Security and Compliance Flashcards
(42 cards)
What are the security and compliance sections?
Shared Responsibility ModelWell-Architected FrameworkSecurityEncryptionSecrets Management
What are the Security services?
Identity and Access Management (IAM) Web Application Firewall (WAF) Shield Macie Config GuardDuty Inspector Artifact Cognito
What are the encvryption services?
KMS (Key Management Service)CloudHSM (Hardware Security Module)
What is the shared responsibility model?
Customer Security in the CloudAWS Security of the Cloud
shared responsibility model - firewall configuration
Customer
shared responsibility model - Data center security for the physical building
AWS
shared responsibility model - Encryption of EBS volumes?
Customer
Shared responsibility model - Language versions of Lambda
AWS
Shared responsibility model - Taking database backups and RDS
Customer - it’s your data
Shared responsibility model - Updating the firmware on the underlying EC2 host
AWS
Shared responsibility model - Ensuring data is encrypted at rest
Customer
Shared responsibility model - Managing the network infrastructure architecture
AWS
Shared responsibility model - Patching the guest operating system for EC2
Customer
Shared responsibility model - And physically destroying storage media at the end of life
AWS
How do you report abuse of AWS resources?If you suspect there’s been a security breachand or abuse of your AWS resources,
Contact the AWS Trust & Safety team using the Report Amazon AWS abuse form or by contacting abuse@amazonaws.com.
What are the two components of IAM
UsersGroups
What is the principle of least privilege?
This involves giving a user the minimum access required to get the job done. By default, a brand new user doesn’t have permissions to do anything. So when you set them up, don’t give them full access. Just give them the access they need.
What is IAM?
IAM - Identity and Access Management. It allows you to control access to your AWS services and resources.
What are AWS Users?
An IAM feature - Users are entities that you create in IAM to represent the person or application needing to access your AWS resources.Did you know applications can also be users?You’ll create a user in IAM so you can generate access keys for an application, let’s say, that’s running on premisesthat needs access to your cloud resources.Now, don’t forget, any activity they perform in your account is billed to your account and you have to pay that bill.
What are AWS Groups
An IAM feature - A group is a collection of IAM users that helps you apply common access controls to all group members.
What’s the difference between authentication and authorization?
authentication versus authorization. authentication is who and authorization is what.What is authentication? Authentication is where you present your identity. Let’s say your username and you provide verification like your password.And then authorization determines which services and resources the authenticated identity has access to.
What are IAM Roles?
Roles define access permissions and are temporarily assumed by an IAM user or service. You assume a role to perform a task in a single session. Assumed by any user or service that needs it. Access is assigned using policies. You grant users in one AWS account access to resources in another AWS account.
What are IAM Policies
You manage permissions for IAM users, groups, and roles by creating a policy document in JSON format and attaching it.
What are the IAM best practices?
There are several recommended best practices for IAM.Enable MFA for privileged users. You should enable multi-factor authentication (MFA) for the root user and other administrative users.Implement Strong Password Policies You should require IAM users to change their passwords after a specified period of time, prevent users from reusing previous passwords, and rotate security credentials regularly.Create individual users instead of using root. You shouldn’t use the root user for daily tasks. Use roles for Amazon EC2 instances. You should use roles for applications that run on EC2 instances instead of long-term credentials like access keys.IAM Credential Report The IAM credential report lists all users in your account and the status of their various credentials. Lists all users and status of passwords, access keys, and MFA devices Used for auditing and compliance