What is authentication?
The process of verifying the identity of a user or entity through credentials like a username and password combination.
What is authorization?
Managing which actions users are permitted to perform in a system or application. This is usually done by granting a user certain access rights and permissions.
How is responsibility for security shared between AWS and the customer?
Customers are responsible for the security of their content that is in the AWS cloud.
AWS is responsbile for the security of the AWS cloud, e.g. hardware and global infrastructure.
What is the principle of least privilege?
Users, programs and processes should be able to access ONLY the information and resources necessary for their purpose(s) or responsibility (ies).
What is AWS Identity and Access Management (IAM)?
A service to securely control access to AWS services and resources. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users and applications can access.
What is the AWS account root user?
The user account associated with the owner of the AWS account. The root user has permission to do anything they want inside of the account.
What is MFA?
Multi-factor Authentication. A security process requiring a user to provide an additional piece of evidence (factor) to authenticate. Also known as two-factor authentication.
True or False
Amazon strongly recommends that MFA is enabled for the AWS account root user
True
What is an IAM user?
A person or application, within the owner’s AWS account, that has long-term credentials to access AWS services and resources associated with the owner’s account.
In IAM, what are access keys?
Long-term credentials for an IAM user or the AWS account root user.
What are the two parts of an IAM Access key pair?
An access key ID and a secret access key. You must use both the access key ID and secret access key together to authenticate your requests.
Fill in the blank
Access keys can pose an account ____________.
security risk
* Use AWS CloudTrail to monitor access key usage and detect any unauthorized access attempts.
* Set up CloudWatch alarms to notify administrators for denied access attempts to help detect malicious activities.
* Regularly review, update, and delete access keys as needed.
True or False
When you create an IAM user, by default, they have absolutely zero permissions.
True
What is an IAM group?
A collection of IAM users. Permission policies can be assigned to an IAM group and all users in the group inherit the permissions.
What is an IAM role?
An identity you can assume to gain temporary access to permissions. When someone assumes an IAM role, they abandon all previous permissions they had under a previous role and assume the permissions of the new role.
What is an IAM policy?
A JSON document that allows or denies permission to access AWS services and resources.
What is an IAM Identity?
IAM identities include IAM users, IAM groups, and IAM roles. An IAM identity can be associated with one or more policies, which determine permissions to access AWS resources.
See IAM Identities
What is identity federation?
A system of trust between two parties for the purpose of authenticating users and conveying information needed to authorize their access to resources.
Fill in the blank
Another term for identity federation is ____________.
Federated identity management. A system that allows users to access multiple applications, services, or domains using a single set of credentials.
How do IAM roles enable identity federation?
Account owners can federate users into their AWS account, allowing these users to authenticate with a third-party identity provider and then access AWS resources via IAM roles.
What is AWS IAM Identity Center?
The AWS solution for connecting your workforce users to AWS applications and resources. You can create and manage your users directly in IAM Identity Center or connect with your existing identity provider and federate users.
Fill in the blank
____________ provides a secure way to manage, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
AWS Secrets Manager. Instead of hardcoding credentials in your apps, you can make calls to Secrets Manager to retrieve your credentials whenever needed.
Fill in the blank
____________ helps you centrally view, manage, and operate nodes at scale in AWS, on-premises, and multicloud environments.
AWS Systems Manager
What is a zero-day attack vector?
An attack that exploits a heretofore unknown security hole.