Security & Compliance Flashcards

(47 cards)

1
Q

In a shared responsibility Model AWS is responsible for

A

protecting and securing their infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a shared responsibility Model you are responsible for how the services are implemented and

A

managing your application’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are AWS responsibilities regarding EC2 instances (2)

A
  • Patching the host operating system
  • Security of the physical server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are AWS responsibilities regarding Lamda (2)

A
  • Operating system
  • Software dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With Lambda the Customer is responsible for (2)

A
  • Storage of sensitive data
  • IAM for permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With EC2 the Customer is responsible for (3)

A
  • Patching the guest operating system
  • Security controls
  • Installed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 5 pillars of the Well-Architected Framework describe design principles and best practices for running workloads in the cloud. They are;

C.O.R.P.S.

A
  • Cost OptimIzation
  • Operational Excellence
  • Reliability
  • Performance Efficiency
  • Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operational Excellence involves Creating applications that support production workloads 3 key takeaways are:

  • Script
  • Plan
  • Deploy
A
  • Script Operations as Code
  • Plan for failure
  • Deploy Smaller reversible changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance Efficiency involves the effective use of computing resources to meet

A

system and business needs while removing bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security focuses on putting mechanisms in place that protect your systems and data you can do this by (3)

  • Track
  • Encrypt
A
  • Encrypt Data in transit and at rest
  • Track who did what and when
  • Automate Security Tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reliability Design systems that work consistently and recover quickly (3)

  • Scale
  • Reduce
  • Test
A
  • Scale horizontally for resilience
  • Reduce Idle resources
  • Test Recovery Procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cost OptimIzation has three main takeaways (3)

  • Use consumption-based
  • Implement cloud
  • Measure
A

pricing
financial management
overall efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use Cases for Operational Excellence: You can use AWS CodeCommit for version control to enable

A

tracking of code changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use Cases for Performance Efficiency: You can use AWS Lambda to

A

run code with zero administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use Cases for Security: You can use CloudTrail to configure central logging of

A

all actions performed in your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use Cases for Reliability: You can use Multi-AZ deployments for enhanced availability and reliability of

A

RDS databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Use Cases for Cost OptimIzation: You can use S3 Intelligent-Tiering to automatically move your data

A

between access tiers based on your usage patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In AWS Users are entities you create in IAM to represent

A

the person or application needing access to your AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A group is a collection of IAM users that helps you apply common

A

access controls to all group members.

20
Q

In AWS Roles can be assumed by

A

any user or service that needs them.

21
Q

AWS Policies help you manage permissions for IAM users, groups, and roles by creating a policy document in

A

JSON format and attaching it.

22
Q

Real-world use cases for IAM: Using Roles help you avoid sharing long-term credentials

A

like access keys

23
Q

IAM credential report: Lists all users and status of passwords, access keys, and MFA device. This is best used for

A

auditing and compliance

24
Q

Do not confuse security groups for EC2 with IAM groups. EC2 security groups

A

act as firewalls, while IAM groups are collections of users.

25
What can only the root user do? (3)
* Modify your support plan * Modify email address * Close your account
26
What changes can AWS Config help you identify within EC2?
Network Software OS/system-level updates, and more.
27
GuardDuty identifies malicious or unauthorized activities in your AWS account using
machine learning
28
GuardDuty identifies threats by continuously monitoring _________ activity and ________ within your AWS environment.
network, account behavior
29
Inspector has built-in rules to access your EC2 instances to find
vulnerabilities and report by the level of severity.
30
Artifact is a central repository for
compliance reports from third-party auditors who have audited AWS
31
Artifact Use Case? (2)
- Service Organization Controls (SOC) reports - Payment Card Industry (PCI) reports
32
Cognito controls access to mobile and web applications by assisting with user ______________ & \_\_\_\_\_\_\_\_\_\_\_\_
Sign-up and sign-in Provides authentication and authorization
33
Cognito- Use Case: allows your users to sign in to your application through
social media accounts like Facebook and Google
34
Key Management Service (3)
- Generate, Store, and Control Keys
35
- Enable MFA for privileged users. - Implement strong password policies. Are examples of which Service best practices?
IAM best practices
36
Cloud HSM allows you to meet corporate, and regulatory compliance requirements for data security by using
dedicated hardware for security in the cloud.
37
CloudHSM is a Hardware Security Module (HSM) used to
Generate and manage your own encryption keys
38
When using CloudHSM AWS does not have access
to your encryption keys
39
Secrets Manager Allows you to manage and retrieve
secrets (passwords or keys).
40
Secrets Manager integrates with which three services?
RDS Redshift DocumentDB
41
Amazon Inspector helps to improve the security and compliance of applications by
running automated security assessments.
42
Amazon Inspector is a service that checks applications for
security vulnerabilities and deviations from security best practices.
43
From within AWS Artifact you can review,
accept, and manage agreements with AWS.
44
With AWS Roles you can assume a role to perform a task in a single session and access is assigned
using policies.
45
- Create individual users instead of using root. - Use roles for Amazon EC2 instances.
IAM Best Practices
46
Using Roles helps you protect your instances from
unauthorized access.
47
GuardDuty works by looking for threats on your account that are associated with
common techniques used by attackers.