AWS module 9.3 Security Flashcards

(5 cards)

1
Q

A company gives all employees full admin access to AWS resources. Which security principles are violated and what should be implemented instead?

A

Violates:
• Strong identity foundation
• Least privilege

They should implement:
• IAM roles with minimal permissions
• Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system cannot track who made changes or detect suspicious activity. Which security principle is missing and how is it implemented?

A

Enable traceability

Implemented using:
• Logging (e.g., CloudTrail)
• Monitoring
• Alerts and auditing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An application secures only the database but leaves the network and application layer exposed. What is wrong with this design?

A

It violates “apply security at all layers” (defence in depth) — security must be applied across VPC, subnet, OS, application, and data layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sensitive data is encrypted at rest but intercepted during transmission. What security principle was partially implemented and what is missing?

A

Implemented: encryption at rest
Missing: encryption in transit

Both are required to fully protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company relies on manual responses to security incidents, causing delays and damage. What should be implemented according to the Security pillar?

A

• Prepare for security events
• Automate detection and response
• Use incident response processes and simulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly