IAM | Networking | Security Flashcards

1
Q

What are subnets used to control? 3

A

Subnets are used to control network traffic, isolate resources, and define the scope of network communication within your VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a NAT Gateway?

A

allows private subnets within your VPC to access the internet while preventing inbound traffic from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how a NAT (Network Address Translation) Gateway works?

A

Translates private IP addresses of resources in your VPC to public IP addresses, allowing them to communicate with the internet while remaining secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Network Access Control List (NACL) in Amazon VPC?

A

Stateless firewalls that control inbound and outbound traffic at the subnet level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Route 53?

A

A: Amazon Route 53 is a highly scalable and reliable domain name system (DNS) web service provided by AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does route 53 work?

A

Translates domain names into IP addresses and routes internet traffic to appropriate resources based on DNS records

Such as EC2 instances, load balancers, and S3 buckets etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a policy in IAM?

A

An IAM policy is a JSON document that defines permissions and specifies what actions are allowed or denied on AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can an IAM policy be attached to? 3….

A

Users: IAM policies can be attached directly to individual IAM users to grant or restrict their access to AWS resources.

Groups: IAM policies can be attached to IAM groups, allowing all users within the group to inherit the permissions defined in the policy.

Roles: IAM policies can be attached to IAM roles, which can then be assumed by users or services to temporarily obtain the permissions granted by the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IAM access key rotation?

A

Regularly updating access keys (access key ID and secret access key) associated with IAM users to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the benefit of utilizing key rotation in AWS?

A

It helps mitigate the risk of unauthorized access and potential misuse of compromised or leaked credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The minimum requirement for an IAM policy document consists of the following components: 5

A

Version
Statement
Effect
Action
Resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of a statement within an IAM policy document?

A

The statement defines the permissions and access control rules. At least one statement is required in the policy document.

{
  "Version": "2012-10-17",
  "Statement": [
    {
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of Effect, Action, and Resource within an IAM policy document?

A

Effect: The effect specifies whether the statement allows or denies access.

Action: The action specifies the specific actions or operations that are allowed or denied.

Resource: The resource specifies the AWS resources to which the permissions apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is happening within this policy?
~~~
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “AllowS3ReadAccess”,
“Effect”: “Allow”,
“Action”: [
“s3:GetObject”,
“s3:ListBucket”
],
“Resource”: [
“arn:aws:s3:::my-bucket”,
“arn:aws:s3:::my-bucket/*”
]
}
]
}
~~~

A

In this example, the policy grants the “s3:GetObject” and “s3:ListBucket” actions on the “my-bucket” S3 bucket and its contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you secure data at rest in AWS? 3

A

Amazon S3 with server-side encryption
Amazon RDS with encryption, and
AWS Key Management Service (KMS) for managing encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is AWS CloudTrail?

A

It records API calls and delivers log files for tracking user activity and detecting security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does AWS Shield protect against?

A

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is AWS WAF?

A

AWS WAF is a web application firewall that protects web applications from common web exploits, such as SQL injection, cross-site scripting (XSS), and HTTP floods.

19
Q

What is Amazon CloudWatch? 4

A

Monitoring and observability service in AWS that collects
Metrics
Monitors log files
Sets alarms, and
Automates reactions to changes in AWS resources.

20
Q

What function does CloudWatch Logs play in you cloud environment?

A

CloudWatch help you centralize log data for analysis, troubleshooting, and compliance.

21
Q

Can CloudWatch Logs integrate with other AWS services? Provide an example.

A

Yes.
For example:
You can export log data from CloudWatch Logs to Amazon S3 for long-term storage

Or to

Amazon Elasticsearch Service for advanced log analytics and visualization.

22
Q

How are logs collected and stored in CloudWatch Logs?

A

Logs can be collected and sent to CloudWatch Logs using the AWS CLI, SDKs, or agent-based integrations.

23
Q

What is a CloudWatch log event?

A

It contains information such as the timestamp, message, and additional metadata associated with the log entry

24
Q

What are CloudWatch Alarms?

A

CloudWatch Alarms enable you to monitor metrics and trigger actions based on predefined thresholds.

25
Q

What happens when a CloudWatch alarm is triggered?

A

Alarms can be set to notify you or automatically take actions when metric data breaches the specified threshold.

26
Q

What are CloudWatch metrics?

A

Data points that measure the behavior and performance of resources such as CPU utilization, network traffic, and request counts.

27
Q

How can you visualize CloudWatch metrics?

A

CloudWatch Metrics can be visualized using the CloudWatch console, allowing you to create graphs, dashboards, and custom visualizations to monitor and analyze metric data.

28
Q

How can CloudWatch be used for autoscaling?

A

Scaling policies can be defined to automatically scale resources up or down in response to changes in metrics.

29
Q

What can IAM Policies be assigned to aside from users , groups and roles?

A

IAM Policies: Can be attached to certain AWS resources like S3 buckets, Lambda functions for fine-grained access control.

30
Q

What is AWS Key Management Service (KMS)?

A

AWS Key Management Service (KMS) is a managed service that enables you to create and control encryption keys used to encrypt your data and manage their lifecycle.

31
Q

What are customer master keys (CMKs) in AWS KMS?

A

Customer master keys (CMKs) in AWS KMS are used to encrypt and decrypt data. They can be generated by AWS or imported by customers, providing control over the encryption process.

32
Q

What is AWS KMS key rotation?

A

Key rotation is the process of automatically or manually replacing an old encryption key with a new one to enhance security.

33
Q

What types of keys can be managed with AWS KMS?

A

AWS KMS supports both symmetric and asymmetric keys.

34
Q

Explain how a Symmetric keys encrypt and decrypts data?

A

Symmetric key encryption uses the same key for both encryption and decryption, like a single key to open and close a lockbox.

35
Q

Explain how an Asymmetric keys encrypt and decrypts data?

A

Asymmetric key encryption uses two different keys: a public key for encryption and a private key for decryption, like using separate keys to lock and unlock a lockbox. This provides a higher level of security because even if someone intercepts the lockbox, they won’t be able to unlock it without the private key.

36
Q

What is the biggest difference between AWS-managed CMKs and customer-managed CMKs?

A

Customer-managed CMKs provide additional flexibility and control over key management.

37
Q

Q: What are the differences between a Network Load Balancer and Application Load Balancer?

A

NLB operates at the transport layer
(Layer 4) of the OSI model.
Designed for TCP and UDP.
Distributes traffic using IP addresses and ports

ALB operates at the application layer
(Layer 7) of the OSI model.
Designed for HTTP and HTTPS traffic
Distributes traffic using content-based routing, path-based routing, host-based routing

38
Q

Q: What are the differences between a Network Load Balancer and Application Load Balancer in relation to the type of IP addresses they support?

A

NLB supports static IP addresses, while ALB provides dynamic IP addresses.

39
Q

What are some scenarios where an NLB should be used? 3

A

Gaming applications
VoIP services
Large file transfers

40
Q

What are some scenarios where an ALB should be used? 3

A

Web applications
Microservices, and
API backends.

41
Q

What is a Classic Load Balancer (CLB) and how does it make routing decisions?

A

A Classic Load Balancer is an AWS load balancing service that distributes incoming traffic across multiple EC2 instances based on either the round-robin or the least connections algorithm.

42
Q

What are the key differences between a CLB and an ALB?

A

ALB offers more advanced features and flexible routing options compared to CLB. ALB supports content-based routing, path-based routing, host-based routing, and integrated support for containerized applications.

43
Q

What is the listener configuration difference between CLB and ALB?

A

CLB uses classic load balancer listeners to listen for incoming traffic on specific ports, while ALB uses target groups associated with listeners, allowing for more granular routing based on URL paths or host headers.

44
Q

Real-world use case for NLB:

A

Balancing traffic for high-performance, latency-sensitive applications such as real-time streaming, where maintaining low latency and high throughput is crucial.