Designing Solutions for Organizational Complexity Flashcards
(36 cards)
What service is used for AUDIT, assess, evaluate the configuration of AWS resources
AWS Config
Access to resources in different account in the form of a list of AWS account ID #’s
As an alternative to using an IAM Role (since a role requires you to give up your user permissions in place of the role permissions)
Cross-account access with a resource based policy
If question has AWS Organizations, OU’s, etc and referring to restricting or enforcing permissions to do something, think:
Service Control Policies (SCP’s)
(Most of the time. IAM could still be a possibility so just be careful)
you have a Lambda function that might hog the regional concurrency limit for Lambda’s, Fix this how?
Set a reserved concurrency limit for that Lambda function
Can SCPs affect service linked roles?
No. SCPs DO NOT affect service linked roles. Service linked roles can’t be restricted by SCPs
Which service is used to create SSO for employees of a company that uses Microsoft Active Directory to manage its user accounts
AWS Directory Services for Active Directory
(via trust relationship between on-prem AD domain and AWS Microsoft AD domain in the AWS Cloud)
Which service is used for federation to Web and mobile apps running on AWS by authenticating users through social identity providers?
Amazon Cognito
Policies that define guardrails within an AWS Organization. They only allow or deny the use of an AWS service
Service Control Policies (SCP’s)
Policies attached to principles or resources that grant permissions to AWS resources
Identity based or resource based IAM policies
(Cross-account or otherwise)
Incidents with developers in Organization accidentally terminating EC2 instances, EKS clusters, databases, etc. how to solve this?
Think: SCPs, cross account IAM access, OUs
Even if a user is granted full administrator permissions with an IAM permission policy, any access that is not explicitly allowed, or that is explicitly denied by the SCPs affecting that account is blocked 
What service uses the enable-sharing-with-aws-organizations command
The AWS Resource Access Manager (RAM) CLI
To setup tags and enforce tags automatically upon resource creation
Use - the cloudformation resource tags property to apply tags
plus
use AWS service catalog to enforce required tags and tag values 
Plus
IAM policy condition keys like aws:RequestTag and aws:TagKeys
Multiple regions, multiple accounts, AWS Organizations, provision/deploy resources, consistency
(IaC) Cloudformation StackSets
Centrally orchestrate any Cloudformation enabled service across multiple regions and accounts
AWS Organizations
(in combination with Cloudformation SetStacks)
How to Enable Cloudtrail for logging of global service (IAM, STS, CloudFront, Route53) events
Create a trail in CloudTrail with the “enable global services” option selected.
Global Option enabled = pass the includeGlobalServicesEvents flag
Pass the -is-multi-region-trail flag
Logging solution to track changes made to EC2, IAM, and RDS resources in all AWS regions
Cloudtrail with the global service option selected
Delegate access to AWS resources to 3rd party (such as in the case of 3rd party auditors)
Use External ID in conjunction with IAM role trust policy
3rd party Account with high level access suddenly added to AWS Organization without approval
Build a Monitoring solution that notifies of changes to any accounts?
Cloudtrail - capture API calls within the Organization
EventBridge & SNS - notify of administrator level actions
Config to monitor compliance of the Organization via multi account, multi region aggregator
Capture information about IP traffic going to and from network interfaces in your VCP.
Diagnose overly restrictive security group rules
Monitor the traffic that is reaching your instances
Capture rejected traffic requests including the source IPs that will be delivered to cloud watch logs groups 
Determine the direction of the traffic to and from the network interfaces 
VPC flow logs
Grant access to developers needing to perform application development tasks.
Allow create and configure of various AWS services, view permissions in Organizations
Attach the PowerUserAccess AWS managed policy to the IAM users
Use this Route53 policy when you want to configure ACTIVE PASSIVE failover
Failover routing policy
Use this route 53 when you want to route traffic based on the location of your users
Geo location routing policy
Use this route 53 routing policy when you want to route traffic based on the location of your resources and optionally shift traffic from resources in one location to resources in another
Geo proximity routing policy