What is the AWS Shared Responsibility Model?
AWS is responsible for Security OF the Cloud (physical infrastructure, hardware, networking, hypervisor, global infrastructure). The customer is responsible for Security IN the Cloud (data, OS, application, IAM, firewall config, encryption).
What is AWS responsible for in the Shared Responsibility Model?
Physical security of data centres, hardware and software infrastructure, networking infrastructure, virtualisation infrastructure, global infrastructure (Regions, AZs, Edge Locations), and managed service operations (e.g. RDS OS/DB patching).
What is the customer responsible for in the Shared Responsibility Model?
Customer data, platform/applications/IAM, OS/network/firewall configuration, client-side data encryption, server-side encryption, network traffic protection, security groups and NACLs.
In the Shared Responsibility Model, who patches an EC2 OS?
The customer. EC2 is IaaS – AWS manages the physical host and hypervisor only.
In the Shared Responsibility Model, who patches an RDS DB engine?
AWS. RDS is a managed (PaaS) service – AWS handles OS and database engine patching.
In the Shared Responsibility Model, who manages S3 bucket policies and encryption?
The customer. AWS manages the S3 infrastructure and durability; the customer manages bucket policies, encryption settings, and access control.
What is the key rule of the Shared Responsibility Model?
‘If you put it there, you manage it.’ Managed services offload more responsibility to AWS; unmanaged services (like EC2) leave more responsibility with the customer.
What is AWS Artifact?
A free self-service portal for on-demand access to AWS compliance reports (SOC, PCI certificates, ISO certifications) and legal agreements like the Business Associate Agreement (BAA) for HIPAA.
What compliance frameworks does AWS support?
HIPAA (healthcare), PCI-DSS (payment cards), SOC 1/2/3 (financial/operational audits), ISO 27001 (information security), FedRAMP (US government), GDPR (EU data protection).
What is the AWS Compliance Center?
A central location to research cloud-related regulatory requirements, browse country-specific laws, discover how companies solve compliance challenges, and get audit/security checklists.
What is AWS Audit Manager?
Continuously collects data to prepare for audits and ensure compliance with regulatory standards. Tracks how resources are configured and records previous configuration states.
What are the key security concepts: encryption at rest, encryption in transit, MFA?
Encryption at rest: data encrypted when stored (S3, EBS, RDS all support this). | Encryption in transit: data encrypted while moving (TLS/SSL). | MFA: requires an extra security code from a device/app at login.
What is ‘Defence in depth’?
Applying multiple layers of security controls so that if one layer fails, others still protect the system.
What is IAM and what does it cost?
Identity and Access Management – controls WHO can do WHAT in your AWS account. It is free to use.
What are the 4 core IAM components?
Users – individual accounts for people or applications. | Groups – collections of users that inherit group permissions. | Roles – temporary permissions assumed by trusted entities (no permanent credentials). | Policies – JSON documents defining Allow/Deny permissions on resources.
What is an IAM User?
An individual AWS account for a person or application. Has credentials: username/password for console, or Access Key ID + Secret Access Key for CLI/SDK. New users have no permissions by default.
What is an IAM Group?
A collection of IAM users. Attach policies to the group and all users in the group inherit those permissions. Example groups: Developers, Admins, Auditors.
What is an IAM Role?
An IAM identity with specific permissions that can be assumed temporarily by trusted entities (EC2 instances, Lambda functions, cross-account users, federated users). Uses short-term tokens – no permanent credentials.
What is an IAM Policy?
A JSON document that defines Allow or Deny permissions for specific actions on specific AWS resources. Attached to users, groups, or roles.
What is the structure of an IAM Policy JSON?
Version, Statement array containing: Effect (Allow/Deny), Action (e.g. s3:GetObject), Resource (e.g. arn:aws:s3:::my-bucket/*).
What are the 3 types of IAM policies?
List the 8 IAM best practices.
What is the Principle of Least Privilege?
Grant identities only the minimum permissions required to perform their job – nothing extra.
What is AWS Organizations?
A service for centrally managing multiple AWS accounts. Provides consolidated billing, Organizational Units (OUs) for grouping accounts, and Service Control Policies (SCPs) for guardrails.