Compliance Frameworks
ISO PCI HIPAA FedRAMP NIST SAS70 SOC1 FISMA FIPS140-2
How to mitigate DDoS attacks?
Minimize the attack surface area - use ALB with WAFs Be ready to scale to absorb attacks - use auto scaling groups Safeguard exposed resources - Learn normal behaviour of your application
AWS Shield
AWS Shield Advanced
What services can you use to mitigate DDoS attacks?
How can you get a report of all of the users in your account who uses MFA?
Get credential reports on the IAM console.
Which service is used to grant users limited and temporary access to AWS resources.
User can come from three sources:
- Federation (typically done with Active Directory)
- Federation with Mobile Apps
- Cross Account Access
Security Token Service
Joining a list of users in one domain (such as IAM) with a list of users in another domain (such as AD, Facebook, etc), what does this define?
Federation
A service that allows you to take an identity from point A and join it (federate it) to point B, what does this define?
Identity Broker
Services like AD, Facebook, Google, etc., what does this define?
Identity Store
A user of a service like Facebook, etc., what does this define?
Identity
How does STS work?
4 Main services for Security & Logging
How can you control access to Log Files?
3 ways
How can you obtain alerts on Log File Creation and Misconfiguration?
How can you manage changes to AWS Resources and Log files?
Log changes to system components:
Controls exist to prevent modifications to logs:
What is WAF?
WAF Behaviors:
WAF provides more protection against web attacks using conditions that you specify, give some examples.
Which services does WAF Integrates with?
In an IAM policy, what action does IAM:PassRole allows?
The IAM:PassRole allows any affected entity to pass roles to AWS services or Accounts, granting them permission to assume the role.
Using AWS WAF, two types of rules can be set:
- Regular rules
- Rate-based rules
What is the difference between them two?
Regular rule:
- Allow or block a matching IP address
Rate-based rules:
- It considers the number of requests coming from a particular IP in a five minute interval, if those requests exceeds the threshold limit, WAF will block the IP address.
What is Hypervisor?
Hypervisor is the physical host that is going to run your virtual machines.
What is HVM?
Hardware Virtual Machine