Bash, the Crucial Exams Chat Bot
AI Bot

AWS Security and Identity Management Flashcards

How does IAM policy evaluation logic work
How do you implement resource based policies
What is a VPC security group
It checks for explicit deny then explicit allow and defaults to deny
AWS Key Management Service used to create manage and control encryption keys
A virtual firewall that controls inbound and outbound traffic at the instance level
What is an AWS Organizations service control policy
Create an IAM policy with a condition that requires MFA authentication
Attach policies directly to AWS resources like S3 buckets or SNS topics to control access
What is AWS KMS
It defines permission guardrails for AWS accounts within an organization
How can you enforce MFA for IAM users
FrontBack
Describe the principle of least privilege in AWS IAMGrant only the permissions required to perform a task
Explain the difference between an IAM role and an IAM userIAM user has credentials for long term access; IAM role provides temporary credentials assumed by services or users
How can you enforce MFA for IAM usersCreate an IAM policy with a condition that requires MFA authentication
How do NACLs differ from security groupsNACLs operate at the subnet level and are stateless; security groups are stateful at the instance level
How do you implement resource based policiesAttach policies directly to AWS resources like S3 buckets or SNS topics to control access
How do you secure data in transit in AWSUse TLS for all communications; enable VPC endpoints for secure AWS service traffic
How does AWS CloudHSM differ from AWS KMSCloudHSM provides dedicated hardware key storage; KMS is a managed key service that uses HSMs behind the scenes
How does AWS Shield protect resourcesProvides DDoS protection at network and application layers with automated detection and mitigation
How does IAM policy evaluation logic workIt checks for explicit deny then explicit allow and defaults to deny
What are AWS Security Hub best practicesEnable continuous compliance checks consolidate findings and automate remediations
What is a VPC security groupA virtual firewall that controls inbound and outbound traffic at the instance level
What is Amazon CognitoA user identity management service for web mobile and IoT apps; supports authentication authorization and user pools
What is an AWS Organizations service control policyIt defines permission guardrails for AWS accounts within an organization
What is an IAM managed policyA standalone policy created and administered by AWS or your account that can be attached to multiple identities
What is AWS KMSAWS Key Management Service used to create manage and control encryption keys
What is AWS Single Sign OnA cloud service to manage SSO access to multiple AWS accounts and business applications
What is AWS WAFA web application firewall that protects applications from common web exploits
What is envelope encryptionUse a data key to encrypt data then encrypt the data key with a master key
What is the purpose of AWS IAM Access AnalyzerIt analyzes resource policies to identify public or cross account access risks
What is the purpose of IAM policiesThey define permissions that allow or deny actions on AWS resources
Front
What is AWS WAF
Click the card to flip
Back
A web application firewall that protects applications from common web exploits
Front
What is Amazon Cognito
Back
A user identity management service for web mobile and IoT apps; supports authentication authorization and user pools
Front
How does IAM policy evaluation logic work
Back
It checks for explicit deny then explicit allow and defaults to deny
Front
What is the purpose of AWS IAM Access Analyzer
Back
It analyzes resource policies to identify public or cross account access risks
Front
What is envelope encryption
Back
Use a data key to encrypt data then encrypt the data key with a master key
Front
Explain the difference between an IAM role and an IAM user
Back
IAM user has credentials for long term access; IAM role provides temporary credentials assumed by services or users
Front
How does AWS Shield protect resources
Back
Provides DDoS protection at network and application layers with automated detection and mitigation
Front
Describe the principle of least privilege in AWS IAM
Back
Grant only the permissions required to perform a task
Front
What is a VPC security group
Back
A virtual firewall that controls inbound and outbound traffic at the instance level
Front
What are AWS Security Hub best practices
Back
Enable continuous compliance checks consolidate findings and automate remediations
Front
How can you enforce MFA for IAM users
Back
Create an IAM policy with a condition that requires MFA authentication
Front
How do you secure data in transit in AWS
Back
Use TLS for all communications; enable VPC endpoints for secure AWS service traffic
Front
How do you implement resource based policies
Back
Attach policies directly to AWS resources like S3 buckets or SNS topics to control access
Front
What is an IAM managed policy
Back
A standalone policy created and administered by AWS or your account that can be attached to multiple identities
Front
What is the purpose of IAM policies
Back
They define permissions that allow or deny actions on AWS resources
Front
How do NACLs differ from security groups
Back
NACLs operate at the subnet level and are stateless; security groups are stateful at the instance level
Front
What is AWS Single Sign On
Back
A cloud service to manage SSO access to multiple AWS accounts and business applications
Front
What is AWS KMS
Back
AWS Key Management Service used to create manage and control encryption keys
Front
What is an AWS Organizations service control policy
Back
It defines permission guardrails for AWS accounts within an organization
Front
How does AWS CloudHSM differ from AWS KMS
Back
CloudHSM provides dedicated hardware key storage; KMS is a managed key service that uses HSMs behind the scenes
1/20
Focuses on AWS security services and best practices, including IAM roles and policies, VPC security, encryption, compliance, and identity management strategies for securing AWS environments.
Share on...
Follow us on...