IAM Flashcards
(39 cards)
What does IAM stand for?
Identity and Access Management
Can Groups in IAM overlap on users
Yes
IAM Policy
is a json file that state what a group or user is allowed to do
Is User Console Region specific?
no, user is allowed in all regions
What is a User Group
It is
Will attaching IAM Policy at a group level add the permissions to all users?
YES
What is an inline Policy?
A policy for a single users
What does a policy JSON consists of?
At least Version, and Statement,
What does a Statement of policy JSON consists of?
Sid - statement id some string
Effect: Allow / Deny
Action: “” - list of action that should be allowed.
e.g iam:Get*
Resource: the resource that the permision is refering to
IAM Password policy
minimum length
special characters
changing IAM Users password
password expiration
prevent re-use
Hardware OTP tokens
TOTP - time based
HOTP - counter based
What are 3 ways to access AWS?
Management Console
CLI
SDK
What is an IAM Role
Permissions for a AWS Service that needs to access some our resources. e.g. a EC2 Instance trying to access S3 Bucket
What is IAM Last Acessed
list of all users and their credentials
What does IAM Access Advisor?
Shows what permissions are used by user and allow to revoke the unused ones (least priviledge principle)
What is shared responsibility model?
There are some elements that AWS is responsible for and some that us as a user are.
What is a AWS Budget?
It is a threshold that will alarm us when we reach a particular spending goal. Even multiple times. (at. 85%, 100% or forecasted spent is 100%)
What is AWS EC2?
Elastic Compute Cloud (IaaS)
What does AWS EC2 consists of?
Renting virtual machines (EC2)
Storing data on virtual drives (EBS)
Distributing load across machines (ELB)
Scaling the services using an auto scaling group (ASG)
What OS can be put on EC2?
Linux, Windows or Mac OS
How to bootstrap EC2?
Using EC2 User data script.
What does bootstraping mean?
Installing updates, software
What are the EC2 Types?
e.g m5.2xlarge
m - class
5 - generation
2xlarge - size
-> compute optimized (start with C)
-> Memory optimized (R - RAM, X and Z)
-> Storage Optimized - for Databases (
What are Security Groups?
Define what’s allowed in and out and where.
Can reference IP or other Security Group
a.k.a Firewall
divided into inbound and outbound