Cloud Security Flashcards
(76 cards)
What are the three aspects of information security?
Confidentiality, Integrity and Availability
What does AWS Security Token Service (STS) do?
Issue temporary credentials
What is an IAM role?
It is an AWS identity that defines and provides temporary security credentials to access resources and make API requests
What is the compliance standard for information security?
ISO/IEC 27001 Framework
What is SIEM
Security Information and Event Management - Big data threat intelligence with automated response
What is an IDS?
Intrusion Detection Systems
What is the difference between resource and identity based policies?
Identity based is attached to an identity, indicating what they can do
Resource based is attached to a resource allowing specific users or groups to perform certain API requests
What is the different between inline and managed policies?
Inline policies are embedded in a principal identity (group, user or role)
Managed policies are standalone identity based policies
What are the security design principles?
There are 7
- Apply principle of least privilege
- Enable traceability
- Secure all layers
- Automate security (infrastructure as code)
- Protect data in transit and at rest
- Prepare for security events
- Minimise the attack surface
What is TLS?
Transport Layer Security
What are MSOs and MSPs and what do they do?
Managed Services Organisation or Managed Service Providers (external) create guardrails for security, data protection and disaster recovery in the company
What is the benefit of elasticity in the cloud?
Creates systems that can scale on demand
What can a company use to ensure high availability during an attack?
Automatic scaling
What security principle addresses monitoring, auditing, alerting actions and changes to the environment
Enable traceability
What is a best practice for automation that can assist with providing a repeatable secure infrastructure?
Implement infrastructure as code
What are the two things IAM provides?
Authentication - Who
Authorisation - What
What are the two primary types of credentials used for authentication
Username and password
AWS Access Key
What is the IAM Authentication best policy for long-term access?
To attach IAM Policies to groups and assign users to groups
What does the AWS Organisation Service Control Policy (SCP) do?
Defines the maximum permissions for the account members of an OU
How does AWS determine permissions with policies?
An explicit deny overrides any allow statement
Which AWS Services provide identity federation to AWS Accounts and applications?
SSO and IAM (for multiple directories)
What does AWS Directory Service do?
Allows you to use existing on-premises user credentials to access cloud resources
What does Amazon Cognito do?
Enable user sign up, sign in and access control with web and mobile applications
What can Amazon VPC do?
Provision a logically isolated section of the AWS Cloud to launch resources
- Select IP address range
- Create subnets
- Configure route tables and network gateways