Which service provide single sign-on access for its employees on AWS Using its existing identity source
AWS IAM identify center (centralizes iam accross AWS account and application)
What is used to encrypt data in transit
SSL/TLS certificates
Which provide centralized way to create and manage encryption keys that protect its data on AWS
AWS KMS
Which is used to verify identity of user through credentials and which is used to grant users certain access rights and permissions they can perform in application
Authentication
Authorization
Is cloud security shared responsibility between customer n aws
Teue5
Who manage security of data,systems n application and controlling who has access to envt n resources and what data to store or run workload on AWS,which aws service to use
Custoenrs
Who operates ,managed and controls the components at all layers of information
AWS (SECURITY OF CLOUD:- like virtualization layer, hardware n global infrastructure which support data centre and support protection of AWS region,AZ AND EDGE LOCATION)
How to prevent SECURITY incidents or security managing identities and access to AWS services and resources
AWS identity and access management ( when u grant permission u should provide access only on need-tohave- basis which is called Principle of least privilege )
Who is the account owner and having permission to do anything inside AWS account
Root user( for protection use strong pwd n ena kr MFA)
Difference between iam role and group and policy
IAM role: is identity u can assume to gain temporary access to permissions
IAM gp: collection of iam users
IAm policy: json doc that allows or denies permissions to access AWS services n resources.e.g. U can allow access to all employees to access all Amazon S3 bucket or specific bucket
Which is used to allow users to access multiple applications,services or domain using single set of credentials
Federated identify management
Which provide secure way to manage ,rotate and retrieve db credentials,API keys and other secrets throughout their lifecycle
AWS secrets manager
_ used to provide centralized view of nodes across ur organization’s account and region and multi cloud n hybrid envt.
AWS system manager
Components of providing secure environment on AWS i.e. AWS security control
1..prevent unauthorised access
2.prevent network and application
3. Protecting data
4.detecting and responding to security incident
5. Additional security resources
Ways to protect AWS through Infrastructure
1.Security groups: operate at network level
2.Elastic load balancing (ELB): run at region level
3. AWS region: massively expensive
How to do AWS protection using services
2 .AWS Shield advanced: paid service that provide detailed attack diagnostics and ability to detect and mitigate sophisticated DDoS attack,
It also integrated with other services like Amazon cloudfront,route 53,ELB
How to protect data
Encryption and it’s 2 form:
Encryption at rest: data idle and not moving
Encryption at transit: data moving between location
Name 3 different method of AWS built in data protection
Which service used to monitor ur sensitive data at rest to make sure it’s safe, assess security posture HELPFUL for meeting compliance requirements,use ML
Amazon Macie
_ centralizes management of ur ssl/TLS certificates that provide data encryption in transit and use to protect various AWS services and ur connect3d onpremises resources
AWS certificate manager(ACM)
Which is used to improve security and compliance of application by running automated security assessments for Amazon EC2 instances, containers and lambda functions
Amazon Inspector (also check application for security vulnerabilities and deviation from security best practices)
Which provide intelligent threat detection across ur infrastructure and resources and identity threat by continuously monitoring streams of ur account metadata and network activity in ur envt.
Amazon GuardDuty
_ is used to identify root cause when threat is detected using interactive virtualization contained in unified AWS management console view
Amqzon detective