Week 3 - Cloud Security Flashcards
What is AWS responsible for in the Shared Responsibility Model?
Security OF the cloud, AWS is responsible for maintaining the security of the infrastructure, including hardware, software, networking, and facilities that run AWS services.
What is the customer responsible for in the Shared Responsibility Model?
Security IN the cloud, Customers are responsible for securing their applications, data, access controls, and configurations within the AWS environment.
Who is responsible in the shared responsibility model in the following situations? AWS or the customer?
- Upgrades and patches to the operating system on the EC2 instace
- Physical Security of the data centre?
- Virtualization infrastructure?
- EC2 security group settings?
- The customer
- AWS
- AWS
- The customer
What is AWS Identity and Access Management (IAM), and what does it allow you to do?
AWS Identity and Access Management (IAM) is a feature of an AWS account that allows you to manage access to AWS resources at no additional charge. It enables you to specify:
- Which users can access which services (e.g., AWS EC2).
- The method of access (e.g., AWS Management Console).
- The level of actions allowed (e.g., full access or read-only).
What are the four essential components of AWS Identity and Access Management (IAM)?
The four essential components of AWS Identity and Access Management (IAM) are:
- AWS Users: Individual accounts representing people or applications.
- AWS Groups: Collections of users sharing permissions.
- AWS Roles: Assigned permissions for temporary access to AWS resources.
- AWS Policies: Documents defining permissions and access levels.
What is the AWS account root user, and what is its significance?
The AWS account root user is created when an AWS account is first set up. It has unrestricted access to all AWS resources and services in the account. Because of its high-level permissions, AWS recommends using the root user only for tasks that require it and securing it with multi-factor authentication (MFA).
What are the recommended steps to secure a new AWS account?
- Stop using the account root user as soon as possible and create IAM users and groups with specified access permissions.
- Enable multi-factor authentication (MFA) for all users.
- Use AWS CloudTrail to track and log user activity on your account.
- Enable a billing report, such as the AWS Cost and Usage Report.
What tools are available for securing an AWS account, and what are their purposes?
- AWS Organizations: Assigns Service Control Policies (similar to IAM policies) to a group of AWS accounts, helping manage permissions across multiple accounts.
- AWS Key Management Service (AWS KMS): Manages encryption keys to secure data.
- Amazon Cognito: Adds sign-up, sign-in, and access control to web or mobile applications.
- AWS Shield: Protects AWS services against Distributed Denial of Service (DDoS) attacks.
How can data be secured on AWS, and what technologies are used for encryption?
- Encryption of data at rest: Data stored in AWS can be encrypted using AWS Key Management Service (KMS) to manage encryption keys.
- Encryption of data in transit: Data transmitted over networks can be secured using Transport Layer Security (TLS) to ensure data privacy and integrity during transfer.
What AWS tools help ensure compliance, and what are their functions?
- AWS Config: A service that allows you to assess, audit, and evaluate the configurations of your AWS resources to ensure compliance with internal policies and regulations.
- AWS Artifact: Provides on-demand access to security and compliance documents from AWS, helping you manage your compliance requirements.