IAM & S3 Flashcards

1
Q

What 4 features does IAM consist of?

A

1) USERS
2) GROUPS
3) ROLES
4) POLICIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What format are policies written in?

A

JSON (JavaScript Object Notation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IAM stand for?

A

Identity Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the root account of an IAM and what privileges does it have?

A

Email account used to sign up to the AWS console

Admin access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What permissions do new users have when they are added to the AWS console?

A

None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are new users assigned when they are created?

A

Secret access ID and secret access key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can you use your secret access credentials to access the console?

A

No, this not the same as a username and password. The secret access key and password are used to access AWS via APIs and the CMD line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What 2 security methods can you use to improve the security of your AWS user accounts?

A
  1. Set up MFA

2. Use strict password policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are S3 buckets private by default?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What 2 methods can be used to secure an s3 bucket?

A
  1. Bucket policies (apply to the whole bucket)

2. Access control lists (apply at the document level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 key features of an S3 bucket?

A

1) Key
2) Value
3) Version ID
4) Metadata
5) Sub resources
a) Torrent
b) access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is encryption in transit achieved in S3?

A

SSL/TLS –> HTTPS

Stops man in the middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 3 examples of encryption at rest in S3? (server side)

A

1) S3 managed keys –> SSE-S3
2) AWS key management service SSE-KMS
3) Sever side encryption with customer provided keys –> SSE-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cross regional replication?

A

The process of replicating the contents of a S3 buckets to another bucket in a different region/AZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What must be enabled to allow cross regional replication?

A

Versioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

you create a bucket add a file and then turn on CRR… does the file get pushed to the destination bucket?

A

No, existing files will not be replicated automatically, but subsequent additions will be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Are delete markers replicated?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a lifecycle policy?

A

A process to automate moving objects between different storage tiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Can a lifecycle policy be used with versioning?

A

Yes, a policy can be applied to current and previous versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is transfer acceleration?

A

A way to increase speed and performance of file transfer using AWS’s dedicated backbone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Cloudfront?

A

AWSs content delivery network. Comprised of Origin (bucket, EC2, ELB) –> Edge locations(with cache) –> destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is distribution?

A

A collection of Edge locations

23
Q

What is a snowball?

A

A large disc used to move data in and out of the cloud

24
Q

What is storage gateway?

A

A hybrid cloud storage solution that give you on-premise access to cloud storage solutions

25
Q

What are the 3 types of storage gateways?

A

1) File gateways
a) File gateway (Flat file NFS- network file system)
b) Volumes
i) Stored volumes
ii) Cached volumes
c) Gateway virtual tape library

26
Q

What is a power access user?

A

A power access user allows access to all AWS services except the management groups and the user within IAM

27
Q

How many buckets can you have per bucket by default?

A

100

28
Q

Which 2 features can be used to improve the security of an S3 bucket?

A

1) Signed URLs

2) Signed cookies

29
Q

What is the Puts limit for an S3 bucket?

A

3500 puts per second

30
Q

What is SAML and what does it do?

A

Security Assertion Markup Language

This is used to give your federated users single sign on (SSO) access to the AWS management console

31
Q

What 2 problems does AIM solve?

A

1) Manage users and their access e.g. access keys, passwords , MFA e.t.c or request temp security credentials to provide users access to AWS services and resources
2) Manage access for federated users- can request credentials with configurable expirations for users you manage in a corporate directory. You can provide AWS access without creating a IAM user account for them

32
Q

Can a user be a system or an application that requires access to AWS?

A

Yes as well as a federated user a user managed outside of AWS in your corporate directory

33
Q

What can a user do?

A

Can place requests such as to S3 or EC2

34
Q

Who is responsible for a user’s access to web service APIs?

A

AWS account holder

35
Q

By default, which service APIs can a user call?

A

None

36
Q

What are the 4 ways IAM users are managed?

A

1) Create and manage IAM users
2) Create and manage IAM groups
3) Manage users security credentials
4) Create and manage policies to grant access to AWS services and resources

37
Q

What is a group?

A

A collection of IAM users. You manage group membership as a simple list. e.g. Add or remove them from a group

38
Q

Can users belong to multiple groups?

A

Yes

39
Q

Can groups belong to other groups?

A

No

40
Q

Can policies be applied to groups?

A

Yes, applying policies to groups of users makes it easier to mange permissions that having to manage permissions for each individual user

41
Q

Can you disable user access?

A

Yes, you can enable and disable a users access keys via the IAM APIs, CLI or IAM console

42
Q

Who is able to manage users for an AWS account?

A

By default only the AWS account holder. However, you can grant permissions to an administrator users to manage users (recommended practice)

43
Q

How are MFA devices configured for IAM users?

A

The account holder can order multiple MFA devices. You can assign these to individual IAM users via the IAM API, CLI or IAM console

44
Q

Can IAM users have individual SSH keys?

A

No

45
Q

Do IAM user names have to be an email address?

A

No, it can be any string

46
Q

Can I define a password policy for my user’s passwords?

A

Yes. e.g. minium length or at least one number. You can also enforce automatic password expiration.

47
Q

What problem does an IAM role solve?

A

Allows you to delegate access with defined permissions without having to share long term access keys

48
Q

How many IAM roles can you assume?

A

There is no limit, but you can only act as one IAM role when you make a request to AWS services

49
Q

How many IAM roles can I create?

A

up to 1000 but this can be increased

50
Q

What is IAM roles for EC2 instances?

A

Enables your applications running on EC2 to make requests of AWS services such as S3, SQS and SNS without having to copy AWS access keys to every instance

51
Q

What are the features of IAM roles for EC2 instances?

A

1) AWS temporary security credentials to use when making request from running EC2 instances to AWS services
2) Automatic rotation of AWS temporary security credentials
3) Granular AWS service permissions for applications running on EC2 instances

52
Q

Can you apply the same role to multiple EC2 instances?

A

Yes

53
Q

What happens if you delete and IAM role that is associated with a running EC2 instance?

A

Any application running on the instance that is using the role will be denied access immediately