Advanced IAM Flashcards

SSO, Permission Boundaries, Trust Policies (16 cards)

1
Q

What does ARN stand for?

A

Amazon Resource Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the major differences between the two types of IAM Policies?

A
  • Identity Policies
    • attached to an IAM user, group, or role
    • specify what an identity can do
  • Resource policies
    • attached to a resource
    • specify who can do what to the resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Do IAM policies take effect upon creation?

A

No. An IAM Policy has no effect until it is attached to a resource or role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the basic format of an IAM policy document?

A
  • Version # (YYYY-MM-DD)
  • List of statements, each individual statement enclosed in {}
    • Each statement matches an AWS API Request​​​
    • Each statement has an Effect, either allow or deny
    • Each statement has A list of Actions with the effect, of the form *servicename:ActionName*
    • Each statement has a Resource the Action is against (in ARN form)
    • Idea: (Allow/Deny) Resource to do Actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If an IAM policy does not explicitly allow an API action, might it still be implicitly allowed?

A

No

If an action is not explicitly allowed, it is implicitly denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In general, how does AWS reconcile multiple attached policies to the same user or resource?

A

AWS joins all applicable policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Suppose your IAM user has 2 policies, one of which explicitly denies access to all S3 buckets, the other of which explicitly allows access to a specific S3 bucket. Will this user be allowed to access to the specific S3 bucket?

A

No

An explicit deny overrides anything else in any other policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of AWS Permission Boundaries?

A
  • The idea is to prevent priviledge escalation or unnecessarily overbroad permissions
  • Controls maximum permissions an IAM policy can grant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some use cases for AWS Permission Boundaries?

A
  • Developers creating roles for Lambda functions
  • Application owners creating roles for EC2 instances
  • Administrators creating ad hoc users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of IAM, what does RAM stand for?

A

Resource Access Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSO stand for?

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SAML stand for?

A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the general use cases for AWS SSO?

A
  • Centrally manage access to AWS Resources
  • Using existing identities to log in to AWS
  • Governing account-level permissions
  • SAML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does SaaS stand for?

A

Software As A Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the specific policy document that determines which AWS service or account can assume an IAM Role?

A

The Trust Policy (or Trust Relationship). This is the key difference from an Identity Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When creating a role for a Lambda function or EC2 instance, which service name must be listed in the role’s Trust Policy?

A

lambda.amazonaws.com (for Lambda) or ec2.amazonaws.com (for EC2).