Security & Compliance Flashcards

(48 cards)

1
Q

What is the AWS Shared Responsibility Model?

A

AWS is responsible for Security OF the Cloud (physical infrastructure, hardware, networking, hypervisor, global infrastructure). The customer is responsible for Security IN the Cloud (data, OS, application, IAM, firewall config, encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AWS responsible for in the Shared Responsibility Model?

A

Physical security of data centres, hardware and software infrastructure, networking infrastructure, virtualisation infrastructure, global infrastructure (Regions, AZs, Edge Locations), and managed service operations (e.g. RDS OS/DB patching).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the customer responsible for in the Shared Responsibility Model?

A

Customer data, platform/applications/IAM, OS/network/firewall configuration, client-side data encryption, server-side encryption, network traffic protection, security groups and NACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Shared Responsibility Model, who patches an EC2 OS?

A

The customer. EC2 is IaaS – AWS manages the physical host and hypervisor only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Shared Responsibility Model, who patches an RDS DB engine?

A

AWS. RDS is a managed (PaaS) service – AWS handles OS and database engine patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the Shared Responsibility Model, who manages S3 bucket policies and encryption?

A

The customer. AWS manages the S3 infrastructure and durability; the customer manages bucket policies, encryption settings, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the key rule of the Shared Responsibility Model?

A

‘If you put it there, you manage it.’ Managed services offload more responsibility to AWS; unmanaged services (like EC2) leave more responsibility with the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AWS Artifact?

A

A free self-service portal for on-demand access to AWS compliance reports (SOC, PCI certificates, ISO certifications) and legal agreements like the Business Associate Agreement (BAA) for HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What compliance frameworks does AWS support?

A

HIPAA (healthcare), PCI-DSS (payment cards), SOC 1/2/3 (financial/operational audits), ISO 27001 (information security), FedRAMP (US government), GDPR (EU data protection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the AWS Compliance Center?

A

A central location to research cloud-related regulatory requirements, browse country-specific laws, discover how companies solve compliance challenges, and get audit/security checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is AWS Audit Manager?

A

Continuously collects data to prepare for audits and ensure compliance with regulatory standards. Tracks how resources are configured and records previous configuration states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key security concepts: encryption at rest, encryption in transit, MFA?

A

Encryption at rest: data encrypted when stored (S3, EBS, RDS all support this). | Encryption in transit: data encrypted while moving (TLS/SSL). | MFA: requires an extra security code from a device/app at login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ‘Defence in depth’?

A

Applying multiple layers of security controls so that if one layer fails, others still protect the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IAM and what does it cost?

A

Identity and Access Management – controls WHO can do WHAT in your AWS account. It is free to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 core IAM components?

A

Users – individual accounts for people or applications. | Groups – collections of users that inherit group permissions. | Roles – temporary permissions assumed by trusted entities (no permanent credentials). | Policies – JSON documents defining Allow/Deny permissions on resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an IAM User?

A

An individual AWS account for a person or application. Has credentials: username/password for console, or Access Key ID + Secret Access Key for CLI/SDK. New users have no permissions by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an IAM Group?

A

A collection of IAM users. Attach policies to the group and all users in the group inherit those permissions. Example groups: Developers, Admins, Auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an IAM Role?

A

An IAM identity with specific permissions that can be assumed temporarily by trusted entities (EC2 instances, Lambda functions, cross-account users, federated users). Uses short-term tokens – no permanent credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an IAM Policy?

A

A JSON document that defines Allow or Deny permissions for specific actions on specific AWS resources. Attached to users, groups, or roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the structure of an IAM Policy JSON?

A

Version, Statement array containing: Effect (Allow/Deny), Action (e.g. s3:GetObject), Resource (e.g. arn:aws:s3:::my-bucket/*).

21
Q

What are the 3 types of IAM policies?

A
  1. AWS Managed – pre-built by AWS (e.g. AdministratorAccess, ReadOnlyAccess) | 2. Customer Managed – custom policies you create | 3. Inline – embedded directly into a specific user, group, or role
22
Q

List the 8 IAM best practices.

A
  1. Lock down root account + enable MFA | 2. Create individual IAM users (not shared) | 3. Use groups to assign permissions | 4. Apply least privilege | 5. Enable MFA for all privileged users | 6. Use roles for applications/services | 7. Rotate credentials regularly | 8. Use IAM Access Analyzer to review permissions
23
Q

What is the Principle of Least Privilege?

A

Grant identities only the minimum permissions required to perform their job – nothing extra.

24
Q

What is AWS Organizations?

A

A service for centrally managing multiple AWS accounts. Provides consolidated billing, Organizational Units (OUs) for grouping accounts, and Service Control Policies (SCPs) for guardrails.

25
What is an Organizational Unit (OU) in AWS Organizations?
A logical grouping of AWS accounts within an Organisation (e.g. Dev, Prod, Finance OUs). SCPs and billing can be applied at the OU level.
26
What are Service Control Policies (SCPs)?
Permission guardrails applied at the root, OU, or account level in AWS Organizations. They restrict the maximum available permissions – they do NOT grant permissions. They do NOT affect the management account.
27
What are the benefits of AWS Organizations consolidated billing?
Single payment method for all accounts; volume discounts apply across the combined usage; Reserved Instances and Savings Plans can be shared org-wide.
28
What does Amazon GuardDuty do?
Intelligent threat detection using ML. Monitors CloudTrail logs, VPC Flow Logs, and DNS logs to identify threats like cryptocurrency mining, unusual API calls, and compromised instances.
29
What does Amazon Inspector do?
Automated security assessments of EC2 instances, container images in ECR, and Lambda functions. Continuously scans for software vulnerabilities and undesired network exposure. Produces findings when vulnerabilities are found.
30
What does AWS Macie do?
Uses ML to automatically discover, classify, and protect sensitive data (PII) stored in Amazon S3. Scans S3 buckets and produces findings for sensitive data.
31
What does AWS CloudTrail record?
All API calls (management events, data events, insights events) made in your AWS account – who did what, when, and from where. Logs stored in an S3 bucket. Event history available for last 90 days without a trail.
32
What are the 3 types of CloudTrail events?
Management Events: create/modify/delete operations on resources. | Data Events: object-level activity (S3 GetObject, Lambda Invoke). | Insights Events: detect unusual activity patterns.
33
What does AWS Config do?
Assesses, audits, and evaluates the configuration of AWS resources over time. Configuration history tracks changes. Rules evaluate compliance (e.g. 'all S3 buckets must have encryption'). Supports auto-remediation.
34
What is AWS Security Hub?
A central security findings aggregator and compliance dashboard. Ingests data from Config, GuardDuty, Inspector, Firewall Manager, etc. Performs validation against AWS security best practices.
35
What is Amazon Detective?
Analyses and investigates root causes of security findings. Ingests VPC Flow Logs, CloudTrail, and GuardDuty findings. Uses ML and statistical analysis to create visualisations showing resource behaviour over time.
36
What is AWS Shield?
DDoS protection. Shield Standard is free for all customers. Shield Advanced is paid and provides additional protection, 24/7 DDoS response team, and cost protection.
37
What is AWS WAF (Web Application Firewall)?
Monitors HTTP requests and protects web apps from common exploits like SQL injection and XSS. Uses web ACL rules defining what to monitor (IP, country, request size) and actions (Allow, Block, Count, CAPTCHA). Protects CloudFront, ALB, API Gateway, AppSync, Cognito.
38
What is AWS Network Firewall?
A stateful managed network firewall and intrusion detection/prevention service for VPCs. Monitors traffic going into and out of a VPC.
39
What is the difference between a Security Group and a Network ACL (NACL)?
Security Group: instance-level firewall, stateful (return traffic auto-allowed), allow rules only, all rules evaluated simultaneously. | NACL: subnet-level firewall, stateless (return traffic must be explicitly allowed), both allow and deny rules, rules evaluated in numbered order (lowest first).
40
What are VPC Flow Logs?
Capture information about IP traffic going to and from network interfaces in a VPC. Used for security analysis and troubleshooting.
41
What is AWS KMS?
Key Management Service – create and manage cryptographic keys used to encrypt/decrypt data. Provides granular access control and supports key rotation.
42
What is AWS Secrets Manager?
Stores, rotates, and retrieves secrets (passwords, API keys, DB credentials). Eliminates hard-coded credentials in code. Supports automatic rotation schedules. Having short-term secrets reduces compromise risk.
43
What is AWS Certificate Manager (ACM)?
Provisions, manages, and deploys public and private SSL/TLS certificates for AWS websites and applications. Can generate certificates for ELB and API Gateway without purchasing from a third party.
44
What is AWS IAM Identity Center (formerly SSO)?
Centrally manages single sign-on (SSO) access across multiple AWS accounts and applications. Simplifies managing users across an AWS Organization.
45
What is AWS CloudHSM?
Provides a hardware security module (HSM) in the cloud. All cryptographic keys are securely stored on the HSM and never leave the device. Helps minimise the risk of key leakage.
46
What is AWS Firewall Manager?
Manages security services (WAF rules, security groups, network firewall) across multiple AWS accounts. Configure rules once and apply them across all accounts in the organisation.
47
What is AWS Resource Access Manager?
Securely shares AWS resources across accounts, organisations, and OUs. Create a resource once and share it with other accounts without duplicating it.
48
What is AWS Private Certificate Authority?
A managed private CA that issues certificates for authenticating internal users, computers, and applications. Certificates are trusted only within your organisation, not on the public internet.