IAM Flashcards

1
Q

What does IAM stand for?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name

4 IAM Key Components

A
  • Users
  • Groups
  • Roles
  • Policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is IAM a Regional Service?

A

No, IAM is a Global Service.

Meaning it is available in every Region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

Root Account

A

The default account for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you use the Root Account for?

A

Setting up the AWS Account

Should not be shared or used for anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define

Users

A

People within your organization that receive permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define

Groups

A

A way of defining similar permissions for multiple users

Different ways Users can be Grouped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be added to a Group?

A

Only Users

You can’t add another Group to a Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can a User belong to multiple Groups?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does a User have to have a Group?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define

Policies

A

JSON documents the define permissions for a certain User or Group

Ex. Policy JSON
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define

Least Privilege Principle

A

A User/Group should recevie the minimum permissions possible to perform their function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name

3 Elements of a Policy JSON

A
  • Version policy language version
  • Id identifier for the policy
  • Statement one or more permissions to be granted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name

6 Elements of a Policy JSON Statement

A
  • Sid indentifier for the statement
  • Effect whether the statement allows or denies access
  • Principal account/user/role to which this policy is applied
  • Action list of actions this policy allows or denies
  • Resource list of resources to which the actions applied to
  • Condition conditions for when this policy if in effect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define

Sid

Policy JSON Statment Element

A

Identifier of the statement

Ex:
"Sid": "1"

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define

Effect

Policy JSON Statment Element

A

Whether the Statement allows or denies access.
Values are “Allow”, “Deny”

Ex.
"Effect": "Allow" or "Effect: "Deny"

17
Q

Define

Principal

Policy JSON Statment Element

A

Account/User/Role to which this policy is applied to.

Ex.
"Principal": { "AWS": ["arn:aws:iam::12345678901:root"] }

18
Q

Define

Action

Policy JSON Statment Element

A

List of actions this policy allows or denies

Ex.
"Action": [ "s3:GetObject", "s3:PutObject" ]

19
Q

Define

Resource

Policy JSON Statment Element

A

List of resources to which the actions are applied to

Ex.
"Resource": [ "arn:aws:s3:::mybucket/*" ]

20
Q

Define

Condition

Policy JSON Statment Element

A

Conditions for when this policy is in effect

Ex.
"Condition" : { "StringEquals" : { "aws:username" : "johndoe" } }

21
Q

Which Policy JSON Elements are optional?

A
  • Id
  • Sid
  • Condition
22
Q

Define

IAM Password Policy

A

Specific requirments defined by the Root user for User passwords.

23
Q

Name

5 Possible restrictions set by Password Policy

A
  • Minimum length
  • Specific Character Types
  • Users can change their passwords
  • Expiration
  • Password Re-Use
24
Q

Name

4 Character Types that can be required by the Password Policy

A
  • Uppercase
  • Lowercase
  • Numbers
  • Non-Alphanumeric
25
Q

Define

MFA

A

Multi-Factor Authentication combines a password you know with a device you own

If your password is stolen, the account is not compromised

26
Q

Name

4 Authorized MFA devices for AWS Accounts

A
  • Virtual MFA application that stores tokens for authentication
  • Universal 2nd Factor (U2F) Security Key physical device with a single security key (USB)
  • Hardware Key Fob Physical device with a display that has a random changing token
  • Hardware Key Fob for AWS GovCloud US Government use
27
Q

Name

3 Ways a User can Access AWS

A
  • AWS Management Console protected by password + MFA
  • AWS Command Line Interface (CLI) protected by access keys
  • AWS Software Development Kit (SDK) protected by access keys
28
Q

Define

Access Key

A

A Long-term credential for an IAM User, used to sign requests to the AWS CLI or SDK

29
Q

Name

2 Parts of an Access Key

A
  • Access Key ID
  • Secret Access Key
30
Q

How are Access Keys generated?

A

Through the AWS Management Console

31
Q

Who manages Access Keys?

A

The User manages their own Access Keys.

32
Q

Define

AWS CLI

A

Command line tool that enables a user to interact with AWS services from their local shell

Direct alternative to the AWS Management Console

33
Q

Define

AWS Software Development Kit (SDK)

A

Language-specific APIs that enable a user to access and manage AWS services programmatically

Emebedded within your application

34
Q

Name

5 Environments Supported by AWS SDK

A
  • Web
  • Cloud
  • Mobile
  • IoT
  • Gaming
35
Q

Define

IAM Role

A

A set of Permissions assigned to an AWS Service to perform actions on your behalf

36
Q

Name

2 IAM Security Tools

A
  • IAM Credentials Report (account-level)
  • IAM Access Advisor (user-level)
37
Q

Define

IAM Credentials Report

A

Lists all your account’s users and the status of their various credentials

38
Q

Define

IAM Access Advisor

A

Shows the service permissions granted to a user and when those services were last accessed

Useful for revising IAM Policies