Module 3: Securing access Flashcards

(48 cards)

1
Q

AWS shared responsibility model

A

Security of the cloud => AWS
Security in the Cloud => Customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design principles of the security pillar

A

1) Implement a strong identity foundation
2) Protect data in transit and at rest
3) Apply security at all layers
4) Keep people away from data
5) Maintain traceability
6) Prepare for security events
7) Automate security best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to implement identity foundation

A

Use policies to grant or deny access to AWS resources.
Use the principle of least priviledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you implement encryption?

A

By using Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to protect data in transit and at rest?

A

Use encryption using TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication (Who)?

A

Important to identify who is accessing. The who can be a person or an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you protect data at rest

A

Through client side encryption which encrypts data before it is sent or server side encryption that encrypts data after it is sent but before it is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Do we allow or do we deny the request once we know who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you do with Identity and Access Management (IAM)

A

configure access, grant credentials to user and groups. Distribute it accross services.
Integration with Microsoft active directory and other identity providers.
Support MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM Resource

A

Is the user group policy or identity provider object stored in IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IAM entity

A

The object used for authentification. They include user and roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM identity

A

An identity identifies user and groups or role. You can attach policies to identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM principal

A

Person or application using the account to authenticat and make requests. (The who behind it (app or user))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAM user

A

entity you create that represent the person or application interacting with AWS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAM Group

A

Collection of users. Use groups to grant same set of permissions to multiple users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IAM Role

A

Similar to user but short term credentials for the duration of the session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM Policy

A

Document explicitely listing permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credentials needed for signing into the AWS management console

A

Username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Credentials needed to run commands in the Command Line Interface (CLI)

A

AWS access Key

18
Q

Credentials needed to make programmatic calls to AWS

A

AWS Access Key

19
Q

What is an AWS Access Key?

A

Combination of access key ID and a secret access key

20
Q

Best practice for security

A

1) Least priviledge
2) Enable MFA
3) Require human users to acces AWS with temporary credentials
4) Rotate access key for use care requiring lng term credentials
5) Use strong, Complex passwords
6) Secure local credentials
7) Use AWS Organizations
8) Enable Cloud trails
9) Protect the root user

21
Q

Least priviledge

A

Grant the strictly minimal permissions to perform tasks

22
Enable MFA
Just do it. A lot of types exist
23
Human access with temporary credentials
Do this through entity assigning roles to the accounts
24
Rotate access key
For programmatic access so that they change regularly
25
Strong passwords
Duh. Password manager...
26
Secure credentials
Password manager again
27
Use organization
To consolidate billing, and access control
28
Enable Cloudtrail
Create logs to record the access to the ressources
29
Protect the root user
Limit the use of the root user as much as possible it has complete access to everything
30
How to protect the root user
Do not use it. Create an admin user with permissions to most task
31
How to set up an admin user
Log in as root and set up MFA for it Create admin and add MFA download the key Log out of the root user Log in to the admin user Create your user accounts
32
Use case for roles
Assign role to another AWS accounts needing ressources on yours. Assign roles to user outside of your company Assign role to a mobile app because it is not good to have credentials in there Assign role to an app running on an EC2 because you don't want to store the credentials there either
33
2 types of policies
identity based policies Ressources based policies
34
Identity based policies
Attached to IAM User. What ressources can access the user
35
Resource based
Attached to an AWS resource. What user can access the ressource
36
Format of a policy
JSON
37
Process to allow access
Is there explicit denial policy?=> If not then goes to check is there an explicit allow => If yes then allow.Otherwise denies all.
38
IAM policy document structure
Version Statement Effect Principal Action Resource Condition
39
Policy version
Version of the policy language you want to use
40
Policy Statement
Defining what is allowed or denied based on conditions
41
Policy effect
Allow or deny
42
Policy Principal
Account, user or role concerned by the policy
43
Policy Action
Action allowed ."s3:GetObject" for example
44
Policy Resource
Resources that the policy action applies to
45
Policy Condition
Set of rules that must be met for the rule to apply