S3 Security Flashcards

1
Q

What are the 4 ways to encrypt objects in S3 buckets

A
  1. Server-Side Amazon S3 managed keys (SSE-S3)
  2. Server-Side KMS keys (SEE-KMS)
  3. Server-Side Customer provided keys (SSE-C)
  4. Client Side
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of encryption does SSE-S3 used and what header must be set?

A

AES-256 - x-amz-server-side-encryption: AES-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two advantages of using AWS KMS?

A
  1. Customer can create keys in KMS
  2. Key usage is logged in CloudTrail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What header must be set to use AWS KMS encryption?

A

x-amz-server-side-encryption: aws:kms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a limitation of SSE-KMS?

A

May encounter rate limits of KMS when making GenerateDataKey and Decrypt API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol must be used when using SSE-C?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How could you enforce encryption in transit for S3?

A

Create an IAM policy that Deny’s requests based on the aws:secureTransport flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the default encryption of S3

A

SSE-S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you enforce encryption at rest for S3?

A

Create an IAM policy that Deny’s requests based on the s3:x-amz-server-side-encryption-customer-algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What must you ensure if a client makes a cross-origin request onto an S3 bucket?

A

Ensure the clients origin is included in the AllowedOrigins of the S3 CORS configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What must be enabled in order to use MFA delete?

A

Versioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who can enable/disable MFA delete?

A

Bucket owner (root account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a trap to avoid when enabling S3 logging buckets?

A

Dont set the logging bucket to the same bucket you are monitoring. This will create a loop!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the easiest way to log all access to S3 buckets?

A

Create a logging bucket which all logs from one bucket will be put into

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 different methods to generate S3 presigned URLS?

A
  1. S3 console
  2. AWS CLI/SDK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What permissions are applied to the person using an S3 presigned URL?

A

The permissions of the user who generated the URL

17
Q

What is a good method to manage access to a shared bucket for multiple groups of users?

A

Define IAM policies and apply them to S3 access points

18
Q

What must be created in order to access a S3 access point endpoint without leaving a VPC?

A

VPC endpoint that has an endpoint policy that allows access to the bucket and the access point

19
Q

What must be created in order to run a lambda function when retrieving from S3?

A

S3 Object lambda access point -> Lambda function -> S3 access point