Important Info Flashcards

(34 cards)

1
Q

IAM Principles must be authenticated to send requests (with few exceptions).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many individual user accounts can be created?

A

5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is main reason to use groups?

A

Apply permissions to users using policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does user gain permissions in User Group?

A

By permissions applied to group via that policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are access keys used for?

A

Programmitic Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are username & passwords used for?

A

Console access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are permissions boundaries attached to?

A

Users & Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do permission boundaries set?

A

Maximum permissions that entity can have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Determination Rules for Policies?

A
  1. Default: all requests are IMPLICITLY denied (though root user has full access)
  2. An explicit allow in identity-based or resource-based policy overrides default.
  3. If permissions boundary, Organizations SCP, or session policy present, might override allow with implicit deny.
  4. Explicit deny in any policy overrides any allows.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are AWS IAM Best Practices

A
  1. Require human users to use federation w/ an identity provider to access AWS using temp credentials.
  2. Require workloads use temp credentials w/ IAM roles to access AWS.
  3. Require multi-factor authentication (MFA).
  4. Upate access keys regularly for use cases that require long-term credentials.
  5. Safeguard root user credentials & don’t use them for everyday tasks.
  6. Apply least-privilege permissions.
  7. Start w/ AWS managed policies & move toward least-privilege permissions.
  8. Use IAM Access Analyzer to generate least-privilege policies based on access activity.
  9. Regularly review & remove unused users, roles, permissions, policies, & credentials.
  10. Use conditions in IAM policies to further restrict access.
  11. Verify public & cross account access to resources w/ IAM Access Analyzer.
  12. Use IAM Access Analyzer to validate IAM policies to ensure secure & functional permissions.
  13. Establish permissions guardrails across multiple accounts.
  14. Use permissions boundaries to delegate permissions management w/in an account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which element of an IAM policy document can be used to specify that a policy should take effect only if the caller is coming from a specific source IP address?

A

Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy Evaluation Determination Rules

A

Determination Rules:
1. By default, all requests are implicitely denied
2. Explicit allow in identity-based or resource-based policy overrides this default.
3. If permissions boundary, Organizations SCP, or session policy present, it might override allow w/ implicit deny.
4. Explicit deny in any policy overrides any allows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False

Each AWS service has its own set of actions that describe tasks you can perform with that service.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are IAM Best Practices

A
  • Require human users to use federation w/ identity provider to access AWS using temporary credentials.
  • Require workloads to use temporary credentials w/ IAM roles to access AWS.
  • Require multi-factor authentication (MFA).
  • Route access keys regularly for use cases that require long-term credentials.
  • Rotate access keys regularly for use cases that require long-term credentials.
  • Safeguard your root credentials & don’t use them for everyday tasks.
  • Apply least-privilege permissions.
  • Get started w/ AWS managed policies & move toward least privilege permissions.
  • Use IAM Access Analyzer to generate least-privilege policies based on access activity.
  • Regularly review & remove unused users, roles, permissions, policies, & credentials.
  • Use conditions in IAM policies to further restrict access.
  • Verify public & cross-account access to resources w/ IAM Access Analyzer.
  • Use IAM Access Analyzer to validate IAM policies to ensure secure & functional permissions.
  • Establish permission guardrails across multiple accounts.
  • Use permissions boundaries to delegate permissions management w/in an account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a public IP Address a dynamic IP address?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is an Elastic IP Address a static IP Address

17
Q

Can both ENIs and EPIs be remapped to a different instance?

18
Q

What are Public IP Addresses?

A
  • Released when instance is stopped.
  • Used in Public Subnets.
  • Chargeable
  • Associated with private IP Address on instance.
  • Cannot be moved between instances.
19
Q

What are Private IP Addresses

A
  • Retained when instance is stopped.
  • Used in Public & Private Subnets.
20
Q

What are Elastic IP Addresses

A
  • Static Public address
  • Chargeable
  • Associated w/ private IP address on instance.
  • Can be moved b/w instances & Elastic Network Adapters.
21
Q

Internet Gateway perform NAT (Network Address Translation)?

22
Q

NAT gateway is created in public subnet?

23
Q

The NAT gateway ID must be specified in private subnet RT

24
Q

Do NAT instances require source & destination checks to be disabled?

25
What happens when you stop an EC2 instance?
- EBS backed instances only - No charge for stopped instances - EBS volumes remain attached (chargeable) - Data in RAM is lost - Instance is migrated to different host. - Private IPv4 & IPv6 addresses retained. - Public IPv4 addresses released - Associated Elastic IPs retained
26
What happens to hibernating EC2 instances?
- Applies to supported AMIs - Contents of RAM saved to EBS volume - Must be enabled for hibernation when launched - Specific prerequisites apply - When started (after hibernation): - EBS root volume restored to previous state - RAM contents are reloaded - Processes that were previously running on instance are resumed. - Previously attached data volumes are reattached & instance retains its instance ID
27
What happens when rebooting EC2 instances?
- Equivalent to OS reboot - DMS name & all IPv4 & IPv6 addresses are retained - Doesn't affect billing
28
What happens when an EC2 instance retires?
- May retire if AWS finds **unfixable failure of underlying hardware that hosts instance**. - When it reaches its **scheduled** **retirement** **date**, stopped or terminated by AWS.
29
What happens when you terminate an EC2 instance?
- Deletes EC2 instance - Cannot recover terminated instance - Root EBS volumes are deleted.
30
What happens when an EC2 instance is recovered?
- CloudWatch can be used to monitor system status checks & recover instance if needed. - Applies if instance becomes impaired due to underlying hardware / platform issues. - Recovered instance is identical to original instance.
31
What is AWS Nitro System?
- Underlying platform for next gen EC2 instances. - Support for many virtual & bare metal instance types. - Breaks functions into specialized hardware w/ Nitro Hypervisor
32
What are specialized hardware in AWS Nitro System?
- Nitro cards for VPC - Nitro cards for EBS - Nitro for Instance Storage - Nitro card controller - Nitro security chip - Nitro hypervisor - Nitro Enclaves
33
What are benefits of AWS Nitro System?
- Improves performance, security, & innovation. - Performance close to bare metal for virtualized instances - Elastic Network Adapter & Elastic Fabric Adapter - More bare metal instance types - Higher network performance (ex: 100 Gbps) - High Performance Computing (HPC) optimizations - Dense storage instances (ex: 60 TB)
34
What are AWS Nitro Enclaves
- Isolated compute enviornments - Runs on isolated & hardened virtual machines. - No persistent storage, interactive access, or external networking. - Uses cryptographic attestation to make sure **only** authorized code is running. - Integrates w/ AWS Key Management Service (KMS) - Protect & securely process highly sensitive data such as: **Personally identifiable Information (PII)**, **Healthcare data**, **Financial Data**, **Intellectual Property data**