SECURING DATA ON AWS Flashcards

1
Q

What is the AWS root account, and why should it not be used for day-to-day interactions?

A

The AWS root account is the initial identity with complete access. It should not be used daily to avoid security risks; instead, use IAM for user creation and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MFA, and why is it recommended for the AWS root account?

A

Multi-Factor Authentication (MFA) adds an extra layer of security by requiring additional verification besides the password, crucial for protecting the root account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you create a new administrator account and disable root account access keys?

A

Create a new IAM user with admin access, disable and remove root account access keys, ensuring secure access management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AWS CloudTrail, and how does it enhance security?

A

AWS CloudTrail logs API requests, aiding in operational auditing, security investigations, and compliance documentation, providing insights into API interactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are AWS billing reports, and why are they important for security?

A

AWS billing reports, like the Cost and Usage Report, provide insights into resource usage and costs, aiding in monitoring and ensuring financial security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Organizations, and how does it help in managing multiple AWS accounts?

A

AWS Organizations consolidates multiple AWS accounts, enabling centralized management, grouping accounts into organizational units (OUs), and applying Service Control Policies (SCPs) for access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Service Control Policies (SCPs) in AWS Organizations?

A

SCPs are policies applied to OUs in AWS Organizations, defining maximum permissions and access control rules across multiple accounts within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does AWS KMS help in data encryption?

A

AWS Key Management Service (KMS) enables creating and managing encryption keys, controlling encryption across various AWS services and applications, enhancing data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is AWS Certificate Manager used for, and how does it enhance security?

A

AWS Certificate Manager provisions SSL/TLS certificates for securing network communications, establishing website identities, and ensuring encrypted data transmission, enhancing overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does AWS Shield protect against DDoS attacks, and what are its features?

A

AWS Shield is a managed DDoS protection service safeguarding applications on AWS by providing automatic mitigation, minimizing downtime, and offering protection against various types of DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the differences between HTTP and HTTPS, and why is HTTPS recommended for security?

A

HTTPS encrypts data in transit using TLS/SSL, protecting against eavesdropping and man-in-the-middle attacks, unlike HTTP, which sends data in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you control access to Amazon S3 buckets, and what security features are recommended?

A

Use IAM policies, bucket policies, and AWS tools like Amazon S3 Block Public Access to control access to S3 buckets, ensuring secure data storage and access management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can Access Control Lists (ACLs) be used to protect Amazon S3 buckets, and what precautions should be taken?

A

ACLs can be used to set access permissions on S3 buckets. However, they are less commonly used compared to IAM policies and bucket policies. When using ACLs, it’s important not to set overly open or permissive access levels to maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly