Security Flashcards

1
Q

Explain the shared responsibility model?

A

Customers are responsible for security IN the cloud, aws responsible for security of the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a root user?

A

A root user is the owner, gives permission to other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default for an IAM user?

A

No permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Do you need to grant permissions to an IAM user?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are policies?

A

Documents that allow and deny permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are a collection of IAM users known as?

A

A collection of IAM users are known as an IAM group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When should an IAM user be assigned an IAM role?

A

An IAM user be assigned an IAM role when they need TEMPORARY permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name given to a combination of multiple AWS groups?

A

An organization is a combination of multiple AWS groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In an Organization, who is the root user?

A

In an organization the root user is automatically generated as the parent container of the AWS groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name given to groups of accounts that are created to make it easier to manage permissions?

A

Organizational units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Artifact?

A

Artifact lets you:
1. Access compliance reports
2. Select online agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Customer Compliance Centre?

A

the Customer Compliance Centre is where you learn about compliance
ie., overview of risk, auditing security checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Customers are responsible for security IN the cloud. Give some examples:

A
  • Customer data
  • Platforms, apps, identity and access management
  • Operating systems, network and firewall config
  • client-side data encryption
  • server side encryption
  • network traffic protection

ie., selecting, configuring and patching operating systems that will run on EC2 instances, configuring security groups and managing user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS are responsible for security “OF” the cloud. Give some examples:

A
  • Software
  • Compute, Storage, Database, Networking
  • Hardware / AWS global infrastructure
  • Regions, availability zones, edge locations

ie.,
physical security of data centers
hardware and software infrastructure
network infrastructure
virtualization infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What real life example could you compare the shared responsibility model to?

A

AWS - responsible for constructing the house
Customer - responsible for ensuing the house is secure by locking the doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you use to manage access to AWS services and resources securely?

A

Identity and Access Management

17
Q

What is Organizations used for?

A

Organizations is used to consolidate and manage multiple AWS accounts within a central location

18
Q

What are Service Control Policies (SCPs)

A

Service control policies allow you to centrally control permissions for the accounts in your organization

19
Q

What are organizational units (OU)?

A

You can group accounts into organizational units to make it easier to manage accounts with similar business and security requirements

ie., companies that can only access services that meet regulatory requirements could be one OU

20
Q

What is used to protect against Denial-of-service attacks?

A

Shield

21
Q

What does Key Management Service (KMS) do?

A

allows you to create, manage and use cryptographic keys

22
Q

What does WAF do?

A

WAF lets you monitor network requests that come into your web apps by using a web access control list (ACL) which will not allow access to block IP addresses

23
Q

What does Inspector do?

A

Inspector performs automated security assessments