SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Level 1 of Security

Questions and Answers List

level questions: Level 1 of Security

QuestionAnswer
AWS Web Application FirewallProtect your web applications from common exploits
AWS Web Application Firewall propertiesProtects against: SQL Injection Cross site scripting
AWS Shieldmanaged DDos protection service network flow monitoring
Amazon Maciediscovers and protects sensitive data in S3
PIIPersonally Identifiable Information
AWS Shield - services it protectsCloudFront Route 53 Elastic Load Balancing AWS Global Accelerator
AWS ConfigIdentify changes to your resources over time Assess, audit, and evaluate configurations of your resources hybrid
Amazon GuardDutyidentified malicious or unauthorised activities in your AWS account
Amazon Inspectordiscovers workloads and scans for software vulnerabilities and unintended network exposure
AWS Artifactcompliance reports
Amazon CognitoControl access to mobile and web applications
Amazon Inspector - services it can manageEC2 Lambda Elastic container registry
AWS Key Management Servicegenerate and store encryption keys AWS Manages
AWS CloudHSMgenerate encryption keys customer manages keys
HSMHardware Security Model
AWS Secrets Managermanage and retrieve secrets
Secrets manager - integrated servicesRDS Redshift DocumentDB
IAM Credential ReportLists all users in your account and the status of their credentials
IAM Best PracticesEnable MFA for privileged users Strong password policies Do not use root user for daily tasks Use roles for EC2 instances, not access keys
IAM PolicyJson format manage permissions users groups and roles
RoleDefines access permissions temporarily assumed by an IAM user
Principle of least privilegeminimum access required to get the job done
IAM Groupcollection of IAM users common access can be applied to all members firewall for EC2
IAM Entityrepresents a person or application needing access to your AWS resources
What can only an IAM root user do?Close your account Change email address Activate IAM billing and cost management console Enable MFA on an s3
AWS IAM Identity Centrecontrol access to your AWS services and resources
IAMIdentity and Access Management
IAM Policy Simulatortest and troubleshoot: identity policies IAM permissions SCPs resource policies
Network Access Control Listextra layer of security for VPC controls traffic at subnet level
AWS Shield Advancedenhanced protections 24/7 expert support
Federated Userlink users identity across multiple seperate identity management systems
AWS Security Hubautomated continuous security best practice checks agains your AWS resources