Term
| What are the 6 tenants of the Security pillar in the Well-Architected Framework? |
|
Definition
1. IAM 2. Data stewardship 3. Network security 4. Application security 5. Compliance 6. Security management |
|
|
Term
| Responsible for security "in" the cloud |
|
Definition
|
|
Term
| Responsible for security "of" the cloud |
|
Definition
|
|
Term
| Identity and Access Management (IAM) |
|
Definition
| key service for identity and access management, and it allows you to assign granular permissions to users, user groups, and IAM roles which can be assigned to resources and applications |
|
|
Term
| Principle of least privilege |
|
Definition
| Only grant the permissions needed to complete a task |
|
|
Term
| MFA is part of IAM. What does it do? |
|
Definition
| It secures the root user and any other users. |
|
|
Term
|
Definition
| Give permissions to users; can be assigned to user groups instead of assigning permissions individually |
|
|
Term
|
Definition
| Identifies resources with external access, validates IAM Policies, and generates IAM Policies based on usage |
|
|
Term
|
Definition
| Tests new IAM policies before granting them to users, user groups, and roles |
|
|
Term
|
Definition
| AWS can use another identity source to grant permissions to human users by leveraging an organization's existing authentication directory, like Microsoft AD. |
|
|
Term
|
Definition
| AWS service used to connect your AWS ecosystem with an existing identity source that an organization uses that is not an AWS service (i.e., Microsoft AD) |
|
|
Term
|
Definition
| Allows AWS users to leverage SSO to temporarily assume a role each time they log in |
|
|
Term
|
Definition
| Using a third-party web identity provider to verify the identity of the user requesting access to AWS resources. Amazon Cognito is the AWS version |
|
|
Term
|
Definition
| Amazon's offering of a Web Federated Identity. Creates user pools and grants temporary keys to customers to give them access to your application by leveraging social or enterprise identity providers for authentication. Think: options of logging into an app with FaceBook, Gmail, etc. |
|
|
Term
| Security Token Service (STS) |
|
Definition
| Creates temporary permissions to a temporary role for the defined AWS account |
|
|
Term
| Systems Manager Parameter Store |
|
Definition
| Keeps encrypted secrets like login credentials or environment variables |
|
|
Term
|
Definition
| Adds another layer of security by allowing automatic rotation of your secrets (keys, passwords, etc.) |
|
|
Term
|
Definition
| Network access control lists |
|
|
Term
|
Definition
| Applied to VPCs and subnet layers; block all connections coming from inside or outside (stateless) without the proper security permissions |
|
|
Term
|
Definition
| applied to the subnet layer for security; stateful - meaning, the interaction is recalled by the system. if the connection comes from inside the subnet layer, the system will allow the response because it remembers the interaction. |
|
|
Term
|
Definition
| Inspects traffic coming into your VPC; protects your AWS network like VPCs and Subnets |
|
|
Term
| AWS WAF (web application firewall) |
|
Definition
| Protects your web apps from common exploits such as SQL injection, or cross-site scripting (i.e., it protects AWS end-points) |
|
|
Term
|
Definition
| Protects web application end-points against DDoS attacks that is included in AWS Free Tier. |
|
|
Term
|
Definition
| Provides additional protection and a 24/7 response team |
|
|
Term
|
Definition
| Manages AWS WAF, AWS Shield, and AWS Network Firewall all in one place |
|
|
Term
|
Definition
| A central place where findings across your AWS security services are sent |
|
|
Term
| How does Security Hub work? |
|
Definition
| By aggregating security findings from many security services all in one place conveniently for you to review and take action |
|
|
Term
| How do you enable AWS Security Hub? |
|
Definition
| Within the AWS console; Resource recording must be turned on with AWS Config first. Then you can select the services you'd like to run checks against. |
|
|
Term
| What are the four horsemen of AWS security event services? |
|
Definition
| AWS Trusted Advisor, Amazon Inspector, Amazon GuardDuty, and Amazon Detective |
|
|
Term
|
Definition
| Gives you best practice suggestions for all kinds of things: MFA, resources exposed, security, performance, operational excellence, cost optimization, etc. |
|
|
Term
|
Definition
| Collects activity logs from around AWS and uses ML to intelligently detect threats by analyzing logs such as CloudTrail |
|
|
Term
|
Definition
| Investigates security events that have already happened and understand the degree of damage done |
|
|
Term
|
Definition
| Continuously scans compute workloads for software vulnerabilities and network exposure, and alerts you if it finds any; detects workload vulnerabilities. |
|
|
Term
| What are 3 security resources for AWS (aka the security dojo)? |
|
Definition
- AWS Cloud Security landing page - AWS Security blog - updated innovation and announcements around cloud security - AWS Marketplace - find pre-built security solutions from 3rd party vendors; not all security solutions should be custom-built! |
|
|
Term
|
Definition
| Administers multiple AWS accounts from a single point, consolidating cost while organizing and limiting access to resources |
|
|
Term
| What is the relationship of an AWS Organization with the accounts within it? |
|
Definition
| Parent-child. Whatever permissions/rules are applied at the Organization level are inherited at the Account level |
|
|
Term
| Service Control Policies (SCPs) |
|
Definition
| Action across your organization. Think of SCPs as the "evil twin" of IAM - regardless of the permission given by IAM Policies, SCPs will negate that ability. SCPs can't be overridden by IAM Policies. |
|
|
Term
|
Definition
| Automates account creation and the application of best-practice Config rules and SCPs. Related to AWS Organizations and creating Organizations. |
|
|
Term
| Security Hub + Organizations = ??? |
|
Definition
| A centralized view of security alerts across multiple accounts |
|
|
Term
|
Definition
| Knowing what standards to implement and how to prove those standards are enforced to third parties |
|
|
Term
|
Definition
| A repository of compliance documents that you can download and provide to auditors, regulators, or to inform your cloud architecture |
|
|
Term
|
Definition
| Automate assessments against frameworks to meet common compliance standards |
|
|
Term
| Security Token Service (STS) |
|
Definition
| Enables you to request temporary credentials for users such as auditors |
|
|
Term
| What are some AWS services that are not in scope for compliance programs like FIPS 140-2 Level 3 and HIPAA? |
|
Definition
| KMS does not meet FIPS 140-2 Level 3 and HIPAA prevents the transfer of data over public internet, so you have to use Snowball Edge |
|
|
Term
| Whose responsibility does compliance ultimately fall under? |
|
Definition
|
|