IAM Flashcards

1
Q

IAM

A

Identity Access Management - Where you manage your AWS users and their access to AWS Accounts and Services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the common uses for IAM

A

To Manage

  1. Users
  2. Groups
  3. IAM Access Policies
  4. Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the default user when you create an AWS account?

A

“root” user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What permissions does the “root” user have by default?

A

The root user has FULL administrative rights and access to every part of the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What access do new users have upon creation?

A

By default, new users are created with No access to any AWS services (except the ability to login).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM Setup (Best Practices)

A
Delete root access keys
Activate MFA
Create individual IAM users
Use groups to assign permissions.
Apply IAM Password Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM Daily Best Practice

A

Login and Perform work as an IAM User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which policy overrules all other policies?

A

Deny All overrules any allow rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define - Admin, Power User, and Read Only Access

A
  1. Full Access to All AWS Resources.
  2. Admin without user/group management permissions.
  3. Only view AWS resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Policy simulator?

A

Allows you to test policies to see if they provide expected behavior before applying to groups/users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many policies can be attached to a user?

A

Unlimited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can policies be attached to AWS resources / services?

A

No (roles).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Best Practice - Should user credentials be stored or passed to an EC2 Instance?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does an explicit deny overrule an explicit allow?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Benefits of Groups

A
  1. Allow you to assign IAM permission policies to more than one user at a time. This allows for easier access management to AWS resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Roles are applied to…

A

AWS resources / Services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many roles can be assigned to an EC2 instance?

A

One at a time.

18
Q

Policies are attached to a role and the EC2 instance can assume that role. T/F

A

True

19
Q

STS

A

Security Token Service.
Temporary access to AWS resources.
Once expired they can no longer be utilized.

20
Q

What components are returned when utilizing a STS.

A

Security Token
An Access Key ID
A Secret Access Key

21
Q

What are the benefits of STS?

A

Temporary Access
Do not have to embed credentials in Resources / Application.
Can Grant access without an IAM account.
Do not have to manage, rotate or revoke.

22
Q

When should you use STS?

A

Identity Federation (AD)
Web Federation (Facebook, Google, etc.)
Roles for cross account access (prod/dev).
Roles for Amazon

23
Q

STS API Calls

A

AssumeRole
AssumeRoleWithWebIdentity
GetFederationToke
GetSessionToken

24
Q

What are API Access Keys

A

Are required to make programattic calls to AWS from CLI, Powershell, SDKs, Direct HTTP calls.

25
Q

What access method requires API Access Keys

A

CLI

26
Q

API Facts

A

Keys are available one time.
AWS will not regenerate the same set of keys.
API credentials have to associated with a USER.
Roles do not have API credentials.
In Console you can only see the Access Key ID
Must deactivate current API credentials before generating new ones.
NEVER store API keys on an EC2 instance.

27
Q

What default permissions does an IAM user have upon creation?

A

non-explicit “deny” for all AWS services.

28
Q

Attributes of IAM access credentials.

A
  1. User received unique access credentials
  2. Credentials should never be stored or passed to an EC2 instance.
  3. Credentials should never be shared with others.
29
Q

Can an IAM user have multiple policies applied to their account?

A

Yes - users can have multiple policies applied to them directly or via a group.

30
Q

T/F - Explicit allow always override explicit deny IAM policies.

A

False - explicit deny always overrides an allow.

31
Q

T/F - MFA can be configured on a per user basis for login and resource access / actions.

A

True.

32
Q

What is the first user account created in an AWS environment?

A
  1. Root user.
33
Q

What permissions does the root user have upon creation?

A

FULL Administrative rights.

34
Q

Root user best practices.

A
  1. Do not use root access for daily work / administration.

2. Protect root account with MFA.

35
Q

IAM Groups

A
  1. A Collection of users.
  2. Easier management to AWS resources.
  3. Allow permissions/policies to more than one user at a time.
36
Q

Account connection tools.

A
AWS Management Console
AWS CLI (Command Line Interface).
37
Q

IAM Policy

A

Permissions that can be assigned to users or groups that allow access to AWS resources.

38
Q

IAM Policy pre-built templates

A
  1. Administrator Access - Full access to all AWS resources.
  2. Power User Access - Admin access except cannot manage users/groups.
  3. Read only Access - Only view AWS resources.
39
Q

T/F You cannot create custom policies.

A

False - policy generator or written from scratch (JSON).

40
Q

IAM Role

A

A role is something that another entity can “assume” and in doing so acquires the specific permissions defined by that role.