IAM Principles must be authenticated to send requests (with few exceptions).
True
How many individual user accounts can be created?
5000
What is main reason to use groups?
Apply permissions to users using policies.
How does user gain permissions in User Group?
By permissions applied to group via that policy.
What are access keys used for?
Programmitic Access
What are username & passwords used for?
Console access
What are permissions boundaries attached to?
Users & Roles
What do permission boundaries set?
Maximum permissions that entity can have
What are Determination Rules for Policies?
What are AWS IAM Best Practices
Which element of an IAM policy document can be used to specify that a policy should take effect only if the caller is coming from a specific source IP address?
Condition
Policy Evaluation Determination Rules
Determination Rules:
1. By default, all requests are implicitely denied
2. Explicit allow in identity-based or resource-based policy overrides this default.
3. If permissions boundary, Organizations SCP, or session policy present, it might override allow w/ implicit deny.
4. Explicit deny in any policy overrides any allows.
True or False
Each AWS service has its own set of actions that describe tasks you can perform with that service.
TRUE
What are IAM Best Practices
Is a public IP Address a dynamic IP address?
Yes
Is an Elastic IP Address a static IP Address
Yes
Can both ENIs and EPIs be remapped to a different instance?
Yes
What are Public IP Addresses?
What are Private IP Addresses
What are Elastic IP Addresses
Internet Gateway perform NAT (Network Address Translation)?
Yes
NAT gateway is created in public subnet?
Yes
The NAT gateway ID must be specified in private subnet RT
Yes
Do NAT instances require source & destination checks to be disabled?
Yes