What is DDOS attack?
What Is CloudTrail?
AWS CloudTrail increases visibility into your user and resource activity by recording AWS Management Console actions and API calls.
What is logged in CloudTrail?
What CloudTrail Allows?
What is AWS Shield?
What Is Shield Advanced?
What Is AWS WAF?
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to Amazon CloudFront(Public Service) or an Application Load Balancer(Regional service).
AWS WAF also lets you control access to your content.
-
What are conditions in AWS WAF?
With Web ACLs you can define conditions by using characteristics
of web requests such as the following:
- IP addresses that requests originate from
- Country that requests originate from
- Values in request headers
- Presence of SQL code that is likely to be malicious (known as SQL injection)
- Presence of a script that is likely to be malicious (known as cross-site scripting)
- Strings that appear in requests — either specific strings or strings that match regular expression (regex) patterns
What Is Firewall Manager?
Firewall Manager is a security management service in a single pane
of glass. This allows you to centrally set up and manage firewall rules across multiple AWS accounts and applications in AWS Organizations.
What are the benefits of Firewall Manager?
What is GuardDuty?
GuardDuty is a threat detection service that uses machine learning to continuously monitor for malicious behavior. PROACTIVE
What are some GuardDuty features?
What is GuardDuty Pricing?
30 DAYS FREE! CHARGES BASED ON
- Quantity of CloudTrail events
- Volume of DNS and VPC Flow Logs data
What is Macie?
Macie uses machine learning and pattern-matching to discover sensitive data stored in S3.
What are Macie Alerts?
What Is Amazon Inspector?
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. REACTIVE
Amazon Inspector automatically assesses applications for vulnerabilities or deviations from best practices.
It’s used to perform vulnerability scans on both EC2 instances(and the instance OS) and VPCs(and containers).
What are Assessment Findings in Amazon Inspector?
After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity.
These findings can be reviewed directly or as part of detailed assessment reports that are available via the Amazon Inspector console or API.
What are 2 Types of Assessment in Amazon Inspector?
What Is KMS?
AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data.
What is CMK?
A customer master key (CMK) is a logical representation of a master key. The CMK includes metadata, such as the key ID, creation date, description, and key state.
The CMK also contains the key material used to encrypt and decrypt data.
You start using KMS by requesting the creation of a CMK. You control the lifecycle of the CMK as well as who can use or manage it.
***CMK keys now called KMS keys
What is HSM?
A hardware security module (HSM) is a physical computing device that
safeguards and manages digital keys and performs encryption and decryption functions.
An HSM contains one or more secure cryptoprocessor chips.
What are the 3 Ways to Generate a CMK?
What is Key Rotation?
What is the primary way to manage access to your
AWS KMS CMKs?
Key Policies
In AWS KMS, you must attach resource-based
policies to your customer master keys (CMKs).
These are called key policies.
All KMS CMKs have a key policy.