Governance & Security Flashcards

(44 cards)

1
Q

AWS Global Infrastructure

A

Edge locations and Regional Edge Cache
Local Zones
Availability Zones
Regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS Regions

A
  • A region is a geographical area
  • Each region consists of 2 or more availability zones
  • Isolated from other AWS Regions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability Zones

A
  • Availability Zones are physically separate and isolated from each
    other
  • AZs span one or more data centers
  • Each AZ is designed as an independent failure zone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local Zones

A
  • AWS Local Zones place compute, storage, database, and other select
    AWS services closer to end-users
  • Extension of an AWS Region where you can run your latency sensitive
    applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Edge Locations and Regional Edge Caches

A
  • Edge locations are Content Delivery Network (CDN) endpoints for
    CloudFront
  • There are many more edge locations than regions
  • Regional Edge Caches sit between your CloudFront Origin servers and
    the Edge Locations
  • A Regional Edge Cache has a larger cache-width than each of the
    individual Edge Locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of cloud?

A
  • Trade capital expense for variable expense
  • Benefit from massive economies of scale
  • Stop guessing about capacity
  • Increase speed and agility
  • Stop spending money running and maintaining data centres
  • Go global in minutes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM Best Practices - General

A
  • Create individual IAM users
  • Use groups to assign permissions to IAM users
  • Grant least privilege
  • Use access levels to review IAM permissions
  • Monitor activity in your AWS account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM Best Practices - Roles

A

*Use roles for applications that run on Amazon EC2 instances
* Use roles to delegate permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM Best Practices - Policies

A
  • Get started using permissions with AWS managed policies
  • Use customer managed policies instead of inline policies
  • Use policy conditions for extra security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM Best Practices - Credential Management

A
  • Lock away your AWS account root user access keys
  • Configure a strong password policy for your users
  • Enable MFA
  • Do not share access keys
  • Rotate credentials regularly
  • Remove unnecessary credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Amazon EC2 Metadata and User Data

A
  • User data is data that is supplied by the user at instance
    launch in the form of a script
  • Instance metadata is data about your instance that you can use to configure or manage the running instance
  • User data and metadata are not encrypted
  • Instance metadata is available at
    http://169.254.169.254/latest/meta-data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access keys

A
  • Access keys can be used on EC2 instances to gain permissions
    to other AWS services
  • Access keys are stored in plaintext so this is not secure
  • Better to use IAM roles whenever possible and avoid access
    keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Organizations

A
  • Allows you to consolidate multiple AWS accounts into an
    organization that you create and centrally manage
  • Available in two feature sets:
  • Consolidated Billing
  • All features
  • Includes root accounts and organizational units
  • Policies are applied to root accounts or OUs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS Organization Consolidated billing includes?

A
  • Paying Account – independent and cannot access resources of other
    accounts
  • Linked Accounts – all linked accounts are independent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AWS Control Tower

A
  • Simplifies the process of creating multi-account environments
  • Sets up governance, compliance, and security guardrails for
    you
  • Integrates with other services and features to setup the
    environment for you including:
  • AWS Organizations, SCPs, OUs, AWS Config, AWS CloudTrail,
    Amazon S3, Amazon SNS, AWS CloudFormation, AWS Service
    Catalog, AWS Single Sign-On (SSO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AWS Systems Manager

A
  • Manages many AWS resources including Amazon EC2, Amazon
    S3, Amazon RDS etc.
  • Systems Manager Components:
  • Automation – uses documents to run automations
  • Run Command – run commands on EC2 instances
  • Inventory – gather inventory information
  • Patch Manager – manage patching schedules and installation
  • Session Manager – connect securely without SSH or RDP
  • Parameter Store – store secrets and configuration data securely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AWS Service Catalog

A
  • Allows organizations to create and manage catalogs of IT
    services that are approved for use on AWS
  • Allows you to centrally manage commonly deployed IT
    services
  • IT services can include virtual machine images, servers,
    software, and databases and multi-tier application
    architectures
  • Enables users to quickly deploy only the approved IT services
    they need
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AWS Config

A
  • Fully-managed service for compliance management
  • Helps with compliance auditing, security analysis, resource
    change tracking and troubleshooting
19
Q

Trusted Advisor

A
  • Online resource that helps to reduce cost, increase
    performance and improve security by optimizing your AWS
    environment
  • Provides real time guidance to help you provision your
    resources following best practices
  • Advises you on Cost Optimization, Performance, Security,
    and Fault Tolerance
20
Q

AWS Personal Health Dashboard

A
  • Provides alerts and remediation guidance when AWS is
    experiencing events that may impact you
  • Gives you a personalized view into the performance and
    availability of the AWS services underlying your AWS
    resources
  • Also provides proactive notification to help you plan for
    scheduled activities
21
Q

Service Health Dashboard

A
  • Shows you current status of AWS services
  • Not personalized
22
Q

AWS Directory Services

A

AWS Directory Service
for Microsoft Active
Directory

AD Connector
Simple AD

23
Q

AWS Directory Service for Microsoft Active Directory - description, use case

A

Service Description
AWS-managed full Microsoft AD running on Windows Server 2012 R2

Use Case
Enterprises that want hosted Microsoft Active Directory

24
Q

AD Connector - description, use case

A

AD Connector Allows on-premises users to log into AWS services with their existing AD credentials

Use Case
Single sign-on for on-premises employees

25
Simple AD - description, use case
Low scale, low cost, AD implementation based on Samba Use case: Simple user directory, or you need LDAP compatibility
26
AWS Systems Manager Parameter Store
* Provides secure, hierarchical storage for configuration data management and secrets management * You can store data such as passwords, database strings, and license codes as parameter values * You can store values as plaintext (unencrypted data) or ciphertext (encrypted data) * You can then reference values by using the unique name that you specified when you created the parameter
27
AWS Secrets Manager
* Similar to Parameter Store * Allows native and automatic rotation of keys * Fine-grained permissions * Central auditing for secret rotation
28
AWS Certificate Manager (ACM)
* Create, store and renew SSL/TLS X.509 certificates * Single domains, multiple domain names and wildcards * Integrates with several AWS services including: * Elastic Load Balancing * Amazon CloudFront * AWS Elastic Beanstalk * AWS Nitro Enclaves * AWS CloudFormation
29
AWS Key Management Service (KMS)
* Used for creating and managing encryption keys * Gives you centralized control over the encryption keys used to protect your data * KMS is integrated with most other AWS services * Easy to encrypt the data you store in these services with encryption keys you control
30
AWS CloudHSM
* Cloud-based hardware security module (HSM) * Generate and use your own encryption keys on the AWS Cloud * Manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs * CloudHSM runs in your VPC
31
AWS CloudTrail
* CloudTrail logs API activity for auditing * By default, management events are logged and retained for 90 days * A CloudTrail Trail logs any events to S3 for indefinite retention * Trail can be within Region or all Regions * CloudWatch Events can be triggered based on API calls in CloudTrail * Events can be streamed to CloudWatch Logs
32
VPC Flow Logs
* Flow Logs capture information about the IP traffic going to and from network interfaces in a VPC * Flow log data is stored using Amazon CloudWatch Logs * Flow logs can be created at the following levels: * VPC * Subnet * Network interface
33
Elastic Load Balancing Access Logs
* Capture detailed information about requests sent to the load balancer * Use to analyze traffic patterns and troubleshoot issues * Can identify requester, IP, request type etc. * Can be optionally stored and retained in S3
34
S3 Access Logs
* Provides detailed records for the requests that are made to a bucket * Details include the requester, bucket name, request time, request action, response status, and error code (if applicable) * Disabled by default
35
Amazon Detective
* Analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities * Automatically collects data from AWS resources * Uses machine learning, statistical analysis, and graph theory * Data sources include VPC Flow Logs, CloudTrail, and GuardDuty
36
AWS GuardDuty
* Intelligent threat detection service * Detects account compromise, instance compromise, malicious reconnaissance, and bucket compromise * Continuous monitoring for events across: * AWS CloudTrail Management Events * AWS CloudTrail S3 Data Events * Amazon VPC Flow Logs * DNS Logs
37
Amazon Macie
* Macie is a fully managed data security and data privacy service * Uses machine learning and pattern matching to discover, monitor, and help you protect your sensitive data on Amazon S3 * Macie enables security compliance and preventive security
38
AWS WAF
AWS WAF * AWS WAF is a web application firewall * Create rules that block common web exploits like SQL injection and cross site scripting * The rules are known as Web ACLs
39
AWS Shield
AWS Shield * AWS Shield is a managed Distributed Denial of Service (DDoS) protection service * Safeguards web application running on AWS with always-on detection and automatic inline mitigations
40
AWS Artifact
* AWS Artifact provides on-demand access to AWS’ security and compliance reports and select online agreements * Reports available in AWS Artifact include: * Service Organization Control (SOC) reports * Payment Card Industry (PCI) reports
41
AWS Security Hub
* Provides a comprehensive view of security alerts and security posture across AWS accounts * Aggregates, organizes, and prioritizes security alerts, or findings, from multiple AWS services
42
AWS Security Bulletins
* Security and privacy events affecting AWS services are published (also has an RSS feed)
43
AWS Trust & Safety Team
* Contact the AWS Trust & Safety team if AWS resources are being used for: * Spam * Port scanning * Denial-of-service attacks * Intrusion attempts * Hosting of objectionable or copyrighted content * Distributing malware
44
Penetration Testing
* Penetration testing is the practice of testing one’s own application’s security for vulnerabilities by simulating an attack * AWS allows penetration testing without prior approval for 8 AWS services