Security Flashcards

1
Q

Shared Responsibility Model - high level

A

You (in) v. AWS (of)
IN - security IN the cloud (data, configuration)
OF - security OF the cloud (hardware, operation of managed services, global infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shared Responsibility Model - details

A
YOU
Customer data
Platforms, Apps, IAM
OS, Network and Firewall config
Client-side data encryption, Server-side encryption, Networking traffic protection

AWS
Software (Compute, Storage, DB, Networking)
Hardware/Global Infrastructure (Region, AZ, Edge Locations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Compliance Programs

A

Set of internal policies and procedures of a company to comply with laws, rules, and regs or to uphold business reputation.
ex: HIPAA, PCI DSS (payment card industry data security standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS Artifact

A

Free, self-service portal for access to AWS’ security and compliance reports
Checks based on global compliance frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardening

A

The act of eliminating as many security risks as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Inspector

A

Runs security benchmarks v. selected EC2 instances
Can perform Network and Host Assessments
Most popular benchmark is by CIS (Center fo Internet Security) - 699 checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AWS Inspector - Network Assessments

A

Checks whether ports are open / reachable to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS Inspector - Host Assessments

A

Checking the OS / app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AWS WAF

A

Web Application Firewall
Can write your own rules or use a ruleset from a trusted AWS Security Partner in the AWS WAF Rules Marketplace (cheap)
Can be attached to either CloudFront or Application Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS WAF - write your own

A

Write your own rules to ALLOW or DENY traffic based on the contents of an HTTP request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS WAF - ruleset from marketplace

A

These rulesets usually protect v. the OWASP Top 10 most dangerous attacks:

(1. Injection
(2. Broken Authentication
(3. Sensitive data exposure
(4. XXE - XML External Entities
(5. Broken Access control
(6. Security misconfigurations
(7. XSS - Cross Site Scripting
(8. Insecure Deserialization
(9. Using Components with known vulnerabilities
(10. Insufficient logging and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OWASP

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Shield

A

A managed DDoS (Distributed Denial of Service) protection service that safeguards apps running on AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS attack

A

Distributed Denial of Service

A malicious attempt to disrupt normal traffic by flooding a website with a large amount of fake traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shield Standard

A

Free and automatically available

When you route your traffic through Route53 or CloudFront, you are using this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shield Standard attack protection types

A

Protects against layer 3, 4, and 7 attacks
7 Application
4 Transport
3 Network

17
Q

Shield Advanced

A

$3000/y, 24/7 support, dashboard
Defends v. large, sophisticated attacks
Route53, Cloudfront, ELB, Global Accelerator, Elastic IP
DDoS Cost Protection

18
Q

PenTesting

A

Penetration Testing
An authorized simulated cyberattack on a computer system, to evaluate its security
There are Permitted Services and Prohibited Activities. Must submit a request for Other Simulated Events - reply can take 7 days

19
Q

PenTesting Permitted Services

A

(1. EC2 instances, NAT Gateways, ELBs
(2. RDS
(3. CloudFront
(4. Aurora
(5. API Gateways
(6. AWS Lambda and Lambda@Edge fxs
(7. Lightsail resources
(8. Elastic Beanstalk environments

20
Q

PenTesting Prohibited Activities

A

Mainly no flooding
DNS zone walking via Route53 Hosted Zones
Denial of Service, Distributed DoS, Simulated DoS, Simulated DDoS
Port flooding
Protocol flooding
Request flooding (login request flooding, API request flooding)

21
Q

IDS / IPS

A

Intrusion Detection System / Intrusion Protection System

Device or software app that monitors a network or systems for malicious activity or policy violations

22
Q

Amazon Guard Duty

A

A threat detection service - continuously monitors for malicious, suspicious activity and unauthorized behavior.
Uses Machine Learning to analyze AWS logs (CloudTrail, VPC Flow, DNS)
Alerts you of Findings - can automate incident report via CloudWatch Events or with 3rd party services

23
Q

KMS

A

Key Management Service
Managed service that helps you create and control the encryption keys used to encrypt your data.
KMS is a multi-tenant HSM (hardware security module) - highly secure
Can use with many AWS services via checkbox
Uses Envelope Encryption

24
Q

Envelope Encryption

A

When you encrypt your data it is protected, but you have to then protect your encryption key. This encrypts your data key with a master key - additional security layer.

25
Q

Amazon Macie

A

Fully managed service - continuously monitors S3 data access activity and generates alerts when it detects risks.
Works by using Machine Learning to analyze your CloudTrail logs, and ID your most at-risk users.

26
Q

Security Groups v NACLs

A

NACLs - firewall at Subnet Level
SGs - firewall at Instance Level
NACLs - You create Allow and Deny rules
SGs - Denies all traffic - you create Allow rules.

27
Q

AWS VPN

A

Virtual Private Network
Lets you est a secure and private tunnel from your network/device to AWS global network.
Site-to-Site - on-prem network to VPC
Client - users/laptops to VPC