Awsquestionsflashcards 1682060019980
Awsquestionsflashcards 1682060019980
AMAZON WEB
SERVICES
ARCHITECT
ASSOCIATE
CERTIFICATION
How do you protect the
integrity of your
instances?
By Managing Failure
Automatically respond to
Multiple Availability Zones
Notifications
How are you protecting
your data at rest?
Available Encryption choices
How do changes /
How is it secure? Is it compliant?
updates occur?
How do I Control Access?
Controlling
Access to § Identity and Access (IAM)
Resources § Authentication and authorization
§ Use tags for authorization
§ Integrate your enterprise identity system using
SAML or AD for authentication
§ Use IAM Roles for authorization
How do I Access AWS
Audits?
Security § Third party audits provide a 360-degree
viewpoint
Compliance
§ PCI audit twice a year
Baseline
§ FedRAMP and ISO 27001 audits
§ Customers have access to these audit reports
and audit materials after signing a Non-
Disclosure agreement with AWS
What Logs are available?
Capturing Logs
Operating system
VPC flow logs S3 bucket logs
logs
Planning Access Control
Creating IAM Users
§ Password strength?
§ Reuse policy?
§ Password policy does not apply to Root user
Credential § Use Credential Reports to identify credentials
that should be rotated, or deleted
Rotation
§ IAM console displays when password was
last used
§ Rotate security credentials on a fixed
schedule
§ IAM roles for EC2 instances rotate credentials
automatically
§ For all IAM users
§ Hardware device
§ Account delegation
§ Federation
§ Assign IAM Roles to Amazon EC2 instances
IAM Roles § Access keys stored on EC2 instances
§ Automatic key rotation by AWS
§ Assigns least privilege to the application
§ Reduce or restrict the root account
Root Account § Remove the potential for misuse of
credentials
§ Designing shared services:
Managing § Account creation and IAM provisioning
Setup and § Federation endpoints
Change § Core networking security
§ Auditing services
§ Incident response
Planning Networks
Planning Your § How many VPCs?
§ What are your present and future needs?
Network
§ Public or Public / Private ?
Architecture
§ Private/HW VPN or Private/SW VPN ?
§ What external connection type is needed?
Planning CIDR § How many IP addresses are needed for
blocks public subnet?
§ How many IP addresses are needed for
private subnet?
§ Do we need connectivity with a external data
center?
§ Does your CIDR range overlap with your on-
premise data center?
§ Separate VPCs for production, staging, and
Isolation development?
§ Create one Amazon VPC with separate
subnets?
§ Create subnets for production, staging, and
development?
§ Deploy VPCs using CloudFormation?
§ Use a virtual appliance firewall you know
VPC Security § Add intrusion prevention virtual appliance to
your VPC
§ Encrypt Root and any additional EBS volumes
§ Use Flow Logs to monitor the VPC
environment
§ Install antivirus software on EC2 instances
hosted in VPC’s
§ Deploy security groups and NACLs
Check VPC § Understand hard and soft limits for your VPCs
§ Viewer reports
§ Locations
§ Browsers
§ Operating systems
Auditing and Monitoring
CloudTrail with CloudWatch