• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back

What is the AWS shared responsibility model?


  • AWS Provide the security
  • You are responsible for using it to protect the integrity/confidentiality of your customers data

What is an ISMS, and what is its significance?

Information Security Management System - this can be thought of as a domain where you own a part and AWS owns a part

Which 3 parts are WE broadly responsible for keeping secure across the AWS set of technology?

  • Operating systems (must patch)
  • Platforms
  • Data

Which types of services can have security applied?

  • Infrastructure services (E.g. EC2)
  • Container
  • Abstracted Services

In the example of EC2, what would AWS be responsible for keeping secure?

  • The facilities (data must be available since DoS is one kind of vulnerability)
  • Network Infrastructure
  • Virtualization Infrastructure
  • Physical security of the hardware itself

In the example of EC2, what 7 things would we be responsible for securing, or using to secure?

  • Data in transit
  • Data at rest
  • Data stores (i.e. the databases)
  • Credentials
  • Policies
  • O/S
  • AMIS

What is IAM?

The service to manage users/groups, credentials and permission policies

What are access keys used for?

Programmatic interaction with the API (via SDK or CLI)

What are infrastructure services defined as? Which level of technology must we keep secure?

  • Compute Services provided by AWS.
  • You control the AMI to instantiate the services, and the OS it will run on (by virtue of choosing the AMI)

What are containers services defined as? Which level of technology must we keep secure?

  • Services where you don't need to manage the OS as the service is running in a container provided by Amazon.
  • You do need to worry about network rules and identity management

What are abstracted services?

  • Technologies that don't even give you an option of where to run on, things like S3 and Dynamo DB.
  • You only have to care about securing access to these, not the network rules.

EC2 instances allow access via SSH when they you create one from an AMI - how is this different from access keys?

These are for access to the operating system of the EC2 instance, not to the AWS API

What security options do I have the option of when using infrastructure services to secure user data?



  • Client side encryption
  • Server side encryption

What security options do I have the option of when using infrastructure services to access a given set of resources?

  • Network traffic protection

With container services, AWS takes responsibility for the infrastructure AND the O/S. What must you set up?

  • Security Groups and firewall rules
  • Data protection by encryption

When it comes to abstracted services, there is very little left for us to configure. What options are we left with to secure these kinds of resources?

  • Data protection by encryption
  • IAM to stop unauthorised access to a resource

What is the Trusted Advisor tool?

A tool for analysing your security configuration for mistakes and optimisation opportunities

What would the AWS account be defined as?

The account that represents a relationship between you and AWS - where the billing gets done.

What are IAM users and their relationship to the AWS account? There are 2 parts to the answer.

  • The AWS account will create IAM users.
  • IAM users can be humans, AWS services, or applications

What is the best practice for creating users?

One IAM user per individual, i.e. no two people sharing an AWS identity.

What is the best practice for the permissions of a user?

  • Use permissions to grant only what a user needs to do (least privilege)
  • Place users in groups to avoid having to set them individually

What is a policy?

The mapping between a resource (e.g. EC2 instance, S3 bucket) and a set of permissions on that resource

How do IAM roles with temporary credentials work?

  • A locked down role is defined and configured
  • User/applications/services are allowed to assume this role ad-hoc
  • The *role* gives the caller temporary credentials.

How would an IAM role work with temp credentials allow an EC2 resource access to read from an S3 bucket?

  • Admin creates role with a policy on that bucket to allow reads
  • The role also has a policy that allows a developer to launch the role using an EC2 instance
  • Application running on the EC2 instance gets temp credentials from the role
  • Using these temp credentials, the S3 bucket is access by the application

How do IAM roles work to allow cross-account access?

You create a policy in your AWS account that allow access to a subset of your resources to another AWS Account

How do IAM roles work with federated access?

  • User goes to broker store
  • Broker authenticates user with corp identity store
  • Broker takes authenticated user and uses their identity to get a temp set of credentials from AWS STS
  • With the token they can then get a temp url to access the AWS API or Management console

What kind of policies are there to authorise access to a resource?

  • Resource polices - AWS user allows IAM users access to a specific resource
  • Capability policies - IAM Users are given capabilities - which may override resource based policies


Which 5 strategies are there for protecting data at rest and what are their use cases?

  • Permissions - only allow access to the right individuals
  • Versioning - allow roll-backs in case the data is corrupted.
  • Replication - Provide more availability if one instance goes down
  • Backup - Alternative to versioning and replication
  • Encryption - stop the data being seen.

Which strategies are there for protecting data in transit and what is their use case?

  • HTTPS
  • Offload SSL/HTTPS processing onto load balancers instead of the web servers themselves (computationally expensive so a performance hit)
  • Use TLS on database server traffic

What is VPC used for?

You can build private clouds within the AWS public cloud

If I want to ensure my VPC isn't reachable from the internet, how can I achieve this?

Use a private subnet. e.g a 172. or 10. space as per RFC 1918

If I want to allow internet connections to say EC2 instances, but not to the DB server behind it, how can I achieve this?

Create a VPC just for the EC2 instances, and then allocate an elastic IP address to those (TBC)

What is the concept of an security zones vs a traditional network segment ?

  • A security zone is a logical grouping (components with similar security levels are grouped)
  • A network segment is physical (components are assigned an address within an isolated subnet )

What 6 methods are there to control access to network segments?

  • Make networks isolated using a VPC
  • Use security groups to apply common policies to access of components within that group
  • Use Network Access Control lists to block at the IP level
  • Use host based firewalls
  • Use a threat protection layer
  • Apply access controls (e.g IAM and credentials)

What are ACLS and how do they work?

They are an additional layer of security for a network VPC. You modify this to tighten/relax access

What is a threat protection layer?

An extra level of servers between your apps and the ELB.