IAM - Identity and Access Management Flashcards

1
Q

People that within your organization that can be grouped

A

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Groups can only contain users, not other groups

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Users must belong to a group

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Permissions assigned as a JSON document are called _________.

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the least privilege principle?

A

Only give a user the permissions that they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What three main components make up a policy?

A

Version, ID, and Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a statement consist of?

A
  • Sid: an identifier for the statement (optional)
  • Effect: whether the statement allows or denies access (allow, deny)
  • Principal: account/user/role to which this policy applied to
  • Action: list of actions this policy allows or denies
  • Resource: list of resources to which the actions applied to
  • Condition: conditions for when this policy is in effect (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What forms of MFA are options in AWS?

A

Virtual and Physical MFA Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What physical MFA devices can be used with AWS?

A
  • Universal 2nd Factor (U2F) Security Key (Physical device)
    • YubiKey by Yubico (3rd Party)
      • Support for multiple root and IAM users using a single security key
  • Hardware Key Fob MFA Device
    • Gemalto MFA device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What physical MFA device is offered for AWS GovCloud?

A

SurePassID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What options do you have when accessing AWS?

A

AWS Management Console, AWS CLI, and AWS SDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are access keys?

A

Access keys are made of a key ID and a secret that can be used like a username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the AWS CLI?

A

A tool that enables you to interact with AWS services using command in your command-line shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the AWS SDK?

A

The AWS SDK is a software development kit that allows you to programmatically access and manage AWS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What purpose do roles have when it comes to IAM?

A

Roles allow AWS services to perform actions on your behalf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two security tools does AWS offer?

A

IAM Credentials Report, IAM Access Advisor

17
Q

What is the IAM Credentials Report?

A

A report that lists all of your account’s users and the status of their various credentials.

18
Q

What does the IAM Access Advisor do?

A

Access advisor shows the service permissions granted to a user and when those services were last accessed.

19
Q

What are some best practices of IAM?

A
  • Don’t use the root account
  • One physical user = One AWS user
  • Assign users to groups and assign permissions to groups
  • Create a strong password policy
  • Use and enforce the use of MFA
  • Create and use Roles for giving permissions to AWS services
  • Use access keys for programmatic access (CLI/SDK)
  • Audit permissions of your account with the IAM credentials report
  • Never share IAM users & Access keys
20
Q

What is the shared responsibility model for IAM?

A
  • AWS
    • Infrastructure (global network security)
    • Configuration and vulnerability analysis
    • Compliance Validation
  • User (You)
    • Users, groups, roles, policies management and monitoring
    • Enable MFA on all accounts
    • Rotate all keys often
    • Use IAM tools to apply appropriate permissions
    • Analyze access patterns and review permissions