Security Flashcards

1
Q

What is a DDOS attack?

A

Attack that tries to make your service unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 types of DDOS attacks and at what layers?

A
  1. Syn Ack flood attack layer 4
  2. NTP Amplification attack layer 4
  3. HTTP/HTTPS flood attack layer 7
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CloudTrail?

A

CloudTrail is a service that logs AWS API calls for ip address, time, and api call (request params, metadata, response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Would CloudTrail be able to log SSH/RDP into EC2?

A

No it would not as it needs to be an API call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are CloudTrail Logs stored?

A

S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Shield?

A

It is free DDOS Protection for CloudFront, ELB, Route 53 against layer 3/4 attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AWS Shield Advanced? What are 3

A
  1. Enhanced protection for CloudFront, ELB, Route 53
    2 Provides a dedicated 24/7 AWS response team
  2. Near realtime monitoring of DDOS attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How much is AWS Shield Advanced?

A

3k a month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Layer does AWS Shield protect? What about WAF?

A

AWS Shield protects against layer3/4

WAF protects against layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is WAF?

A

Web Application Firewall provides monitoring and access control for HTTP/HTTPS to ELB,Route 53,CloudFront

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What kinds of attacks does WAF protect against?

A

SQL Injection, Cross site scripting, DDOS layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can WAF look at in requests that go through it?

A

It can look at

  1. IP addresses
  2. Request parameters
  3. string search patterns
  4. country originating
  5. if there is sql code or scripts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What returns if WAF blocks access?

A

It will return a 403

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 behvious of WAF?

A
  1. allow all content you specify
  2. block all content you specify
  3. count requests meeting the properties you specify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AWS Guard Duty? What can be triggered from it?

A

Threat detection Service that monitors your AWS account for malicious behavior using machine learning AI (taking a baseline)
External db of known threats
Can trigger lambda from Cloudwatch events if threat detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does AWS Guard Duty monitor?

A

DNS Logs, Cloudtrail logs, VPC Flow logs

17
Q

What is AWS Macie?

A

Uses Machine learning to find PII/sensitive data in S3 and alerts you through EventBridge (which you can then automate remediation)

18
Q

What is AWS Inspector?

A

A security assessment service that inspects for vulnerabilities and best practices

19
Q

What are the 2 types of scanning AWS Inspector does? How do they differ?

A
  1. Network Assesment of configurations in VPC
  2. Host Assessment of EC2
    One does not need an agent installed while the other does
20
Q

What is KMS? What are CMK?

A

KMS is a service that lets you manage and create encryption keys.
CMK are customer master keys, the actual encryption key itself.

21
Q

What is CloudHSM?

A

A dedicated hardware security module in the cloud that generates your CMK

22
Q

What are 3 ways to generate a CMK?

A
  1. Use AWS HSM
  2. Use your own HSM
  3. Rent a cloud HSM from AWS
23
Q

What are 3 ways to control access to CMKs?

A
  1. Key policies (who can manage and use keys)
  2. IAM policies
  3. Grants with key policies (for delegation)
24
Q

What are 3 ways to control access to CMKs?

A
  1. Key policies (who can manage and use keys)
  2. IAM policies
  3. Grants with key policies (for delegation)
25
What is AWS Secrets Manager?
Service that lets you store encrypted credentials and retrieve/rotate them. e.g. RDS
26
What is AWS Parameter Store?
Service that lets you store your parameters in a hierarchy.
27
What is the difference between Secrets Manager and Parameter store?
Secrets Manager can handle secrets at scale, but costs money | Parameter Store is free but can only handle 10k secrets, and doesn't have key rotation
28
What should you watch out for with Secrets Manager rotation?
When rotation is enabled, it will immediately attempt to rotate credentials once
29
What is the encryption like for Secrets Manager?
Automatically encrypted in transit and at rest
30
When should you use Presigned URL's over Presigned Cookies?
Use Presigned URLs with you have a single resource needing public access Use presigned cookies if there are multiple resources needing to be shared
31
How do you share a video in a private S3 bucket?
Use a presigned url
32
What is a presigned url?
A url generated with a time duration giving access to a private S3 bucket using the object owners credentials
33
Why do we need presigned urls?
By default all objects in S3 are private and only object owner has permission to access
34
How is a not explicitly allowed permission treated in IAM policy?
It is implicitly denied if it is not defined
35
How is an explicit denied permission treated?
IAM will take the denial over everything else
36
How does AWS treat multiple policies on attached to the same role?
The union of all permissions is taken.
37
What is AWS Certificate Manager? What is the cost? What services does it work with?
Service that lets create/manage SSL certificates. Certificates are free and automatically renews/deploys for ELB, CLoudfront,APi Gateway