IAM Flashcards

1
Q

What does IAM stand for?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name

4 IAM Key Components

A
  • Users
  • Groups
  • Roles
  • Policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is IAM a Regional Service?

A

No, IAM is a Global Service.

Meaning it is available in every Region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

Root Account

A

The default account for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you use the Root Account for?

A

Setting up the AWS Account

Should not be shared or used for anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define

Users

A

People within your organization that receive permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define

Groups

A

A way of defining similar permissions for multiple users

Different ways Users can be Grouped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be added to a Group?

A

Only Users

You can’t add another Group to a Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can a User belong to multiple Groups?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does a User have to have a Group?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define

Policies

A

JSON documents the define permissions for a certain User or Group

Ex. Policy JSON
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define

Least Privilege Principle

A

A User/Group should recevie the minimum permissions possible to perform their function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name

3 Elements of a Policy JSON

A
  • Version policy language version
  • Id identifier for the policy
  • Statement one or more permissions to be granted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name

6 Elements of a Policy JSON Statement

A
  • Sid indentifier for the statement
  • Effect whether the statement allows or denies access
  • Principal account/user/role to which this policy is applied
  • Action list of actions this policy allows or denies
  • Resource list of resources to which the actions applied to
  • Condition conditions for when this policy if in effect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define

Sid

Policy JSON Statment Element

A

Identifier of the statement

Ex:
"Sid": "1"

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define

Effect

Policy JSON Statment Element

A

Whether the Statement allows or denies access.
Values are “Allow”, “Deny”

Ex.
"Effect": "Allow" or "Effect: "Deny"

17
Q

Define

Principal

Policy JSON Statment Element

A

Account/User/Role to which this policy is applied to.

Ex.
"Principal": { "AWS": ["arn:aws:iam::12345678901:root"] }

18
Q

Define

Action

Policy JSON Statment Element

A

List of actions this policy allows or denies

Ex.
"Action": [ "s3:GetObject", "s3:PutObject" ]

19
Q

Define

Resource

Policy JSON Statment Element

A

List of resources to which the actions are applied to

Ex.
"Resource": [ "arn:aws:s3:::mybucket/*" ]

20
Q

Define

Condition

Policy JSON Statment Element

A

Conditions for when this policy is in effect

Ex.
"Condition" : { "StringEquals" : { "aws:username" : "johndoe" } }

21
Q

Which Policy JSON Elements are optional?

A
  • Id
  • Sid
  • Condition
22
Q

Define

IAM Password Policy

A

Specific requirments defined by the Root user for User passwords.

23
Q

Name

5 Possible restrictions set by Password Policy

A
  • Minimum length
  • Specific Character Types
  • Users can change their passwords
  • Expiration
  • Password Re-Use
24
Q

Name

4 Character Types that can be required by the Password Policy

A
  • Uppercase
  • Lowercase
  • Numbers
  • Non-Alphanumeric
25
# Define MFA
Multi-Factor Authentication combines a password you know with a device you own | If your password is stolen, the account is not compromised
26
# Name 4 Authorized MFA devices for AWS Accounts
* **Virtual MFA** application that stores tokens for authentication * **Universal 2nd Factor (U2F) Security Key** physical device with a single security key (USB) * **Hardware Key Fob** Physical device with a display that has a random changing token * **Hardware Key Fob for AWS GovCloud** US Government use
27
# Name 3 Ways a User can Access AWS
* **AWS Management Console** protected by password + MFA * **AWS Command Line Interface (CLI)** protected by access keys * **AWS Software Development Kit (SDK)** protected by access keys
28
# Define Access Key
A Long-term credential for an IAM User, used to sign requests to the AWS CLI or SDK
29
# Name 2 Parts of an Access Key
* Access Key ID * Secret Access Key
30
How are Access Keys generated?
Through the AWS Management Console
31
Who manages Access Keys?
The User manages their own Access Keys.
32
# Define AWS CLI
Command line tool that enables a user to interact with AWS services from their local shell | Direct alternative to the AWS Management Console
33
# Define AWS Software Development Kit (SDK)
Language-specific APIs that enable a user to access and manage AWS services programmatically | Emebedded within your application
34
# Name 5 Environments Supported by AWS SDK
* Web * Cloud * Mobile * IoT * Gaming
35
# Define IAM Role
A set of Permissions assigned to an AWS Service to perform actions on your behalf
36
# Name 2 IAM Security Tools
* **IAM Credentials Report** (account-level) * **IAM Access Advisor** (user-level)
37
# Define IAM Credentials Report
Lists all your account's users and the status of their various credentials
38
# Define IAM Access Advisor
Shows the service permissions granted to a user and when those services were last accessed | Useful for revising IAM Policies