Udemy Flashcards
Which IAM approach aligns with AWS best practices and principle of least privilege?
IAM roles with permissions and assigned to IAM entity (user).
What is the function of AWS App Mesh?
Application Level Networking (Service to Service Communication); End-to-End Visibility
Which AWS Storage solution is POSIX (iSCSI) compatible?
AWS Storage Gateway Volume Gateway
Does EFS support POSIX
No
What is Fault Injection Service used for?
Experiments to improve application performance, observability and resilience. Helps determine recovery actions from failure scenarios.
What is a role in IAM
A short term credential that grants authority (or denial) of activities.
What is a policy?
Set of authorizations that can be assigned to a user or orle.
What are the four types of policies?
AWS Managed, Customer Managed, Inline, and Resource Based
What is the function of Access Advisor?
To see what is granted and when it was last accessed
What is the function of Access Analyzer?
To check resources that are shared with an external entity (e.g. Cross Account Policy Conditions)
What’s a key differential between IAM Role & Resource Based Policy in regard to cross-account access (re: permissions)?
If you assume a role, you give up your original permissions and take the permissions of the role. If you use a resource policy, the original principal doesn’t give up permissions.
What are the two IAM areas that permission boundaries apply to?
Users and Roles
What is a permission boundary?
Defines maximum permission an IAM entity can get
What are two use cases for IAM Permission boundary?
Delegate responsibilities to non admins, allow developers to grant rights to themselves
How does IAM Access Analyzer help decide if access is appropriate?
By defining a zone of trust and anything outside of that would be a finding/issue.
What function inside IAM Access Analyzer can help write a policy and how does it make that suggestion?
IAM Access Analyzer Policy Generation which is built on activity based on CloudTrail
What is STS and what is it’s function?
Security Token Service. Allows to get credentials/role for a period of time.
What benefit does STS provide in terms of security?
You have to explicitly grant permissions to assume the role you want and the user has to actively switch. Can lockdown assuming role only if MFA is configured, etc.
How would STS help/work in a Dev/Prod environment?
Devs would have an account in the DEV account but then be able to assume a role in the production account that provides less privleges; STS would return these temporary credentials.
How can IAM access analyzer help govern your zone of trust?
Shows which resources are exposed and when they were last accessed.
What is the “Confused Deputy” and how can you avoid it?
It’s essentially a man in the middle attach facilitated by the external account using the same role name; you can avoid it by using External ID secret.
What is the aws:PrincipalTag in regard to IAM?
You can pass a tag with an API call to get a certain set of rights based on that tag via STS (e.g. Department=HR)
Give five important APIS for STS (this is pure memorization)
AssumeRole
AssumeRolewithSAML
AssumeRoleWithWebIdentity [identity provider]
GetSessionToken (MFA/Root)
GetFederationToken (obtain temporary creds for federated user)
What are six ways to do identity federation in AWS (pure memorization)?
SAML 2.0 [ADFS]
Custom Identity Broker
Web Identity Federation (w/o Cognito)
Web Identity Federation (w/ Cognito)
Web Identity Federation (IAM Policy)
SSO
How does AD and AWS Directory Services interact?
They are both basically AD but one is onprem and one is at AWS (think of it as AWS Managed AD)