What is a DDOS attack?
Attack that tries to make your service unavailable.
What are 3 types of DDOS attacks and at what layers?
What is CloudTrail?
CloudTrail is a service that logs AWS API calls for ip address, time, and api call (request params, metadata, response)
Would CloudTrail be able to log SSH/RDP into EC2?
No it would not as it needs to be an API call.
Where are CloudTrail Logs stored?
S3
What is AWS Shield?
It is free DDOS Protection for CloudFront, ELB, Route 53 against layer 3/4 attacks
What is AWS Shield Advanced? What are 3
How much is AWS Shield Advanced?
3k a month
What Layer does AWS Shield protect? What about WAF?
AWS Shield protects against layer3/4
WAF protects against layer 7
What is WAF?
Web Application Firewall provides monitoring and access control for HTTP/HTTPS to ELB,Route 53,CloudFront
What kinds of attacks does WAF protect against?
SQL Injection, Cross site scripting, DDOS layer 7
What can WAF look at in requests that go through it?
It can look at
What returns if WAF blocks access?
It will return a 403
What are the 3 behvious of WAF?
What is AWS Guard Duty? What can be triggered from it?
Threat detection Service that monitors your AWS account for malicious behavior using machine learning AI (taking a baseline)
External db of known threats
Can trigger lambda from Cloudwatch events if threat detected
What does AWS Guard Duty monitor?
DNS Logs, Cloudtrail logs, VPC Flow logs
What is AWS Macie?
Uses Machine learning to find PII/sensitive data in S3 and alerts you through EventBridge (which you can then automate remediation)
What is AWS Inspector?
A security assessment service that inspects for vulnerabilities and best practices
What are the 2 types of scanning AWS Inspector does? How do they differ?
What is KMS? What are CMK?
KMS is a service that lets you manage and create encryption keys.
CMK are customer master keys, the actual encryption key itself.
What is CloudHSM?
A dedicated hardware security module in the cloud that generates your CMK
What are 3 ways to generate a CMK?
What are 3 ways to control access to CMKs?
What are 3 ways to control access to CMKs?