Security, Identity, and Compliance Flashcards
Lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Authenticate users through social identity providers such as Facebook, Twitter, or Amazon and save data locally on users’ devices, allowing your applications to work even when the devices are offline
Amazon Cognito
Enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
Amazon Cloud Directory
Makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. Automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigation
Amazon Detective
USE CASE: Can analyze trillions of events from multiple data sources such as Virtual Private Cloud (VPC) Flow Logs, AWS CloudTrail, and Amazon GuardDuty, and automatically creates a unified, interactive view of your resources, users, and the interactions between them over time
Threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads
Amazon GuardDuty
USE CASE: It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers. It identifies suspected attackers through integrated threat intelligence feeds and uses machine learning to detect anomalies in account and workload activity.
An automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Automatically assesses applications for exposure, vulnerabilities, and deviations from best practices
Amazon Inspector
Security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS.
Amazon Macie
USE CASE: Recognizes sensitive data such as personally identifiable information (PII) or intellectual property, and provides you with dashboards and alerts that give visibility into how this data is being accessed or moved.
Central resource for compliance-related information that matters to you. It provides on-demand access to AWS’ security and compliance reports and select online agreements.
AWS Artifact
Helps you continuously audit your AWS usage to simplify how you assess risk and compliance with regulations and industry standards
AWS Audit Manager
USE CASE: automates evidence collection to reduce the “all hands on deck” manual effort that often happens for audits and enable you to scale your audit capability in the cloud as your business grows. With Audit Manager, it is easy to assess if your policies, procedures, and activities – also known as controls – are operating effectively.
Service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources.
AWS Certificate Manager
Cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud
AWS CloudHSM
Microsoft Active Directory, enables your directory-aware workloads and AWS resources to use managed Active Directory in the AWS Cloud
AWS Directory Service
A security management service that makes it easier to centrally configure and manage AWS WAF rules across your accounts and applications.
AWS Firewall Manager
USE CASE: you can easily roll out AWS WAF rules for your Application Load Balancers and Amazon CloudFront
IAM allows you to do the following:
- Manage IAM users and their access
- Manage IAM roles and their permissions
- Manage federated users and their permissions
Makes it easy for you to create and manage keys and control the use of encryption across a wide range of AWS services and in your applications.
AWS Key Management Service
Managed service that makes it easy to deploy essential network protections for all of your Amazon Virtual Private Clouds (VPCs)
AWS Network Firewall
USE CASE: lets you define firewall rules that give you fine-grained control over network traffic, such as blocking outbound Server Message Block
(SMB) requests to prevent the spread of malicious activity. You can also import rules