Security Essentials Flashcards

1
Q

Q: What is the AWS Shared Responsibility Model?

A

A: AWS secures the cloud infrastructure (hardware, software, networking, and facilities), while customers secure their applications, data, and configurations within the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is AWS IAM?

A

A: IAM is a service for securely managing access to AWS resources by defining users, groups, roles, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What are IAM best practices?

A

A: Enable MFA, follow the principle of least privilege, rotate credentials regularly, and avoid using the root account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is MFA in AWS?

A

A: An additional layer of security that requires a second form of authentication (e.g., a hardware or virtual token) in addition to a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What is AWS Organizations?

A

A: A service to manage multiple AWS accounts centrally, including consolidated billing, SCPs, and account governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What are Service Control Policies (SCPs)?

A

A: Policies that restrict permissions across accounts in an AWS Organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is AWS Key Management Service (KMS)?

A

A: A managed service for creating and managing encryption keys to secure data across AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: How is encryption at rest achieved in AWS?

A

A: By using AWS KMS to encrypt data stored in services like S3, EBS, RDS, and DynamoDB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: How is encryption in transit implemented?

A

A: By using SSL/TLS to encrypt data moving between AWS services or between AWS and external clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What is AWS Certificate Manager?

A

A: A service for provisioning, managing, and deploying SSL/TLS certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What is Amazon GuardDuty?

A

A: A threat detection service that continuously monitors for malicious activity and unauthorized behavior in your AWS environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What is AWS Web Application Firewall (WAF)?

A

A: A security service to protect web applications from common web exploits such as SQL injection and cross-site scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is AWS Shield?

A

A: A managed DDoS protection service that safeguards applications running on AWS.
- Standard: Free, basic protection for all AWS customers.
- Advanced: Paid, enhanced protection with detailed insights and DDoS cost protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What are security groups in AWS?

A

A: Stateful virtual firewalls that control inbound and outbound traffic for AWS resources like EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: What are NACLs in AWS?

A

A: Stateless firewalls that operate at the subnet level to control traffic flow in and out of a VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is AWS Secrets Manager?

A

A: A service to securely store, manage, and rotate secrets such as database credentials, API keys, and passwords.

17
Q

Q: What is Amazon Inspector?

A

A: A service that automatically assesses AWS workloads for vulnerabilities and deviations from security best practices.

18
Q

Q: What are some VPC security features?

A

A: Security groups, NACLs, VPC Flow Logs, and private subnets.

19
Q

Q: What is AWS CloudTrail?

A

A: A service that records API calls, CLI commands, and other actions in AWS for auditing and compliance.

20
Q

Q: What are VPC Flow Logs?

A

A: Logs that capture IP traffic flow information to and from network interfaces in your VPC for monitoring and troubleshooting.

21
Q

Q: What is AWS Identity Center?

A

A: A service for managing SSO (Single Sign-On) access to AWS accounts and applications.

22
Q

Q: What is AWS Config?

A

A: A service that tracks resource configurations and compliance with security policies.

23
Q

Q: What is AWS Security Hub?

A

A: A centralized service that aggregates, monitors, and evaluates security findings across AWS services.

24
Q

Q: What security features does S3 offer?

A

A: Encryption (SSE-S3, SSE-KMS, SSE-C), bucket policies, block public access, and S3 Object Lock.

25
Q

Q: What is the principle of least privilege?

A

A: Granting only the permissions needed to perform a task and nothing more.

26
Q

Q: What is AWS Artifact?

A

A: A service for accessing compliance reports and agreements related to AWS security.

27
Q

Q: What are general security best practices in AWS?

A
  • Enable MFA for all users.
  • Regularly audit and monitor resources.
  • Encrypt sensitive data.
  • Use IAM roles instead of access keys.
  • Keep systems patched and updated.
28
Q

Q: How is incident response managed in AWS?

A

A: Using tools like AWS Config, CloudTrail, GuardDuty, and Security Hub to detect and remediate security incidents.

29
Q

Q: Is penetration testing allowed in AWS?

A

A: Yes, but only for approved AWS services and following AWS guidelines.

30
Q

Q: How does AWS help mitigate DDoS attacks?

A

A: With AWS Shield, CloudFront, Route 53, and elastic scaling to absorb traffic spikes.

31
Q

Q: Which services are used for logging and monitoring in AWS?

A

A: CloudWatch, CloudTrail, VPC Flow Logs, and GuardDuty.

32
Q

Q: How is EBS data secured?

A

A: Using encryption at rest via AWS KMS and encryption in transit via HTTPS or VPN.

33
Q

Q: How can security processes be automated in AWS?

A

A: Using services like AWS Config, Lambda for custom automation, and Systems Manager for patching.

34
Q

Q: What is the Security Pillar in the AWS Well-Architected Framework?

A

A: A set of best practices focusing on identity, detection, infrastructure protection, data protection, and incident response.

35
Q

Q: How does AWS support compliance?

A

A: By providing compliance certifications like ISO 27001, HIPAA, GDPR, SOC 1/2/3, and PCI DSS.