AWS CCP Module 9: Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

authentication

the process of verifying the identity of a user/entity through credentials like a username/password

2
New cards

authorization

the process of granting users certain access rights/permissions that determine which actions they can perform in a system/application

3
New cards

Q: After logging in to their online banking profile with their username and password, a customer attempts to transfer $10,000 from their savings to their checking account. The system checks if the customer has sufficient privileges to make transfers of this amount before proceeding.

Which type of system check is this an example of?

In this scenario, the system is checking if the customer has the right to transfer $10,000, which is an authorization control. The system verifies their privileges (what they are allowed to do).

4
New cards

AWS Shared Responsibility Model: security

cutomer: security IN the cloud

  • managing the security of data, systems, and applications

  • deciding which data and workloads to store/run in AWS

  • determining which AWS services to use

  • controlling who has access to environments and resources

AWS: security OF the cloud

  • seucring the foundational software that powers AWS services

  • the virtualization layer

  • the hardware and global infrastructure that supports the data center sfrom which services operate

5
New cards

Q: What is the responsibility of AWS under the AWS shared responsibility model?

AWS handles all aspects of physical security for data centers, including facility access controls, environmental safeguards, power redundancy, and surveillance systems.

6
New cards

Q: A healthcare company is preparing to deploy a web application on Amazon EC2 instances that will process sensitive patient data. The application will use Amazon RDS for database storage and Amazon S3 for file storage. The company's security team is discussing security responsibilities for the deployment.

What is the customer's security responsibility in this scenario?

Under the AWS shared responsibility model, customers are responsible for protecting their sensitive data stored in AWS services like Amazon S3 and Amazon RDS.

7
New cards

AWS security controls

  • prevent security incidents through proper permission and access management

  • protect networks, applications, and data

  • detect and respond to security incidents as they occur

8
New cards

AWS Identity and Access Management (IAM

a service to securely manage identities and access to AWS services and resources

  • by default, all actions are denied and permissions have to be explicitly granted

9
New cards

principle of least privelege

you should only give people and systems access to what they need and nothing else

10
New cards

AWS IAM identities and controls: root user

the account owner who has permissions to do anything inside the AWS account

  • all AWS accounts have a root

  • associate a password with this account and turn on MFA

11
New cards

AWS IAM identities and controls: IAM user

a person/application that interacts with AWS services/resources

  • consists of a name and credentials

  • recommended to create individual IAM users for each person who needs to access the AWS account

12
New cards

AWS IAM identities and controls: IAM group

a collection of IAM users who’ll inherit any positions assigned to the group

13
New cards

AWS IAM identities and controls: IAM role

an identity that can be assumed to gain temporary access to permissions

  • when assumed, all previous permissions from any previous roles are abandoned

14
New cards

AWS IAM identities and controls: IAM policy

a JSON document that allows/denies permissions to access AWS services and resources

  • can also define the level of access to resources

15
New cards

Q: With AWS Identity and Access Management (IAM) all actions are denied by default. When granting permissions, access should be provided only on a need-to-have basis.

What is this concept called?

The principle of least privilege dictates that people and systems should be given access only to what they need and nothing else.

16
New cards

Q: AWS Identity and Access Management (IAM) provides users, groups, roles, and policies so you can configure access based on your company’s specific operational and security needs.

Which of these is specifically designed to provide temporary access to permissions?

An IAM role is an identity someone can assume to gain temporary access to permissions. When someone assumes an IAM role, they abandon all previous permissions they had under a previous role and assume the permissions of the new role.

17
New cards

Q: A financial services company wants to give its accountants access to a particular Amazon S3 bucket.

Which of these IAM controls is used to define this access?

An IAM policy is a JSON document that allows or denies permission to access AWS services and resources. It can be added to IAM users, groups, and roles to define access to the particular S3 bucket.

18
New cards

Q: A large marketing firm has a standard set of permissions used to grant designers access to certain Amazon S3 buckets. The firm added a new S3 bucket that all designers need to access.

Which AWS Identity and Access Management (IAM) control can the firm use to assign permissions that will be inherited by all of its designers?

IAM groups are specifically designed for this scenario. They are used to assign permissions to multiple users at once.

19
New cards

Q: All AWS accounts are given an AWS account root user. The root user is the account owner and has full permissions to perform any actions.

What are some ways to protect this powerful account? (Select TWO.)

  • Delegate root user access to others.

  • Delete the root user after setting up AWS Identity and Access Management (IAM) users.

  • Associate a strong password with the account.

  • Turn on multi-factor authentication (MFA).

  • Create multiple root users for redundancy.

  • Associate a strong password with the account.

  • Turn on multi-factor authentication (MFA).

To protect the root user, it's recommended to associate a strong password with the account and turn on MFA. An AWS account can only have one root user. It cannot be deleted, and root user access should never be delegated to others.

20
New cards

AWS IAM Identity Center

centralizes identity and access management across AWS accounts and applications

  • organizations can use it to implement SSO

21
New cards

Q: A technology company is moving some of its resources to AWS. The company wants to provide single sign-on access for its employees on AWS using its existing identity source.

Which service can help the company accomplish this?

IAM Identity Center is specifically designed to help organizations implement single sign-on for AWS resources using their existing identity providers.

22
New cards

federated identity management

a system that allows users to access multiple applications, services, or domains using a single set of credentials

23
New cards

AWS Secrets Manager

a secure way to manage, rotate, and retrieve database credentials

24
New cards

secrets

confidential or private information intended to be known only to specific individuals or groups

25
New cards

Q: A software development team needs to centrally manage its database credentials and API keys on AWS.

Which of these services should the team choose?

Secrets Manager can provide the team with a secure way to manage, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

26
New cards

AWS Systems Manager

a service that provides a centralized view of nodes across your organization’s accounts and Regions and multi-cloud hybrid environments

27
New cards

node

a connection point in a network, system, or structure

28
New cards

Denial of service (DoS) attack

an attacker floods a web application with excessive network traffic so that legitimate customer requests are denief if the web application becomes overloaded and can no longer respond

29
New cards

Distributed denial of service (DDoS) attack

an attacker can use multiple infected computers (zombie bots) to unknowingly send excessive traffic to a web application

30
New cards

Q: In a denial of service (DoS) attack, an attacker floods a web application with excessive network traffic. Legitimate customer requests are denied if the web application becomes overloaded and can no longer respond.

How is a distributed denial of service (DDoS) attack different?

Unlike a regular DoS attack from a single source, DDoS attacks use networks of compromised computers to send traffic to the target.

31
New cards

AWS protection through infrastructure: security groups

security groups only allow in proper request traffic

  • operate at the AWS network level, so they can shrug off massive attacks using the entire AWS Region’s capacity

32
New cards

AWS protection through infrastructure: Elastic Load Balancing (ELB)

ELB handles traffic first before handing it off, so your frontend server isn’t overwhelmed

  • runs at the Region level

33
New cards

AWS protection through infrastructure: AWS Regions

the enormous capacity of Regions makes them extremely difficult to overwhelm, as it would be massively expensive to achieve

34
New cards

Q: An online boutique has recently suffered a series of targeted distributed denial of service (DDoS) attacks. The owner wants to enhance the security of the boutique's web application using AWS infrastructure.

Which components can the boutique use to protect the web application on AWS from DDoS attacks? (Select TWO.)

  • Auto scaling groups

  • Security groups

  • Compute instances

  • Public subnets

  • Elastic Load Balancing (ELB)

  • Security groups

  • Elastic Load Balancing (ELB)

Security groups make sure only traffic from authenticated users is allowed into the system, while an ELB distributes incoming traffic to prevent any single frontend server from being overwhelmed. Operating at the AWS network level, these components leverage the full capacity of the AWS Region to help absorb large-scale attacks.

35
New cards

AWS Shield Standard

a free service designed to automatically protect customers from DDoS attacks by using analysis techniques to detect and mitigate incoming malicious network traffic

36
New cards

AWS Shield Advanced

a paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks

  • integrates with other services, such as Amazon CloudFront, Amazon Route 53, and ELB

  • can be integrated with AWS WAF

37
New cards

Q: A small financial services company recently moved its online resources to AWS. The security team was concerned about protection from common, frequently occurring types of distributed denial of service (DDoS) attacks.

Which AWS service automatically protects customers at no cost from DDoS attacks?

Shield is a managed DDoS protection service that safeguards applications running on AWS from common, frequently occurring types of DDoS attacks at no cost.

38
New cards

AWS WAF

a web application firewall that monitors network requests that come into your web applications by checking the IP address against a web access control list (ACL)

  • denies access if it comes from a blocked IP address

39
New cards

data encryption

works like a lock-key mechanism, where:

  • an encryption key turns informatino into a randomized set of characters

  • a decryption key accesses the information only when it’s needed by the application

40
New cards

data encryption at rest

data is idle and not moving

ex: when it’s stored in a DB

41
New cards

data encryption in transit

data is moving between locations

ex: data is going to an application from a database

  • SSL/TLS certificates are used to establish encrypted network connections from 1 system to another

42
New cards

Q: Protecting sensitive customer data is a vital component of maintaining customer trust. This involves encrypting data at rest and in transit.

What is used to encrypt data in transit?

SSL and its successor, TLS, are protocols specifically designed to encrypt data as it moves between systems over networks.

43
New cards

AWS built-in data protection: Amazon S3

by default, all buckets have encryption configured and all uploaded objects are encrypted at rest

44
New cards

AWS built-in data protection: Amazon EBS

volumes and snapshots can be encrypted at rest

45
New cards

AWS built-in data protection: Amazon DynamoDB

server-side encryption at rest is enabled on all table data using encryption keys stored in AWS KMS

46
New cards

AWS Key Management Service (KMS)

create and manage cryptographic keys

47
New cards

cryptographic key

a random string of digits used for encryption an decryption of data

48
New cards

Q: A security team for a large ecommerce company needs a centralized way to create and manage the encryption keys that protect its data on AWS.

Which of these services is the BEST fit for this team?

AWS KMS is specifically designed to create and manage encryption keys.

49
New cards

Amazon Macie

a service used to monitor your sensitive data at rest to make sure it’s safe and to assess your security posture

  • uses machine learning and automation to discover sensitive data stored in S3

50
New cards

AWS Certificate Manager (ACM)

centralizes the management of your SSL/TSL certificates that provide data encryption in transit

51
New cards

Q: A tax preparation company needs to secure sensitive customer data moving from its database to its web application on AWS.

Which of these services can help them secure the data in transit?

ACM centralizes the management of SSL/TLS certificates that provide data encryption in transit.

52
New cards

Amazon Inspector

runs automated security assessments for Amazon EC2 instances, containers, and Lambda functions by checking applications for security vulnerabilities and deviation from security best practices

  • security findings and assessments can be found in the Inspector Console

53
New cards

Q: A security team for a large software development company needs to check multiple applications for security vulnerabilities and deviations from security best practices. The applications are running on Amazon EC2, AWS Lambda, and in containers.

Which AWS service should they choose for the security assessments?

Amazon Inspector is specifically designed for automated vulnerability assessments of applications hosted on AWS.

54
New cards

Amazon GuardDuty

identifies threats by continuously monitoring streams of your account metadata and network activity in your environment

  • uses known malicious IP addresses, anomaly detection, and machine learning to identify threats more accurately

55
New cards

Amazon Detective

investigate the root cause of a detected threat with interactive visualization

56
New cards

Q: A security team at a legal firm has detected a threat to their AWS environment. To investigate the root cause over time, they need interactive visualizations of security data.

Which AWS service is the BEST choice for this investigation?

Detective is specifically designed for interactive analysis and investigating security threats over time using visualizations. It's a suitable choice for the team's investigation.

57
New cards

AWS Security Hub

a service that brings multiple security services together in one place

  • automatically aggregates security findings and organizes them into actionable, meaningful groupings called insights

  • can accelerate time to resolution (TTR) with automated remediation

58
New cards

Q: A local government agency needs to prepare for an upcoming compliance audit. The agency needs to automatically aggregate security findings from multiple AWS services into one comprehensive view.

Which of these services should the agency choose?

Security Hub is specifically designed for the aggregation of security findings across multiple AWS services. It's a suitable choice for this use case.

59
New cards

AWS Marketplace

a digital catalog where you can purchase 3rd-party software and services that run on AWS

60
New cards

Q: Which credential components are required to gain programmatic access to an AWS account? (Select TWO.)

  • An access key ID

  • A primary key

  • A secret access key

  • A user ID

  • A secondary key

  • An access key ID

  • A secret access key