Security & Compliance Flashcards

1
Q

Shared Responsibility Model

A
  • AWS: security OF the cloud
  • Customer: security IN the cloud
  • shared controls
    • patches, configuration mgmt, awareness, training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AWS DDoS Protection

A
  • AWS Shield Standard
  • AWS Shield Advanced
  • AWS WAF
  • CloudFront & R53
  • auto-scaling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AWS Shield

A
  • Standard
    • Free
    • helps with SYN/UDP, reflection, layer 3/4
  • Advanced
    • $3k/mon per or
    • More sophisticated protection across more services
    • 24/7 response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AWS WAF

A
  • layer 7 exploits
  • deploy on ALB, API Gateway, CloudFront
  • Define ACLs
    • rules to protect all sort of IP/HTTP stuff
    • also SQL injection and XSS attacks
    • geo match
    • rate based rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS Network Firewall

A

protect your VPC overall

  • from layer 3 to layer7 protection in and out
  • to and from direct connect or site to site
  • operates at VPC level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AWS Firewall Manager

A
  • manage security rules in all accounts of organization
  • common set of security rules / security groups
  • manage VPC security groups across multiple accounts
  • also WAF rules, AWS Shield advanced, Network firewall
  • Rlues applied to all new resources as created
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Penetration Testing

A
  • attack your own infra to test security
  • customers can do it without prior approval for…
    • ec2, NAT, ELB, RDS, CloudFront, Aurora, API gateway, Lambda, Lightsail, Elastic Beanstalk
  • other activities are prohibied
    • no DNS zone walking
    • no DoS or DDoS
    • no port flooding, request flodding
  • contact aws-security-simulated-event@amazon.com to coordinate with AWS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AWS KMS

A

Key Management Service

  • Encryption = KMS usually
  • KMS = AWS manages the encryption keys
  • Encryption opt-in
    • EBS, S3, Resdshift, RDS, EFS
  • Automatic enabled
    • CloudTrail logs, S3 Glacier, Storate Gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CloudHSM

A
  • AWS provisions encryption hardware
  • HSM = hardware security module
  • dedicated unit
  • you manage keys not AWS
  • Tamper resistances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of KMS Keys

A
  • customer managed key
    • created managed used by customer
    • define rotation policy
    • bring your own key
  • AWS managed key
    • created managed used by AWS for customer
    • used when encryption managed by AWS aws/s3, etc.
  • AWS Owned keys
    • collection of CMKs that aws owns and manages
  • CloudHSM Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AWS ACM

A

Amazon Certificate Manager

  • SSL/TLS
  • for HTTPS
  • public/private certs
  • free for public TLS
  • integration (loads on ELBs, cloudfronts, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AWS Secrets Manager

A
  • Store secrets
  • Force rotation on a schedule
  • automate generation using lambda
  • integration with RDS
  • Encrypted with KMS
    mostly means for RDS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AWS Artifact

A

Not really a service, but presented as one
Support compliance and audit

  • portal to compliance reports and AWS agreements
  • Artifact reports: ISO certs, PCI, SOC
  • Artifact agreements: HIPAA, BAA, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Amazon GuardDuty

A

Threat discover using ML
* one click enable, 30 day trial
* * looks at CloudTrail event logs, management events, S3 data events
* * VPC flow logs
* * DNS logs
* * optional analysis of EKS, RDS, etc.
* Set up EventBridge rules with findings (Lambda SNS)
* can protect against crypto attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Amazon Inspector

A
  • run automated security assesments to gen risk score
  • Ec2 instances with SSM (system manager agent)
    • looks for network access and OS vulns, CVEs
  • for container images pushed to ECR
    • analyzed on push
  • lambda
    • analyzed when deployed
  • reports into AWS security hub, and/or EventBridge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Config

A
  • audit and record the compliance of AWS services*
    not free
  • helps record configurations and changes over time
  • store config data in S3 (analyzed by Athena)
  • Questions that can be solved…
    • is there unrestricted SSH access to security groups
    • do buckets have publish access
    • how has alb changed over time
  • Per region service, can be aggregated
17
Q

Macie

A

Looks for PII

  • data security and privacy using ML
  • alert around PII
  • notification with EventBridge (lambda, SNS, etc.)
  • one click to enable on S3 bucket
18
Q

AWS Security Hub

A
  • central security tools across accounts
  • integrated dashboards showing security and compliance status
  • Aggregates alerts from a ton of services

Config, GuardDuty, Inspector, Macie, IAM access analyzer, AWS system manager, AWS firewall manager, AWS health, AWS partner network solutions

  • must enable AWS config to make it work
19
Q

Amazon Detective

A
  • When Guardduty, Macie, etc. have findings,
  • Detective is used for analyzing findings
  • Uses ML and graphs to find root cause of security or suspicious issues
  • Automatically collects and processes events from VPC flow logs, CloudTrail, GuardDuty for unified view
  • Visualizations with details and context
20
Q

AWS Abuse

A
  • to report suspected abusive or illegal purposes
    • SPAM
    • port scanning
    • DoS or DDoS
    • intrusion attempts
    • bad content
    • malware hosting

abuse@amazonaws.com

21
Q

Root user priviledges

A
  • root user = account owner
  • complete access to all resources and services
  • lock the root user and the access keys and don’t use
  • Change the account settings (namew, email, password
  • certain tax invoices
  • Close the AWS account
  • Restore IAM permissions
  • Change or cancel AWS support plan
  • Register as seller in reserved instance marketplace
  • Configure S3 bucket for MFA
  • Edit or delte S3 buck policy that includes bad VPC
  • Sign up for GovCloud
22
Q

IAM Access Analyzer

A
  • Find out which resources are shared externally
    • S3 buckets
    • IAM Roles
    • KMS keys
    • Lambda functions and layers
    • SQS queues
    • Secrets manager secrets
  • Define Zone of trust
  • Anything outside is reported as a finding