firewall)
A
- Protects web apps from common web exploits
- Lyaer 7 HTTP
- Deploy on Application Load Balancer, API Gateway, CloudFront
- Define Web ACL (Web Access Control List)
4
Q
Network Firewall
A
- Protect your entire VPC
- Layer 3 to Layer 7
- Any direction you can inspect
5
Q
Firewall Manager
A
- Manage security rules in all accounts of an AWS org
- Rules are applied to new resources as they are created (compliance) across all and future accounts in your organization
6
Q
Penetration Testing Approved
A
- EC2 instances
- NAT Gateways
- Elastic Load Balancer
- RDS
- CloudFront
- Aurora
- API Gateways
- AWS Lambda and Lambda Edge
- Amazon LightSail
- Amazon Elastic Beanstalks
7
Q
Penetration Testing Prohibited
A
- DNS zone walking via Route 53
- Dos, DDoS, Simulated DDoS
- Port flooding
- Protocol flooding
- Request flooding
8
Q
KMS (Key Management Service)
A
- Anytime you hear encryption for AWS service, most likely KMS
- AWS manages encryption keys
9
Q
CloudHSM (Hardware Security Module)
A
- AWS provision encryption hardware
- You manage keys
- Dedicated Hardware (HSM, Hardware Security Module)
- Device is tamper-resistant, FIPS 140-2 Level 3 compliance
10
Q
KMS Key types
A
- Customer Managed
- AWS Managed
- AWS Owned
- CloudHSM Keys (custom keystore
11
Q
Certificate Manager (ACM)
A
- Easily provision, manage, and deploy SSL/TLS Certificates
- Provide in-flight encryption for websites (HTTPS)
- Public and private TLS certs
- Publlic TLS certs free
- Automatic renewal
12
Q
Secrets Manager
A
- New service for storing secrets
- Can force rotation of secrets every x days
- Automate generate secrets (Lambda)
- Encrypted using KMS
- Mostly meant for RDS integration
pword manager
13
Q
AWS Artifact (Not really a service)
A
- Portal with on-demand access to AWS compliance documentation and AWS agreements
- Audit or compliance
- Artifact reports
- Artifact Agreements BAA or HIPPA
- Support internal audit or compliance
14
Q
Amazon GuardDuty
A
- Intelligent Threat discovery to protect your AWS Account
- Use machine learning algorithms, anomaly detection, 3rd party data
- One click to enable (30 day trial), no install
- Input data
CloudTrail Events
VPC Flow Logs
DNS Logs
Optional Features - Can set up EventBridge rules
- Good to protect against Crypto Currency attack
15
Q
Amazon Inspector
A
- Automated Security Assessments
- Reporting & integration with AWS Security Hub
- Send finding to Amazon Event Bridge
- Only for EC2 instances, Container Images, & Lambda functions
16
Q
AWS Config
A
- Auditing and recording compliance
- Record configs and changes overtime
- Can store config data into S3 (analyzed by Athena)
- Alerts through SNS
- Per region
- Can aggregate across regions and accounts
17
Q
Questions solved by AWS Config
A
- Unrestricted SSH access to my sec group?
- Buckets have public access?
- How has ALB config changed over time?
18
Q
Amazon Macie
A
- Full manage data sec and privacy service
- Uses machine learning and pattern matching to discover and protect sensitive data
- Identify and alert
19
Q
AWS Security Hub
A
- Central security tool
- Manage security across several AWS accounts
- Automate sec checks
- Integrated security dashboards
- Aggregates alerts in predefined or personal finding from various AWS services & partner tools
20
Q
Amazon Detective
A
Analyze, investigate, and quickly identify root cause of sec issues or suspicious activities
- Machine learning and graphs
- Automatically collect and process events from VPC Flow Logs, CloudTrail, GuardDuty, and create a unified view
21
Q
AWS Abuse
A
- Report suspected AWS resource used for abusive or illegal purposes
- Spam
- Port scanning
- DDoS
- Intrusion attempts
- Hosting objectionable or copyrighted content
- Distributing Malware
22
Q
Actions exclusive to Root User
A
- Change acct settings (name, email, root user pwd and access key)
- Close AWS account
- Change or cancel AWS Support plan
- Register as a seler in the Reserved Instance Marketplace
23
Q
IAM Access Analyzer
A
- Find out which resource are shared externally
- Define Zone of Trust (AWS Account or Org)
- Access outside zone of trusts is a finding