IAM 3 Flashcards

1
Q

ABAC

What is ABAC?

A

Access-based access control: make AuthZ decisions based on Tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

Why does ABAC scale so well?

A

Don’t modify tons of Role Policies when you add new things, just tag each resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

Why is ABAC more flexible than RBAC?

A

A human with 5 roles just has 5 Tags on their IAM User – Policies grant from Tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

How do I do ABAC when I federate from SAML, etc.?

A

Have the provider pass session tags with the identity – they are Tags in AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ABAC

How do you restrict what an IAM User can do if I tag the IAM User?

A

Use ${PrincipalTag/department} in Resources or Conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

What is “AAA” for security?

A

Authentication, Authorization, and Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA

What is an example of Authentication?

A

Username + password, token from web federated login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AAA

What is an example of Authorization?

A

IAM Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA

What is Access control?

A

Higher-level concept including the other two parts of AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AAA

Example of simplest Access Control?

A

Username, password, IAM Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA

Example of network Access Control?

A

NACLs in a VPC: no username, humans, or logins at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFA

What are 4 types of MFA Factors?

A

Knowledge, posession, inherent, location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MFA

Examples of MFA factor knowledge?

A

username, password, combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MFA

Examples of MFA factor posession?

A

Bank card, dongle, MFA phone app, yubikey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MFA

Examples of MFA factor inherent?

A

Fingerprint, face, voice, iris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MFA

Examples of MFA factor location?

A

physical GPS location, bluetooth pair, network (corp or wifi)

17
Q

MFA

Three types of MFA devices?

A

Physical, U2F key, virtual

18
Q

MFA

Example of a physical MFA device?

A

Gemalto token that generates numbers

19
Q

MFA

Example of a U2F key?

A

Yubikey that generates long string of alphanum

20
Q

MFA

Examples of virtual MFA device?

A

Google authenticator and Duo Mobile

21
Q

MFA

How does physical MFA tech work?

A

Key written on physical device, enter it on AWS conosle

22
Q

MFA

How does virtual MFA device work?

A

Scan QR code or enter Secret Key created by AWS on AWS Console

23
Q

MFA

MFA lost/stolen?

A

“Sign in using alternative factors”: verification email, AWS calls your registered phone number

24
Q

MFA

You login with a username and a password: 1fa/2fa/3fa?

A

1-factor: both user and pass are things you KNOW

25
Q

Permission Boundaries

What do Permission Boundaries apply to?

A

Only to Principals (Users or Roles), not Groups or Resource Policies.

26
Q

Permission Boundaries

Where do you create Boundry Policies?

A

Policies. Boundary Policies are just Policies.

27
Q

Permission Boundaries

What’s the use case for Permission Boundaries?

A

Delegating admin permissions: can alter other accts, can’t elevate yourself.

28
Q

Permission Boundaries

Permission Boundary grants you s3:GetObject, your User policies don’t deny it. Have it?

A

No: Permission Boundaries don’t grant anything, they define the edges of what you can have.