Security and Compliance

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:02 PM on 2/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

115 Terms

1
New cards

What problem does the Shared Responsibility Model solve?


Clarifies which security responsibilities belong to AWS vs the customer.

2
New cards

What does “security of the cloud” mean?

AWS responsibility for physical data centers, hardware, networking, and infrastructure.

3
New cards

What does “security in the cloud” mean?

Customer responsibility for data, IAM, configurations, and access control.

4
New cards

Is data encryption a customer or AWS responsibility?

Customer responsibility (security in the cloud).

5
New cards

Who is responsible for S3 bucket permissions?

The customer.

6
New cards

What problem does IAM solve?

Controls who can access AWS services and what actions they can perform.

7
New cards

What is an IAM user?

A long-term identity for a person.

8
New cards

What is an IAM role?

A temporary set of permissions assumed by users or services.

9
New cards

Why are roles preferred for applications?

They provide temporary access without storing credentials.

10
New cards

What is an IAM policy?

A JSON document defining allowed or denied actions on resources.

11
New cards

Do IAM policies do anything by themselves?

No. They must be attached to users, groups, or roles.

12
New cards

What does least privilege mean?

Grant only the minimum permissions required to perform a task.

13
New cards

What problem does least privilege reduce?

Blast radius from mistakes or compromised credentials.

14
New cards

What problem does MFA solve?

Protects against stolen or compromised passwords.

15
New cards

Does MFA control what actions are allowed?

No. It only verifies identity.

16
New cards

Which AWS identity should always have MFA enabled?

The root account.

17
New cards

Why is admin access dangerous even with MFA?

MFA authenticates identity but does not limit permissions.

18
New cards

What problem does AWS WAF solve?

Protects web applications from malicious HTTP/HTTPS requests.

19
New cards

What layer does WAF operate at?

Application layer.

20
New cards

What problem does AWS Shield solve?

DDoS attacks and traffic floods.

21
New cards

What does Shield protect primarily?

Availability.

22
New cards

What problem does GuardDuty solve?

Detects suspicious or malicious behavior in an AWS account.

23
New cards

Does GuardDuty block attacks?

No. It detects only.

24
New cards

What data does GuardDuty analyze?

CloudTrail logs, VPC Flow Logs, and DNS logs.

25
New cards

What problem does Amazon Inspector solve?

Finds vulnerabilities and security exposures in workloads.

26
New cards

Is Inspector real-time threat detection?

No. It scans for known vulnerabilities.

27
New cards

What problem does AWS CloudTrail solve?

Records who did what, when, and from where in an AWS account.

28
New cards

What does CloudTrail log?

AWS API calls made by users, roles, or services.

29
New cards

Does CloudTrail prevent malicious actions?

No. It only records actions.

30
New cards

What problem does AWS Config solve?

Tracks resource configurations and configuration changes over time.

31
New cards

Does AWS Config show who made a change?

No. It shows what changed, not who.

32
New cards

Which service helps with compliance and configuration drift?

AWS Config.

33
New cards

What problem does AWS Organizations solve?

Central management of multiple AWS accounts.

34
New cards

What are Organizational Units (OUs)?

Groups of AWS accounts within an organization.

35
New cards

What problem do SCPs solve?

Enforce maximum allowed actions across accounts.

36
New cards

Do SCPs grant permissions?

No. They only restrict.

37
New cards

Can SCPs override IAM permissions?

Yes. Deny always wins.

38
New cards

What problem does AWS Artifact solve?

Provides access to AWS compliance reports and legal agreements.

39
New cards

Does AWS Artifact configure security controls?

No.

40
New cards

Does AWS Artifact make a customer compliant?

No.

41
New cards

What types of documents are found in AWS Artifact?

Audit reports, certifications, compliance documents, agreements.

42
New cards

If the question mentions “web requests” or “HTTP attacks,” which service applies?

AWS WAF.

43
New cards

If the question mentions “traffic flood” or “availability under attack”?

AWS Shield.

44
New cards

If the question mentions “unusual API activity”?

Amazon GuardDuty.

45
New cards

If customer data is leaked due to misconfigured permissions, who is responsible?

The customer, because it’s security in the cloud.

46
New cards

Does AWS automatically encrypt customer data by default?

No. Customers are responsible for enabling and managing encryption.

47
New cards

If a service is fully managed (SaaS), does customer responsibility disappear?

No. Customers still manage data, access, and compliance.

48
New cards

If an AWS service needs access to another service, what should be used?

An IAM role, not an IAM user.

49
New cards

What always takes precedence in IAM evaluation?

Explicit deny.

50
New cards

Why are IAM groups preferred over assigning policies directly to users?

Easier permission management and reduced risk of errors.

51
New cards

Does MFA reduce blast radius if permissions are excessive?

No. Only least privilege reduces blast radius.

52
New cards

What problem does MFA not solve?

Over-permissioning.

53
New cards

Which service blocks web attacks before they reach the application?

AWS WAF.

54
New cards

Which service protects against traffic floods but not application logic attacks?

AWS Shield.

55
New cards

Which service detects suspicious behavior but does not block it?

Amazon GuardDuty.

56
New cards

If an admin is blocked from performing an action even though IAM allows it, what caused this?

A Service Control Policy (SCP).

57
New cards

If an auditor asks for proof AWS meets compliance standards, which service is used?

AWS Artifact.

58
New cards

What problem does AWS KMS solve?

Centralized creation and management of encryption keys used to encrypt data across AWS services.

59
New cards

What is “encryption at rest” in AWS?

Encrypting stored data on disks or storage services such as EBS, S3, or RDS using keys managed by KMS or the service.

60
New cards

What is “encryption in transit” in AWS?

Protecting data as it moves over networks using protocols like TLS/HTTPS between clients and AWS services.

61
New cards

Who is responsible for deciding when to encrypt data in AWS?

The customer, as part of security in the cloud and their compliance requirements.

62
New cards

What is a customer managed CMK in KMS?

A key that the customer creates, configures, rotates, and deletes, giving them more control than AWS‑managed keys.

63
New cards

What does AWS‑managed key (aws/service key) mean?

A key automatically created and managed by AWS on your behalf for a specific service.

64
New cards

What problem do security groups solve?

They act as stateful virtual firewalls at the instance level to control inbound and outbound traffic.

65
New cards

What problem do network ACLs (NACLs) solve?

They provide stateless, rule‑based control of traffic at the subnet level.

66
New cards

Are security groups stateful or stateless?

Stateful; return traffic is automatically allowed.

67
New cards

Are NACLs stateful or stateless?

Stateless; you must explicitly allow traffic in both directions.

68
New cards

If the exam mentions controlling traffic at the subnet boundary, which construct is likely correct?

A network ACL.

69
New cards

What is the difference between an AWS‑managed and a customer‑managed policy?

AWS‑managed policies are created and maintained by AWS, while customer‑managed policies are created and maintained by the customer for fine‑grained control.

70
New cards

What is an inline IAM policy?

A policy embedded directly into a single user, group, or role instead of being reusable.

71
New cards

What problem do IAM password policies solve?

They enforce minimum password complexity and rotation requirements for IAM users.

72
New cards

What are access keys used for?

Programmatic access to AWS via the CLI, SDKs, or APIs.

73
New cards

Name one task only the root user can perform.

Closing the AWS account or changing the AWS support plan.

74
New cards

Besides MFA, what is a best practice to protect the root user?

Do not use it for daily tasks; create an admin IAM user and lock away root credentials.

75
New cards

What problem does IAM Identity Center (AWS SSO) solve?

Centralized single sign‑on access to multiple AWS accounts and applications using existing identities.

76
New cards

What problem does AWS Security Hub solve?

Provides a central view of security findings and compliance status across AWS accounts and services.

77
New cards

Does Security Hub block attacks by itself?

No. It aggregates and prioritizes findings from other security tools.

78
New cards

What problem does Amazon Macie solve?

Automatically discovers and classifies sensitive data such as PII in Amazon S3.

79
New cards

What problem does Amazon Detective solve?

Helps investigate and visualize security events using data from GuardDuty, CloudTrail, and VPC Flow Logs.

80
New cards

What problem does AWS Firewall Manager solve?

Centrally manages and enforces firewall policies (WAF, Shield, VPC security) across multiple accounts.

81
New cards

What problem does AWS Trusted Advisor solve?

Provides best‑practice checks including security, cost, performance, and fault tolerance recommendations.

82
New cards

Which service provides security and compliance best‑practice checks such as open security groups?

AWS Trusted Advisor.

83
New cards

Which service provides a consolidated dashboard of findings from GuardDuty, Macie, Inspector, and Config?

AWS Security Hub.

84
New cards

What problem does Amazon CloudWatch Logs solve?

Collects and stores log files from applications and AWS services for monitoring and troubleshooting.

85
New cards

What problem does Amazon Detective solve after an alert from GuardDuty?

It enables deeper investigation into the root cause and context of the suspicious activity.

86
New cards

If you need a full security incident timeline combining GuardDuty, CloudTrail, and VPC logs, which service helps?

Amazon Detective.

87
New cards

What problem does AWS Control Tower solve?

Sets up and governs a secure multi‑account AWS environment with built‑in guardrails.

88
New cards

What are Control Tower guardrails?

Preconfigured policies that enforce security, compliance, and operational best practices across accounts.

89
New cards

How do Control Tower and Organizations relate?

Control Tower builds on AWS Organizations to create and manage a governed multi‑account landing zone.

90
New cards

What problem does AWS Audit Manager solve?

Automates the collection of evidence for audits to help demonstrate compliance.

91
New cards

How does Audit Manager differ from Artifact?

Artifact provides AWS’s own compliance reports, while Audit Manager helps customers collect evidence for their own audits.

92
New cards

Name examples of compliance standards AWS supports with documentation in Artifact.

ISO 27001, SOC 1/2/3, PCI DSS, HIPAA, FedRAMP, and GDPR‑related materials.

93
New cards

Where can you find best‑practice security guidance from AWS experts?

The AWS Security Blog and AWS Security Center.

94
New cards

If a question mentions “sensitive data discovery in S3” or “PII detection,” which service is it pointing to?

Amazon Macie.

95
New cards

If a question mentions “central security findings from multiple services,” which service fits best?

AWS Security Hub.

96
New cards

If a question mentions “investigate GuardDuty findings in more detail,” which service is implied?

Amazon Detective.

97
New cards

If a question mentions “central firewall and WAF policy across many accounts,” which service applies?

AWS Firewall Manager.

98
New cards

If a question mentions “automated evidence collection for audits,” which service applies?

AWS Audit Manager.

99
New cards

If a question mentions “best‑practice checks including public S3 buckets and open security groups,” which service applies?

AWS Trusted Advisor.

100
New cards

How does customer responsibility change between EC2 and RDS?

With EC2, customers manage OS, patches, and app security; with RDS, AWS manages the database software and OS, while customers manage data, users, and DB‑level security.