This class was created by Brainscape user Rich Alberth. Visit their profile to learn more about the creator.

Decks in this class (83)

AUP
Acceptable use policy why can t y...,
Acceptable use policy why can t y...,
Acceptable use policy why cant yo...
11  cards
Bastions
Bastions where do bastion hosts live,
Bastions what is required inside ...,
Bastions what is required outside...
4  cards
DDoS
Ddos ssl tls 3 types of ddos attacks,
Ddos ssl tls how do you combat dd...,
Ddos ssl tls what do you generall...
19  cards
DNSSEC
Dnssec value prop for dnssec,
Dnssec why would a layman care ab...,
Dnssec basically how does it work
20  cards
OSI
Osi networking what layer is nat,
Osi networking what layer is pat,
Osi networking what is static nat
3  cards
EventBridge
Eventbridge moving parts of event...,
Eventbridge are cwe real time,
Eventbridge what is the venn diag...
13  cards
SNS
Sns 5 examples of subscribers,
Sns what is the keyword for this ...,
Sns can a publisher get delivery ...
9  cards
EC2_3
Processor state control ip addres...,
Processor state control cool use ...,
Processor state control what is u...
3  cards
EC2_4
Instance meta data what s the url...,
Instance meta data encryption and...,
Instance meta data how do you res...
3  cards
Lambda 1
Security two types of roles for a...,
Security what are resource polici...,
Security diagnosing function prob...
3  cards
RDS 3
Security is traffic encrypted in ...,
Security can you make encryption ...,
Security how does rds encrypt dat...
8  cards
CloudFormation 1
Nested stacks what are nested stacks,
Nested stacks what about resource...,
Nested stacks max number of resou...
32  cards
CloudFormation 2
Deletion policy what is cfn delet...,
Deletion policy what are the thre...,
Deletion policy if you mark a res...
23  cards
Logs 1
Cloudwatch logs what can you do t...,
Cloudwatch logs how can you creat...,
Cloudwatch logs what feature allo...
10  cards
Logs 2
Subscription filters what is a su...,
Subscription filters can you subs...,
Subscription filters is delivery ...
8  cards
Metrics 1
Cloudwatch metrics what s the mos...,
Names for things how far back is ...,
Time resolution time resolution f...
5  cards
Metrics 2
Cloudwatch metrics can cloudwatch...,
Alarms two kinds of cloudwatch al...,
Alarms how do metric alarms work
5  cards
Control Tower 1
Control tower control tower basic...,
Control tower four basic parts of...,
Control tower why have multiple a...
32  cards
Control Tower 2
Vpcs networking regions what does...,
Vpcs networking regions what s in...,
Vpcs networking regions control t...
30  cards
Control Tower 3
Baselines and blueprints what is ...,
Baselines and blueprints what is ...,
Baselines and blueprints at it s ...
26  cards
Organizations
Structure and accounts best pract...,
Structure and accounts so what s ...,
Structure and accounts best pract...
19  cards
IPv6
Ipv6 how do vpcs handle ipv6 rout...,
Ipv6 how do you dual stack a nat ...,
Ipv6 so how do you hide ipv6 subn...
4  cards
NAT Gateway
Nat instances nat instance or nat...,
Nat instances why never use nat i...,
Nat instances how do you control ...
24  cards
Network Firewall
Routing tl dr for network firewall,
Routing does a nf protect incomin...,
Routing is nf simple filtering or...
26  cards
PrivateLink 1
Interface endpoints are client in...,
Interface endpoints how do client...,
Interface endpoints what are inte...
11  cards
PrivateLink 2
Gateway endpoints what is a gatew...,
Gateway endpoints what happens wh...,
Gateway endpoints which services ...
17  cards
Route53 1
Dnssec with route53 how do you se...,
Dnssec with route53 what s the bi...,
Dnssec with route53 how do you cr...
10  cards
Route53 3
Vpc dns what ip addresses are res...,
Vpc dns what is the thing running...,
Vpc dns can you access a route53 ...
21  cards
Routing
Vpc routing what does the vpc rou...,
Vpc routing why doesn t the vpc r...,
Vpc routing where in the vpc s ne...
10  cards
VPC 1
Security groups what s the major ...,
Security groups what do you attac...,
Security groups can hosts in a sg...
11  cards
VPC 2
Dhcp how does dhcp start out for ...,
Dhcp 8 things dhcp gives a new host,
Dhcp what is amazonproivideddns u...
12  cards
VPC 3
Nacls what are nacls associated with,
Nacls how do nacls control traffi...,
Nacls how do nacls handle request...
33  cards
VPC 4
Internet gateways two types of igws,
Internet gateways do igws support...,
Internet gateways what s an egres...
14  cards
VPC 5
Vgws what do vgws connect,
Vgws what actual thing s are prov...,
Vgws how many vpcs can a vgw conn...
14  cards
VPN client
Vpn client client vpn is what tec...,
Vpn client what do you connect to,
Vpn client what are endpoints ass...
12  cards
VPN S2S 1
Site to site vpn are vpns ha impo...,
Site to site vpn vpns connect what,
Site to site vpn how long to set ...
18  cards
VPN S2S 2
Connected resources what aws virt...,
Connected resources what actual t...,
Connected resources what s connec...
9  cards
ACM
Acm can you run a public certific...,
Acm can you run a private certifi...,
Acm acm do you generate certs you...
12  cards
Detective
Detective what is detective,
Detective what types of events is...,
Detective sources of data
13  cards
IAM 1
Root user root user restrictions,
Root user how do you change your ...,
Root user how do you turn on iden...
23  cards
IAM 2
Roles when you assume a role what...,
Roles what abilities do you inher...,
Roles user john wants to assume r...
30  cards
IAM 3
Abac what is abac,
Abac why does abac scale so well,
Abac why is abac more flexible th...
28  cards
Identity Center 1
High level what is iam ic all about,
High level how does it simplify m...,
High level how do i turn on ident...
22  cards
Identity Center 2
Provisioning what is provisioning,
Provisioning so why not just use ...,
Provisioning two types of provisi...
22  cards
Identity Center 3
Application assignments what are ...,
Application assignments what apps...,
Application assignments examples ...
17  cards
Identity Federation
Federated access roles types of f...,
Federated access roles special na...,
Federated access roles examples o...
28  cards
Policy 1
Policy types 4 types of iam policies,
Policy types what can have identi...,
Policy types what type of policie...
8  cards
Policy 2
Policy rules order of rules for i...,
Policy rules order of evaluations 7,
Policy rules number one dumb mist...
26  cards
RAM
Resource access manager ram one s...,
Resource access manager ram what ...,
Resource access manager ram what ...
18  cards
Security Hub
Security hub what is security hub,
Security hub how do you turn it on,
Security hub i turned on security...
12  cards
Trusted Advisor
Trusted advisor what is trusted a...,
Trusted advisor what s in the gen...,
Trusted advisor how do you instal...
27  cards
AWS Security Services
Aws security services high level ...,
Aws security services high level ...,
Aws security services high level ...
42  cards
CloudHSM
Cloudhsm what is the major securi...,
Cloudhsm what is cloudhsm compare...,
Cloudhsm major warning about clou...
21  cards
KMS 1
Kms key feature of kms the big thing,
Kms what s the technical standard...,
Kms why does the l2 in the fips s...
24  cards
KMS 2
Data encryption keys how do you g...,
Data encryption keys where do you...,
Data encryption keys are deks sym...
24  cards
KMS 3
Cross account cross region is kms...,
Cross account cross region how wo...,
Cross account cross region can yo...
27  cards
KMS 4
Key operations how do you monitor...,
Key operations can you use eventb...,
Key operations can you use eventb...
26  cards
Encryption SDK
Encryption sdk what is the encryp...,
Encryption sdk value prop of encsdk,
Encryption sdk what keys does enc...
12  cards
Policy 3
Policy variables what is aws toke...,
Policy variables what is aws prin...,
Policy variables what is aws user...
28  cards
CloudTrail
Cloudtrail how do you turn on clo...,
Cloudtrail how long stored,
Cloudtrail where are cloudtrail t...
25  cards
Macie
Macie what is macie,
Macie how does it work underlying...,
Macie two types of identifiers
13  cards
DynamoDB 3
Encryption how do you encrypt a d...,
Encryption cost to encrypt your t...,
Encryption what are the limitatio...
7  cards
RDS 3
Security is traffic encrypted in ...,
Security can you make encryption ...,
Security how does rds encrypt dat...
13  cards
Load Balancers 3
Ssl offload three ways elbs can h...,
Ssl offload what is bridging,
Ssl offload bad security part of ...
17  cards
Athena
Athena cost structure for athena,
Athena how do you load data into ...,
Athena what s the term for a sche...
7  cards
GuardDuty
Basics what is guardduty important,
Basics what is guardduty looking ...,
Basics analogy to help understand...
23  cards
Inspector
Inspector what is inspector impor...,
Inspector what s the mental pictu...,
Inspector how do you use it
12  cards
EBS 2
Encryption how are volumes encrypted,
Encryption low level what s the e...,
Encryption what happens when ec2 ...
12  cards
EBS 3
Sanitisation what happens to the ...,
Sanitisation how does aws prevent...,
Sanitisation how can you wipe you...
5  cards
S3 1
Versioning how do you disable ver...,
Versioning what is the version ke...,
Versioning when is a key id null ...
14  cards
S3 3
Object lock what is object lock,
Object lock how do you apply it t...,
Object lock what about old bucket...
15  cards
S3 5
Access points what are s3 access ...,
Access points why use access points,
Access points what s the typical ...
12  cards
S3 6
Encryption theory what are the tw...,
Encryption theory what is a dek,
Encryption theory informal name f...
26  cards
S3 7
Encryption sse c how does sse c work,
Encryption sse c what is stored w...,
Encryption sse c what happens if ...
12  cards
S3 8
S3 events where can s3 events be ...,
S3 events what filters can you do...,
S3 events what do you do if you w...
14  cards
APIGW 2
Security what does a lambda autho...,
Security what does api gateway do...
2  cards
CloudFront 1
Cloudfront what is restrict viewe...,
Cloudfront how does waf integrate...,
Cloudfront can cloudfront support...
9  cards
CloudFront 3
Ssl how does cf handle http and h...,
Ssl how can cf handle only http,
Ssl how do you enable ssl for cf ...
21  cards
CloudFront 4
Private distros what s a private ...,
Private distros how do you set ce...,
Private distros old way to sign t...
29  cards
Cognito
Cognito what do you give and get ...,
Cognito how does a user pool get ...,
Cognito where do identities come ...
18  cards
Shield
Shield tl dr for shield,
Shield two flavors of shield,
Shield three types of ddos attacks
25  cards
WAF
Firewalls in general what happens...,
Firewalls in general what happens...,
Firewalls in general why is a lay...
8  cards
Secrets Manager
Secrets manager or parameter stor...,
Secrets manager or parameter stor...,
Secrets manager or parameter stor...
35  cards

More about
aws security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rich Alberth's AWS Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

AWS SECURITY
  • 1 decks
  • 23 flashcards
  • 1 learners
Decks: Encryption, And more!
Entscheidungslehre AW
  • 7 decks
  • 490 flashcards
  • 1273 learners
Decks: Teil A, Teil B, Teil C, And more!
AWS Cloud Security Foundations
  • 3 decks
  • 74 flashcards
  • 2 learners
Decks: Servicios, Preguntas, Conceptos Claves, And more!
AWS Glossary
  • 25 decks
  • 686 flashcards
  • 82 learners
Decks: A, B, C, And more!
Make Flashcards