Module 9 - Security Flashcards

(64 cards)

1
Q

What is authentication?

A

The process of verifying the identity of a user or entity through credentials like a username and password combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authorization?

A

Managing which actions users are permitted to perform in a system or application. This is usually done by granting a user certain access rights and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is responsibility for security shared between AWS and the customer?

A

Customers are responsible for the security of their content that is in the AWS cloud.
AWS is responsbile for the security of the AWS cloud, e.g. hardware and global infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the principle of least privilege?

A

Users, programs and processes should be able to access ONLY the information and resources necessary for their purpose(s) or responsibility (ies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AWS Identity and Access Management (IAM)?

A

A service to securely control access to AWS services and resources. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users and applications can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the AWS account root user?

A

The user account associated with the owner of the AWS account. The root user has permission to do anything they want inside of the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MFA?

A

Multi-factor Authentication. A security process requiring a user to provide an additional piece of evidence (factor) to authenticate. Also known as two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False

Amazon strongly recommends that MFA is enabled for the AWS account root user

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an IAM user?

A

A person or application, within the owner’s AWS account, that has long-term credentials to access AWS services and resources associated with the owner’s account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In IAM, what are access keys?

A

Long-term credentials for an IAM user or the AWS account root user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two parts of an IAM Access key pair?

A

An access key ID and a secret access key. You must use both the access key ID and secret access key together to authenticate your requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank

Access keys can pose an account ____________.

A

security risk
* Use AWS CloudTrail to monitor access key usage and detect any unauthorized access attempts.
* Set up CloudWatch alarms to notify administrators for denied access attempts to help detect malicious activities.
* Regularly review, update, and delete access keys as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False

When you create an IAM user, by default, they have absolutely zero permissions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an IAM group?

A

A collection of IAM users. Permission policies can be assigned to an IAM group and all users in the group inherit the permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IAM role?

A

An identity you can assume to gain temporary access to permissions. When someone assumes an IAM role, they abandon all previous permissions they had under a previous role and assume the permissions of the new role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an IAM policy?

A

A JSON document that allows or denies permission to access AWS services and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an IAM Identity?

A

IAM identities include IAM users, IAM groups, and IAM roles. An IAM identity can be associated with one or more policies, which determine permissions to access AWS resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is identity federation?

A

A system of trust between two parties for the purpose of authenticating users and conveying information needed to authorize their access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fill in the blank

Another term for identity federation is ____________.

A

Federated identity management. A system that allows users to access multiple applications, services, or domains using a single set of credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do IAM roles enable identity federation?

A

Account owners can federate users into their AWS account, allowing these users to authenticate with a third-party identity provider and then access AWS resources via IAM roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is AWS IAM Identity Center?

A

The AWS solution for connecting your workforce users to AWS applications and resources. You can create and manage your users directly in IAM Identity Center or connect with your existing identity provider and federate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank

____________ provides a secure way to manage, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

A

AWS Secrets Manager. Instead of hardcoding credentials in your apps, you can make calls to Secrets Manager to retrieve your credentials whenever needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fill in the blank

____________ helps you centrally view, manage, and operate nodes at scale in AWS, on-premises, and multicloud environments.

A

AWS Systems Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a zero-day attack vector?

A

An attack that exploits a heretofore unknown security hole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a denial of service (DoS) attack?
A bad actor floods a web application with excessive network traffic. Legitimate customer requests are denied when the web application becomes overloaded and can no longer respond.
26
What is a **distributed** denial of service (DDoS) attack?
The bad actor floods a web application with network traffic from multiple (lots!) co-opted machines (zombie bots) on the internet.
27
How do security groups protect against denial of service attacks?
Security groups only allow in configured request traffic. And they operate at the AWS network level so they can leverage the capacity of an AWS region to shrug off a massive attack.
28
How does Elastic Load Balancing protect against a denial of service attack?
Because Elastic Load Balancer is a managed service that includes AWS Shield Standard, which automatically protects AWS resources from the most common types of DDoS attacks.
29
How do AWS regions protect against a denial of service attack?
By being big, with lots of capacity. It is massively expensive to overwhelm the enormous capacity of an AWS region.
30
What kind of protection is provided by AWS Shield Standard?
AWS Shield Standard provides protection against a wide range of known DDoS attack vectors and zero-day attack vectors. Shield Standard is provided automatically and at no extra charge when you use AWS. ## Footnote See [How AWS Shield and Shield Advanced work](https://docs.aws.amazon.com/waf/latest/developerguide/ddos-overview.html) and [AWS Shield Standard overview](https://docs.aws.amazon.com/waf/latest/developerguide/ddos-standard-summary.html)
31
What is AWS Shield Advanced?
A paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks. ## Footnote See [How AWS Shield and Shield Advanced work](https://docs.aws.amazon.com/waf/latest/developerguide/ddos-overview.html) and [AWS Shield Advanced overview](https://docs.aws.amazon.com/waf/latest/developerguide/ddos-advanced-summary.html)
32
What is AWS WAF?
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to your protected web application resources. ## Footnote See [What is AWS WAF?](http://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html#waf-intro)
33
How does AWS WAF provide network security protection?
When a request comes into AWS WAF, it checks the IP address against a web access control list (web ACL). If the request comes from a blocked IP address on the web ACL, AWS WAF denies access. Legitimate requests are allowed access. ## Footnote See [What is AWS WAF?](http://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html#waf-intro)
34
# Fill in the blank In AWS WAF, web ACLs are also now known as ____________.
protection packs ## Footnote See [How AWS WAF works](https://docs.aws.amazon.com/waf/latest/developerguide/how-aws-waf-works.html)
35
# Fill in the blank AWS WAF web ACLs contain ____________ which define criteria for inspecting web requests and specify the action to take on requests that match their criteria.
rules ## Footnote See [How AWS WAF works](https://docs.aws.amazon.com/waf/latest/developerguide/how-aws-waf-works.html)
36
# True or False In AWS WAF, web ACL rules can inspect requests for criteria such as malicious scripts, IP address, country of origin and likely SQL injection.
True ## Footnote See [AWS WAF rules](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html)
37
Data encryption uses ________ to encrypt and decrypt data, turning plaintext into ciphertext, a randomized set of characters, and vice versa.
cryptographic keys
38
What is encryption at rest?
Encryption of data that is in a single location, e.g. in a database or an S3 bucket.
39
What is encryption in transit?
Encryption of data while it is being transferred from one location to another, e.g. from a database to an application or from one server to another.
40
How is encryption in transit provided?
By using SSL/TLS certificates to establish encrypted network connections.
41
# True or false By default, all new Amazon S3 buckets have encryption configured.
True. And all uploaded objects are encrypted at rest.
42
Can Amazon EBS volumes be encrypted at rest?
Yes, including both boot and data volumes of an EC2 instance.
43
# True or false Server-side encryption at rest is enabled on all DynamoDB table data.
True. Using encryption keys stored in AWS Key Management Service (AWS KMS).
44
What is AWS Key Management Service (KMS)?
An encryption and key management service that makes it easy for you to create and control the keys used to encrypt and sign your data. ## Footnote See [AWS Key Management Service](https://docs.aws.amazon.com/kms/latest/developerguide/overview.html)
45
Do encryption keys ever leave AWS KMS unencrypted?
No. To use or manage your KMS keys, you interact with AWS KMS. ## Footnote See [AWS Key Management Service](https://docs.aws.amazon.com/kms/latest/developerguide/overview.html)
46
What is Amazon Macie?
A data security service that discovers sensitive data by using machine learning and pattern matching, provides visibility into data security risks, and enables automated protection against those risks. ## Footnote See [What is Amazon Macie?](https://docs.aws.amazon.com/macie/latest/user/what-is-macie.html)
47
# Fill in the blank You can use Amazon Macie to assess your security ___________.
posture
48
What is AWS Certificate Manager (ACM)?
AWS Certificate Manager (ACM) helps you to provision, manage, and renew publicly trusted SSL/TLS certificates on AWS based websites. (SSL/TLS certificates provide data encryption in transit.) ## Footnote See [AWS Certificate Manager Documentation](https://docs.aws.amazon.com/acm/)
49
Name five (5) Amazon services related to **detection** of, and **response** to, security events.
1. Amazon Macie 2. Amazon Inspector 2. Amazon GuardDuty 3. Amazon Detective 4. Amazon Security Hub
50
# Fill in the name of the Amazon Service ____________ is a security vulnerability assessment service that runs automated security assessments of Amazon EC2 instances, container images in Amazon ECR, and Lambda functions.
**Amazon Inspector**. It produces a detailed list of security **findings**, prioritized by level of security, with recommendations on how to fix the security hole. You can manage findings in the Amazon Inspector console. ## Footnote See [What is Amazon Inspector?](https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html)
51
# Fill in the name of the Amazon Service ____________ is a threat detection service that continuously monitors, analyzes, and processes AWS data sources and logs in your AWS environment.
Amazon GuardDuty. It uses threat intelligence feeds, such as lists of malicious IP addresses and domains, file hashes, and machine learning (ML) models to identify suspicious and potentially malicious activity in your AWS environment. ## Footnote See [What is Amazon GuardDuty?](https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html)
52
Where can you view GuardDuty findings?
GuardDuty consolidates your security findings across accounts and displays results in the Summary dashboard on the GuardDuty console of the AWS Management Console. You can also retrieve findings through the AWS Security Hub CSPM API, AWS Command Line Interface, or AWS SDK. ## Footnote See [What is Amazon GuardDuty?](https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html)
53
# Fill in the name of the Amazon Service ____________ makes it easy to analyze, investigate, and quickly identify the root cause of security findings or suspicious activities.
Amazon Detective ## Footnote See [What is Amazon Detective?](https://docs.aws.amazon.com/detective/latest/userguide/what-is-detective.html)
54
# Fill in the blank Amazon Detective automatically collects log data from your AWS resources. It then uses machine learning, statistical analysis, and graph theory to generate ____________ that help you to conduct faster and more efficient security investigations.
visualizations ## Footnote See [What is Amazon Detective?](https://docs.aws.amazon.com/detective/latest/userguide/what-is-detective.html)
55
# Fill in the name of the Amazon Service ____________ is a unified cloud security solution that prioritizes your critical security issues and helps you respond at scale.
AWS Security Hub. It detects security issues by automatically correlating and enriching security signals from multiple sources, such as Cloud Security Posture Management (CSPM), vulnerability management (Amazon Inspector), sensitive data (Amazon Macie), and threat detection (Amazon GuardDuty). ## Footnote See [Introduction to AWS Security Hub](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub-v2.html)
56
AWS Security Hub is meant to be used alongside AWS Security Hub ____________.
CSPM, Cloud Security Posture Management ## Footnote See [What are Security Hub and Security Hub CSPM?](https://docs.aws.amazon.com/securityhub/latest/userguide/what-are-securityhub-services.html)
57
# Fill in the blank AWS Security Hub CSPM supports multiple industry security ____________.
standards e.g. from Amazon itself, and from the Center for Internet Security (CIS), the Payment Card Industry Data Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). ## Footnote See [Introduction to AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html)
58
# Fill in the blank Security standards are comprised of security ________.
controls, which each represent a security best practice
59
# Fill in the blank Security Hub CSPM runs checks against security controls and generates control ____________ to help you assess your compliance against security best practices.
findings ## Footnote See [Introduction to AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html)
60
# Fill in the blanks Security Hub CSPM also receives findings from other AWS services such as ____________, ____________, and ____________, as well as supported third-party products.
Amazon GuardDuty Amazon Inspector Amazon Macie (This gives you a single view into a variety of security-related issues.) ## Footnote See [Introduction to AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html)
61
In the context of security, what is TTR?
Time to Remediation. TTR measures the duration from incident detection to permanent resolution, ensuring the root cause is fixed and recurrence is prevented.
62
# Fill in the blank Security Hub transforms complex security signals into actionable ____________.
insights Security Hub also includes automated response workflows to accelerate Time to Remediation (TTR). ## Footnote See [Introduction to AWS Security Hub](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub-v2.html)
63
# Fill in the blank AWS security ____________ provides extensive information on AWS services and best practices related to security.
documentation ## Footnote See [AWS Security Documentation](https://docs.aws.amazon.com/security/) and the [AWS Security Blog](https://aws.amazon.com/blogs/security/)
64
# True or false? The AWS Marketplace provides a digital catalog where you can purchase third-party security software and services that run on AWS.
True. These include: * Threat detection and prevention tools * Identity and access management tools * Data protection tools Compliance and governance tools