Amazon S3 Security Flashcards

(13 cards)

1
Q

SSE-S3 encryption

A

Server side encryption using keys handled, managed and owned by AWS. Enabled by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSE-KMS encryption

A

Encryption using keys handled and managed by AWS Key Management Service, allows for user control and audit key usage using CloudTrail (but may be impacted by KMS limits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSE-C encryption

A

Server Side Encryption using keys fully managed by the customer outside of AWS, amazon S3 does not store the encryption key you provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client Side Encryption

A

Use client libraries eg. Amazon S3 Client-Side Encryption library, clients must encrypt/decrypt data themselves before sending/receiving to and from Amazon S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is HTTPS recommended for Amazon S3?

A

Data is encrypted in flight between you and target server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you force encryption on S3 objects?

A

Use bucket policy and refuse any API call to PUT an s3 object without encryption headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are bucket policies evaluated before or after s3 default encryption?

A

Before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What doe we need to enable if a client makes a cross-origin request on our S3 bucket?

A

Need to enable the correct CORS headers, you can allow for a specific origin or for * (all origins)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MFA delete

A

Extra protection where MFA will be required to permanently delete an object version or suspend versioning (enabled by root user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

S3 access logs

A

Any request made to S3 can be logged into another S3 bucket that must be in same AWS region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pre-signed URLs

A

Users given a presigned URL inherit the permissions of the user that generated the URL for GET / PUT, eg give temporary access to one file for 5 mins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S3 access points

A

Allows you to create unique access control policies for different applications or teams using custom hostnames, without needing to manage policies directly on the bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

S3 Object Lambda

A

Use Lambda functions to change object before it is retrieved by caller application eg. redact PII for analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly