Domain 2: Security & Compliance Flashcards

1
Q

Customer - Shared Responsibility Model (RDS)

A

Customers are responsible for managing the data and configurations within the database, while AWS handles the underlying infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Customer - Shared Responsibility Model (Lambda)

A

Customers are responsible for the code they deploy and the security settings for their functions, while AWS manages the underlying infrastructure and scaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Customer - Shared Responsibility Model (EC2)

A

Customers are responsible for the security of their EC2 instances, including applying OS updates and configuring firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Customer - Shared Responsibility Model (General)

A

Customers are responsible for securing the data they store and process on AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS - Shared Responsibility Model

A

AWS is responsible for the security of the underlying cloud infrastructure, such as data centers, networking, and hardware. AWS also provides a range of services and tools to enhance security, compliance, and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Compliance Information

A

AWS maintains comprehensive compliance programs, and customers can find compliance information in the AWS Compliance Center. This includes recognized compliance controls, such as HIPAA, SOC reports, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Achieving Compliance on AWS

A

AWS provides various encryption options for securing data both in transit and at rest. For example, customers can use SSL/TLS for data in transit and encryption services like AWS Key Management Service (KMS) for data at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Audit and Reporting - CloudWatch

A

Provides monitoring and alerting capabilities for AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit and Reporting - Config

A

Offers configuration tracking and compliance assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit and Reporting - CloudTrail

A

Provides detailed logs of API activity for security, compliance, and auditing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least Privileged Access

A

Refers to providing users and applications with the minimum level of access required to perform their tasks. By following this principle, potential security risks and unauthorized access are minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Keys and Password Policies:

A

Customers can manage access keys and define password policies, including rotation and complexity requirements, to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Factor Authentication (MFA):

A

Customers can enable MFA to add an extra layer of protection to user accounts and reduce the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS Identity and Access Management (IAM):

A

IAM allows customers to create and manage users, groups, roles, and permissions to control access to AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify AWS access management capabilities:

A

The root account is the highest-level AWS account with full access. It’s essential to protect it with strong authentication and restrict its usage to critical tasks only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Native AWS Services

A

AWS offers security features like Security Groups, Network ACLs (Access Control Lists), and AWS WAF (Web Application Firewall) to protect and control network traffic.

17
Q

3rd Party Security Products:

A

Customers can find various security products from the AWS Marketplace to complement native AWS services.

18
Q

Documentation

A

Customers can access security best practices, whitepapers, official documents, and guidance from resources like the AWS Knowledge Center, Security Center, security forum, and security blogs.

19
Q

AWS Trusted Advisor

A

Customers can access security best practices, whitepapers, official documents, and guidance from resources like the AWS Knowledge Center, Security Center, security forum, and security blogs.

20
Q
A