Designing Solutions for Organizational Complexity Flashcards

(36 cards)

1
Q

What service is used for AUDIT, assess, evaluate the configuration of AWS resources

A

AWS Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access to resources in different account in the form of a list of AWS account ID #’s

As an alternative to using an IAM Role (since a role requires you to give up your user permissions in place of the role permissions)

A

Cross-account access with a resource based policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If question has AWS Organizations, OU’s, etc and referring to restricting or enforcing permissions to do something, think:

A

Service Control Policies (SCP’s)

(Most of the time. IAM could still be a possibility so just be careful)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

you have a Lambda function that might hog the regional concurrency limit for Lambda’s, Fix this how?

A

Set a reserved concurrency limit for that Lambda function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can SCPs affect service linked roles?

A

No. SCPs DO NOT affect service linked roles. Service linked roles can’t be restricted by SCPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which service is used to create SSO for employees of a company that uses Microsoft Active Directory to manage its user accounts

A

AWS Directory Services for Active Directory

(via trust relationship between on-prem AD domain and AWS Microsoft AD domain in the AWS Cloud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which service is used for federation to Web and mobile apps running on AWS by authenticating users through social identity providers?

A

Amazon Cognito

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Policies that define guardrails within an AWS Organization. They only allow or deny the use of an AWS service

A

Service Control Policies (SCP’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policies attached to principles or resources that grant permissions to AWS resources

A

Identity based or resource based IAM policies

(Cross-account or otherwise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incidents with developers in Organization accidentally terminating EC2 instances, EKS clusters, databases, etc. how to solve this?

A

Think: SCPs, cross account IAM access, OUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Even if a user is granted full administrator permissions with an IAM permission policy, any access that is not explicitly allowed, or that is explicitly denied by the SCPs affecting that account is blocked 

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What service uses the enable-sharing-with-aws-organizations command

A

The AWS Resource Access Manager (RAM) CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To setup tags and enforce tags automatically upon resource creation

A

Use - the cloudformation resource tags property to apply tags

plus

use AWS service catalog to enforce required tags and tag values 

Plus

IAM policy condition keys like aws:RequestTag and aws:TagKeys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiple regions, multiple accounts, AWS Organizations, provision/deploy resources, consistency

A

(IaC) Cloudformation StackSets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Centrally orchestrate any Cloudformation enabled service across multiple regions and accounts

A

AWS Organizations

(in combination with Cloudformation SetStacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to Enable Cloudtrail for logging of global service (IAM, STS, CloudFront, Route53) events

A

Create a trail in CloudTrail with the “enable global services” option selected.

Global Option enabled = pass the includeGlobalServicesEvents flag

Pass the -is-multi-region-trail flag

17
Q

Logging solution to track changes made to EC2, IAM, and RDS resources in all AWS regions

A

Cloudtrail with the global service option selected

18
Q

Delegate access to AWS resources to 3rd party (such as in the case of 3rd party auditors)

A

Use External ID in conjunction with IAM role trust policy

19
Q

3rd party Account with high level access suddenly added to AWS Organization without approval

Build a Monitoring solution that notifies of changes to any accounts?

A

Cloudtrail - capture API calls within the Organization

EventBridge & SNS - notify of administrator level actions

Config to monitor compliance of the Organization via multi account, multi region aggregator

20
Q

Capture information about IP traffic going to and from network interfaces in your VCP.

Diagnose overly restrictive security group rules

Monitor the traffic that is reaching your instances

Capture rejected traffic requests including the source IPs that will be delivered to cloud watch logs groups 

Determine the direction of the traffic to and from the network interfaces 

A

VPC flow logs

21
Q

Grant access to developers needing to perform application development tasks.

Allow create and configure of various AWS services, view permissions in Organizations

A

Attach the PowerUserAccess AWS managed policy to the IAM users

22
Q

Use this Route53 policy when you want to configure ACTIVE PASSIVE failover

A

Failover routing policy

23
Q

Use this route 53 when you want to route traffic based on the location of your users

A

Geo location routing policy

24
Q

Use this route 53 routing policy when you want to route traffic based on the location of your resources and optionally shift traffic from resources in one location to resources in another

A

Geo proximity routing policy

25
Use this route 53 routing policy when have resources in multiple regions, and you want to route traffic to the region that provides the best latency 
Latency routing policy 
26
Use this route 53 routing policy when you want to respond to DNS queries with up to eight healthy records selected at random
Multi value answer, routing policy
27
Use this route 53 routing policy to route traffic to multiple resources in proportions that use specify
Weighted routing policy 
28
Users account needs access to resources account. What are the steps to make this happen?
1. Create IAM user in the users account 2. Generate cross account role with needed permissions from the resources account 3. Grant access to the users account from the resources account
29
Make direct connect available to multiple regions for inter region access
Direct connect to VIF to direct connect Gateway to virtual private gateways in each region
30
Create an SCP that restricts launching any AWS resources without a tag
Include the **condition** element in the policy which uses the **ForAllValues** qualifier and the **AWS:TagKeys** condition
31
Convert speech to text, generates subtitles
Amazon transcribe 
32
AWS Workspaces Users can’t log in FSx for Windows File system has reached capacity How to prevent in the future:
Cloudwatch metric monitor **FreeStorageCapacity** of the file system Lambda to increase filesystem capacity using the **update-file-system** command Event bridge to invoke the lambda, when the metric threshold is reached
33
Public identity providers, such as Facebook and Google, etc. use web identity federation with STS and **AssumeRoleWithWebIdentity**
On-premise SAML 2.0 identity providers like Active Directory use federated access and STS BUT do not use **AssumeRoleWithWebIdentity**
34
Act as an intermediary for requests from internal users and servers often caching content to speed up subsequent requests to the Internet Limit, outbound web connections from your VPC to the Internet Provide URL and web content filtering 
Forward proxy server 
35
Don’t want their reserved instance discounts to be shared by the other Business units in the AWS organization 
Turn off the reserved instance, sharing on the master account for all the member accounts
36
To add and manage additional existing AWS accounts to your AWS organization
Send invites to all member accounts from the master account of your organization Create an **OrganizationAccountAccessRoll** IAM roll in the member account and grant permission to the master account to assume the role