AWS Elastic Beanstalk | Security Flashcards

1
Q

Does this mean I need to modify the application code when moving from test to production?

Security

AWS Elastic Beanstalk | Compute

A

Not with AWS Elastic Beanstalk. With Elastic Beanstalk, you can specify the connection information in the environment configuration. By extracting the connection string from the application code, you can easily configure different Elastic Beanstalk environments to use different databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do I make my application private?

Security

AWS Elastic Beanstalk | Compute

A

By default, your application is available publicly at myapp.elasticbeanstalk.com for anyone to access. You can use Amazon VPC to provision a private, isolated section of your application in a virtual network that you define. This virtual network can be made private through specific security group rules, network ACLs, and custom route tables. You can also easily control what other incoming traffic, such as SSH, is delivered or not to your application servers by changing the EC2 security group settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can I run my application inside a Virtual Private Cloud (VPC)?

Security

AWS Elastic Beanstalk | Compute

A

Yes, you can run your applications in a VPC. For more details, see the AWS Elastic Beanstalk Developer Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where can I find more information about security and running applications on AWS?

Security

AWS Elastic Beanstalk | Compute

A

For more information about security on AWS, please refer to our Amazon Web Services: Overview of Security Processes document and visit our Security Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is it possible to use Identity & Access Management (IAM) with AWS Elastic Beanstalk?

Security

AWS Elastic Beanstalk | Compute

A

Yes. IAM users with the appropriate permissions can now interact with AWS Elastic Beanstalk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should I use IAM with AWS Elastic Beanstalk?

Security

AWS Elastic Beanstalk | Compute

A

IAM allows you to manage users and groups in a centralized manner. You can control which IAM users have access to AWS Elastic Beanstalk, and limit permissions to read-only access to Elastic Beanstalk for operators who should not be able to perform actions against Elastic Beanstalk resources. All user activity within your account will be aggregated under a single AWS bill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do I create IAM users?

Security

AWS Elastic Beanstalk | Compute

A

You can use the IAM console, IAM command line interface (CLI), or IAM API to provision IAM users. By default, IAM users have no access to AWS services until permissions are granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do I grant an IAM user access to AWS Elastic Beanstalk?

Security

AWS Elastic Beanstalk | Compute

A

You can grant IAM users access to services by using policies. To simplify the process of granting access to AWS Elastic Beanstalk, you can use one of the policy templates in the IAM console to help you get started. Elastic Beanstalk offers two templates: a read-only access template and a full-access template. The read-only template grants read access to Elastic Beanstalk resources. The full-access template grants full access to all Elastic Beanstalk operations, as well as permissions to manage dependent resources, such as Elastic Load Balancing, Auto Scaling, and Amazon S3. You can also use the AWS Policy Generator to create custom policies. For more details, see the AWS Elastic Beanstalk Developer Guide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can I restrict access to specific AWS Elastic Beanstalk resources?

Security

AWS Elastic Beanstalk | Compute

A

Yes. You can allow or deny permissions to specific AWS Elastic Beanstalk resources, such as applications, application versions, and environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who gets billed for the AWS resources that an IAM user creates?

Security

AWS Elastic Beanstalk | Compute

A

All resources created by IAM users under a root account are owned and billed to the root account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who has access to an AWS Elastic Beanstalk environment launched by an IAM user?

Security

AWS Elastic Beanstalk | Compute

A

The root account has full access to all AWS Elastic Beanstalk environments launched by any IAM user under that account. If you use the Elastic Beanstalk template to grant read-only access to an IAM user, that user will be able to view all applications, application versions, environments, and any associated resources in that account. If you use the Elastic Beanstalk template to grant full access to an IAM user, that user will be able to create, modify, and terminate any Elastic Beanstalk resources under that account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can an IAM user access the AWS Elastic Beanstalk console?

Security

AWS Elastic Beanstalk | Compute

A

Yes. An IAM user can access the AWS Elastic Beanstalk console using their username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can an IAM user call the AWS Elastic Beanstalk API?

Security

AWS Elastic Beanstalk | Compute

A

Yes. An IAM user can use their access key and secret key to perform operations using the Elastic Beanstalk API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly