Security & Compliance Flashcards
What principle should be applied to AWS users, application users, and other clouds and data centers connected to AWS?
The principle of least privilege.
What is the shared responsibility model in AWS?
The customer is responsible for security in the cloud, while AWS is responsible for security of the cloud.
What are the core tenets of security in the Well-Architected Framework?
Identity and access management, data stewardship and encryption, network security, application security compliance, and security management.
Who is responsible for access management in AWS?
The customer is responsible for access management in their AWS cloud.
What are customers responsible for in terms of operating systems and networking within their AWS account?
Customers are responsible for ensuring secure connections to VPC resources, keeping EC2 instances’ operating systems and security patches up to date, and provisioning firewalls to secure their network.
What is the principle of least privilege?
It is the practice of giving the minimum permissions necessary to complete a task.
How can customers offload some security responsibilities using managed services?
For instance, customers are responsible for security OS patches and encryption on EC2, but on RDS, these are built-in features.
Who is responsible for encryption on AWS?
The customer is responsible for client-side encryption, encryption in transit, and encryption at rest.
What can IAM policies be applied to?
IAM policies can be applied to users, user groups, and IAM roles, which can then be applied to resources or applications.
What is encryption in transit and what AWS service helps with it?
Encryption in transit revolves around HTTPS, and AWS Certificate Manager helps with obtaining TLS certificates.
What is IAM Identity Center used for?
IAM Identity Center is used to give users access to AWS resources by leveraging existing single sign-on directories.
How is S3 encrypted by default?
S3 is encrypted by default using SSE S3 managed keys.
What is Macie used for in AWS?
Macie is used to scan S3 buckets for sensitive information.
How are EBS volumes and RDS instances encrypted?
They are encrypted by KMS (Key Management Service).
What must you do to encrypt an existing RDS instance?
You must create a copy of the existing RDS instance to enable encryption.
- Then you restore the snapshot, modify connections, load balancers.
- Test if the RDS is working as supposed to.