Security Flashcards

1
Q

What is a DDOS attack?

A

Distributed denial of service
Flooding your server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Layer 4 DDOS attack, and what else is it known by?

A
  • AKA “Syn Flood”.
  • The attacker sends SyN packets and ignores the AYN-ACK.
  • Makes the server hang
  • This exhausts the supply of TCP connections.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a common Layer 7 attack?

A

Floods, GET/POST requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CloudTrail for?

A
  • Logging AWS API Calls.
  • Every API call in AWS is logged.
    • User Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CloudTrail Log?

A
  • API Call metadata
  • Identity of the API caller
  • Time of call
  • Source IP of the call
  • Request
  • Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AWS Shield?

A

Free DDOS protection

Layer 3 and 4 attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does AWS Shield Advanced give you? How much is it?

A
  • Enhanced protection against more sophisticated attacks
  • Real-time protection
  • 24/7 access to a live DDOS response team
  • Protect your bill against higher fees due to DDOS
  • $3000/month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Protects against Layer 7 attacks?

What protects against Layer 3 and 4 attacks?

A
  • Layer 7 - AWS WAF
  • Layer 3 and 4 - AWS Shield/Shield Advanced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is AWS WAF?

A
  • Web Application Firewall
  • Protects against application layer 7 attacks
  • Common attacks
    • HTTP/HTTPS
    • Cross-site scripting
    • SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can you control for using WAF?

A
  • IP addresses
  • Query strings
  • Country of origin
  • Request headers
  • Presence of SQL code (SQL injections)
  • Presence of scripts (cross-site scripting)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Guard Duty?

A
  • Machine learning-based threat detection
  • looks for things like known malicious IPs, port scanning, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you use AI and automation to protect your AWS account

A

Guard Duty -→ Lambda!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AWS Macie for?

A

Automated monitoring S3 buckets for PII

Can send alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AWS Inspector?

A
  • Automated security assessment service
  • Works with
    • Network
    • EC2’s
  • think “vulnerability scans”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of assessments does AWS Inspector do?

A
  • Network Assessments
  • Host Assessments (with an installed agent)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is KMS

A

Key management system

Managed service you use to generate keys.

Starts with the customer managed Key

17
Q

What is Secrets Manager? How is it accessed?

A
  • Secures, encrypts, rotates database and other credentials
  • Accessed programmatically rather than being hardcoded
18
Q

What happens when you enable rotation in secrets manager?

A
  • The credential is immediately rotated. This could be a good scenario question
19
Q

What is Parameter Store

A
  • Stores secret values inside systems manager.
    • Plain text or encrypted data.
  • Free
20
Q

What are the limits in Parameter store?

A
  • Limited to 10,000 values
  • Does not rotate the keys
  • Cannot generate keys using Cloud Manager
21
Q

How can you temporarily share S3 objects?

A
  • Pre-signed URL
  • Pre-signed cookie
22
Q

How can you share an S3 object in a shared bucket?

A

Pre-signed URL

23
Q

How can you grant access to multiple objects in a private bucket?

A

Pre-signed cookies

24
Q

What can you apply policies to?

A
  • Identities (group, user)
  • Resource
25
If a privilege isn't explicitly allowed in a policy …
Its implicitly denied.
26
What are two common attacks you can protect against using AWS WAF
* Cross-site scripting * SQL injection
27
What AWS services allow you to import 3rd party certificates?
IAM Certificate Store ACM (Aws Certificate Manager)
28
AWS Shield protects your applications that use which AWS services?
* ELB * Cloud Front * Route 53 * EC2 * Global Accelerator