3
Security
User permissions and access
AWS IAM (Identity and Access Management)
You can create user within IAM
Bydefault it has no permissions
Admin has to explicitly give permission
Admin can give permissions to user using
IAM Policy
IAM Groups
- is collection of usersRoles
: has associated permissionsCan allow or deny
Assumed for temporary amounts of time
No username or password
It act as an idenity, access to temporary permissions
You can assign role to users, AWS resources, external identities, applications, other aws services
IAM roles are ideal for situations in which access to services or resources needs to be granted temporarily, instead of long-term.
When user switches role, all its previous permissions are revoked
AWS Organizations
Centralized management
Consolidated billing
Hierrachical groupings of accounts
AWS service and API actions access control
Service control policies (SCPs)
: which allows you to specify maximum permissions allowed on member account within an OU(organization unit)SCPs enable you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.
You are configuring service control policies (SCPs) in AWS Organizations. Which identities and resources can SCPs be applied to? (Select TWO.)
An individual member account
An organizational unit (OU)
AWS Artifact
is a service that provides on-demand access to AWS security and compliance reports and select online agreements.
AWS Artifact consists of two main sections: AWS Artifact Agreements and AWS Artifact Reports.
The Customer Compliance Center
contains resources to help you learn more about AWS compliance.
DDoS
UDP Flood
- sends lots of data on your server (Security Groups can block such request based on allowed protocol)Slowloris attack
- takes lot of time with each request (ELB - first w8s for complete request before sending to your server. ELB is at region level)AWS Shield with AWS WAF
: uses web application firewall, to filter incoming traffic from bad actors.is a web application firewall that lets you monitor network requests that come into your web applications.
Two level of protection: Standard(default and free) and Advanced(paid)
AWS Inspector
lets you know if u deviate from any security best practises
AWS GaurdDuty
Looks into AWS Cloudtrail event
VPC flow logs
DNS logs
is a service that provides intelligent threat detection for your AWS infrastructure and resources. It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment.
Advanced security
Security Hub
AWS Key Management Service (AWS KMS)
Enables you to perform encryption operations through the use of cryptographic keys. A cryptographic key is a random string of digits used for locking (encrypting) and unlocking (decrypting) data. You can use AWS KMS to create, manage, and use cryptographic keys. You can also control the use of keys across a wide range of services and in your applications.
Last updated