Security Flashcards

(26 cards)

1
Q

Which service provide single sign-on access for its employees on AWS Using its existing identity source

A

AWS IAM identify center (centralizes iam accross AWS account and application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used to encrypt data in transit

A

SSL/TLS certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which provide centralized way to create and manage encryption keys that protect its data on AWS

A

AWS KMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is used to verify identity of user through credentials and which is used to grant users certain access rights and permissions they can perform in application

A

Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is cloud security shared responsibility between customer n aws

A

Teue5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who manage security of data,systems n application and controlling who has access to envt n resources and what data to store or run workload on AWS,which aws service to use

A

Custoenrs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who operates ,managed and controls the components at all layers of information

A

AWS (SECURITY OF CLOUD:- like virtualization layer, hardware n global infrastructure which support data centre and support protection of AWS region,AZ AND EDGE LOCATION)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to prevent SECURITY incidents or security managing identities and access to AWS services and resources

A

AWS identity and access management ( when u grant permission u should provide access only on need-tohave- basis which is called Principle of least privilege )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is the account owner and having permission to do anything inside AWS account

A

Root user( for protection use strong pwd n ena kr MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between iam role and group and policy

A

IAM role: is identity u can assume to gain temporary access to permissions
IAM gp: collection of iam users
IAm policy: json doc that allows or denies permissions to access AWS services n resources.e.g. U can allow access to all employees to access all Amazon S3 bucket or specific bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is used to allow users to access multiple applications,services or domain using single set of credentials

A

Federated identify management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which provide secure way to manage ,rotate and retrieve db credentials,API keys and other secrets throughout their lifecycle

A

AWS secrets manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_ used to provide centralized view of nodes across ur organization’s account and region and multi cloud n hybrid envt.

A

AWS system manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Components of providing secure environment on AWS i.e. AWS security control

A

1..prevent unauthorised access
2.prevent network and application
3. Protecting data
4.detecting and responding to security incident
5. Additional security resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ways to protect AWS through Infrastructure

A

1.Security groups: operate at network level
2.Elastic load balancing (ELB): run at region level
3. AWS region: massively expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to do AWS protection using services

A
  1. AWS Shield:used to protect frequently occuring types of DDoS attack at no cost

2 .AWS Shield advanced: paid service that provide detailed attack diagnostics and ability to detect and mitigate sophisticated DDoS attack,
It also integrated with other services like Amazon cloudfront,route 53,ELB

  1. AWS WAF:protect ur network and application from blocked ip address defined by a web ACL
17
Q

How to protect data

A

Encryption and it’s 2 form:
Encryption at rest: data idle and not moving
Encryption at transit: data moving between location

18
Q

Name 3 different method of AWS built in data protection

A
  1. Amazon S3: all S3 buckets have encryption configured n all uploaded object are encrypted at rest
  2. Amazon EBS: ebs volume (root and data volume) and snapshot can encrypted at rest
  3. Amazon Dynamodb: server side encryption at rest is enabled on all Dynamodb table data using encryption keys stored in AWS KMS
19
Q

Which service used to monitor ur sensitive data at rest to make sure it’s safe, assess security posture HELPFUL for meeting compliance requirements,use ML

20
Q

_ centralizes management of ur ssl/TLS certificates that provide data encryption in transit and use to protect various AWS services and ur connect3d onpremises resources

A

AWS certificate manager(ACM)

21
Q

Which is used to improve security and compliance of application by running automated security assessments for Amazon EC2 instances, containers and lambda functions

A

Amazon Inspector (also check application for security vulnerabilities and deviation from security best practices)

22
Q

Which provide intelligent threat detection across ur infrastructure and resources and identity threat by continuously monitoring streams of ur account metadata and network activity in ur envt.

A

Amazon GuardDuty

23
Q

_ is used to identify root cause when threat is detected using interactive virtualization contained in unified AWS management console view

A

Amqzon detective

25
- is used to bring multiple security services into single place and format
AWS Security Hub(automatically aggregate security findings from AWS and partner service and organize them into actionable meaningful grouping called insights and can accelerate time to resolution(TTR) with automated remediation
26
Additional security resources
Security, identity and compliance service: refer to security, identity and compliance on AWS To find answer to question, troubleshooting issues : knowledge center To search through documentation by product category: AWS security documentation For expert insights ,best practices and update on security features : AWS Security Blog