{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Module 6 Flashcards

(19 cards)

1
Q

Shared Responsibility Model

A

Security responsibilities are split between AWS and Customer:

(This is all contingent on the product specifically used, but generally the below list is true)

AWS: Global infrastructure, compute, storage, DB, networking, regions/edge locations/availability zones

Customer: Platform, applications, identity and access mgmt. OS, network and firewall config, client-side encryption, server side encryption, networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM User

A

An IAM user is an identity that you create in AWS. It represents the person or application that interacts with AWS services and resources. It consists of a name and credentials.

By default, when you create a new IAM user in AWS, it has no permissions associated with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Group

A

An IAM group is a collection of IAM users. When you assign an IAM policy to a group, all users in the group are granted permissions specified by the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM Role

A

An IAM role is an identity that you can assume to gain temporary access to permissions.

Before an IAM user, application, or service can assume an IAM role, they must be granted permissions to switch to the role. When someone assumes an IAM role, they abandon all previous permissions that they had under a previous role and assume the permissions of the new role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM Policy

A

An IAM policy is a document that allows or denies permissions to AWS services and resources.

Controlled via JSON files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Root user best practices

A

Has superadmin users.

  • Turn on MFA
  • Don’t use for every day tasks.
  • Use root user to create first IAM users - which is granted permissions to create other users.
  • ONLY use root user for environment-wide admin tasks (changing AWS Support plan for example)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AWS Organizations

A

Suppose that your company has multiple AWS accounts. You can use AWS Organizations(opens in a new tab) to consolidate and manage multiple AWS accounts within a central location.

When you create an organization, AWS Organizations automatically creates a root, which is the parent container for all the accounts in your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Control Policies

A

In AWS Organizations, you can centrally control permissions for the accounts in your organization by using service control policies (SCPs)(opens in a new tab). SCPs enable you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organizational units

A

In AWS Organizations, you can group accounts into organizational units (OUs) to make it easier to manage accounts with similar business or security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OU vs IAM Group

A

OU is a collection of accounts

IAM Group is a collection of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Account vs IAM User

A

An AWS account is a container that holds all your AWS resources and users, while an IAM user is a specific identity within that account with limited permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Artifact

A

AWS Artifact(opens in a new tab) is a service that provides on-demand access to AWS security and compliance reports and select online agreements. AWS Artifact consists of two main sections: AWS Artifact Agreements and AWS Artifact Reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Artifact Agreements.

A

Suppose that your company needs to sign an agreement with AWS regarding your use of certain types of information throughout AWS services. You can do this through AWS Artifact Agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AWS Artifact Reports.

A

Next, suppose that a member of your company’s development team is building an application and needs more information about their responsibility for complying with certain regulatory standards. You can advise them to access this information in AWS Artifact Reports.

AWS Artifact Reports provide compliance reports from third-party auditors. These auditors have tested and verified that AWS is compliant with a variety of global, regional, and industry-specific security standards and regulations. AWS Artifact Reports remains up to date with the latest reports released. You can provide the AWS audit artifacts to your auditors or regulators as evidence of AWS security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Artifact Reports

A

AWS Artifact provides access to AWS security and compliance documents, such as AWS ISO certifications, Payment Card Industry (PCI) reports, and Service Organization Control (SOC) reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Customer Compliance Center

A

The Customer Compliance Center(opens in a new tab) contains resources to help you learn more about AWS compliance.

You can also access compliance whitepapers and documentation on topics such as:

AWS answers to key compliance questions
An overview of AWS risk and compliance
An auditing security checklist

17
Q

AWS Shield

A

AWS Shield is a service that protects applications against DDoS attacks. AWS Shield provides two levels of protection: Standard and Advanced.

18
Q

AWS Shield Standard

A

AWS Shield Standard automatically protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks.