Podcast
Questions and Answers
Why is it important to regularly rotate access keys in IAM?
Why is it important to regularly rotate access keys in IAM?
To reduce the risk of compromised credentials being used for malicious purposes.
Besides using bucket policies, what other IAM feature can be used for access control in S3?
Besides using bucket policies, what other IAM feature can be used for access control in S3?
IAM roles
Explain the difference between Security Groups and NACLs in a VPC environment.
Explain the difference between Security Groups and NACLs in a VPC environment.
Security Groups are stateful and act as a virtual firewall for instances, while NACLs are stateless and act as a firewall for subnets.
What is the primary purpose of enabling VPC Flow Logs?
What is the primary purpose of enabling VPC Flow Logs?
What benefit does CloudTrail provide in terms of security and compliance?
What benefit does CloudTrail provide in terms of security and compliance?
What is the advantage of using KMS for encryption over SSE-S3?
What is the advantage of using KMS for encryption over SSE-S3?
What is the purpose of AWS GuardDuty?
What is the purpose of AWS GuardDuty?
What kind of information does AWS Config track?
What kind of information does AWS Config track?
In the provided IAM policy example, what action is being allowed?
In the provided IAM policy example, what action is being allowed?
If you want to enable notifications based on specific metrics, what service would you configure alarms with?
If you want to enable notifications based on specific metrics, what service would you configure alarms with?
Why is it recommended to prefer IAM roles over IAM Users?
Why is it recommended to prefer IAM roles over IAM Users?
What does the principle of 'least privilege' mean in the context of IAM permissions?
What does the principle of 'least privilege' mean in the context of IAM permissions?
What does MFA add to credentials?
What does MFA add to credentials?
Besides restricting port access, give another reason to use security groups?
Besides restricting port access, give another reason to use security groups?
Why is assigning a public IP to an EC2 instance not recommended?
Why is assigning a public IP to an EC2 instance not recommended?
How do you ensure that an EC2 instance can access other AWS services securely?
How do you ensure that an EC2 instance can access other AWS services securely?
What is the primary difference between a public and a private subnet?
What is the primary difference between a public and a private subnet?
Besides Security Hub and GuardDuty, what tool helps scan for EC2 vulnerabilities?
Besides Security Hub and GuardDuty, what tool helps scan for EC2 vulnerabilities?
What are two places to store secrets?
What are two places to store secrets?
What does SSE-KMS mean?
What does SSE-KMS mean?
Flashcards
What is IAM?
What is IAM?
A web service that helps you securely control access to AWS resources.
What is the principle of least privilege?
What is the principle of least privilege?
Grant only the permissions necessary to perform a task.
What is MFA?
What is MFA?
An authentication method that requires more than one verification factor.
What is S3?
What is S3?
Signup and view all the flashcards
How to secure S3?
How to secure S3?
Signup and view all the flashcards
What is EC2?
What is EC2?
Signup and view all the flashcards
What are Security Groups?
What are Security Groups?
Signup and view all the flashcards
Should you Assign public IPs?
Should you Assign public IPs?
Signup and view all the flashcards
What is a VPC?
What is a VPC?
Signup and view all the flashcards
What is a public subnet?
What is a public subnet?
Signup and view all the flashcards
What is a private subnet?
What is a private subnet?
Signup and view all the flashcards
What are Security Groups?
What are Security Groups?
Signup and view all the flashcards
What are NACLs?
What are NACLs?
Signup and view all the flashcards
What are VPC Flow Logs?
What are VPC Flow Logs?
Signup and view all the flashcards
What is CloudTrail?
What is CloudTrail?
Signup and view all the flashcards
What is CloudWatch?
What is CloudWatch?
Signup and view all the flashcards
What is AWS KMS?
What is AWS KMS?
Signup and view all the flashcards
What is GuardDuty?
What is GuardDuty?
Signup and view all the flashcards
What is Security Hub?
What is Security Hub?
Signup and view all the flashcards
Why Rotate Access Keys?
Why Rotate Access Keys?
Signup and view all the flashcards
Study Notes
Identity & Access Management (IAM)
- IAM roles are preferable
- Apply least privilege by only giving necessary permissions
- Multi-Factor Authentication (MFA) should be enabled
- Access keys need to be rotated regularly
- To access IAM Roles/Users/Policies: AWS Console -> IAM -> Roles/Users/Policies
- To enable MFA: Users -> Security Credentials
S3 Security
- Public access should be blocked by default
- Bucket policies and IAM should be used for permissions
- Encryption should be enabled (SSE-S3, SSE-KMS)
- Monitor with CloudTrail and AWS Config
- Configure and setup Block Public Access through: AWS Console -> S3 -> Select bucket -> Permissions
- Encryption is enabled under Properties
EC2 Basics
- Security Groups should be used to restrict port access
- Public IPs should not be assigned to instances
- IAM roles should be attached to EC2 for service access
- The CloudWatch Agent should be enabled for monitoring
- Security Groups are configured under Networking: AWS Console -> EC2 -> Instances
- Public IPs should not be enabled in Launch Wizard
- IAM roles can be attached: Actions -> Security -> Modify IAM Role
VPC & Network
- Public subnets should be connected to an Internet Gateway
- Private subnets should have no direct internet access
- Security Groups (stateful) and NACLS (stateless) should be used
- VPC Flow Logs should be enabled
- Subnets, Internet Gateways and Route Tables are checked via the VPC Dashboard: AWS Console -> VPC Dashboard
- Security Groups and NACLs should be configured
- VPC Flow Logs are enabled: Your VPC -> Flow Logs
Logs & Monitoring
- CloudTrail should be enabled in all regions
- CloudWatch Logs should be used for application logging
- CloudWatch Alarms should be set up for alerts
- To create CloudTrail: Search -> CloudTrail -> Create trail -> Enable in all regions
- CloudWatch Logs can be accessed: CloudWatch -> Logs
- Alarms are configured: CloudWatch -> Alarms
Encryption & Secrets
- AWS KMS should be used for encryption
- S3, EBS, RDS, and logs should be encrypted
- Secrets should be stored in Secrets Manager or SSM Parameter Store
- Manage encryption keys with KMS
- Secrets can be configured via Secrets Manager or SSM Parameter Store
Security Tools
- Security Hub provides a security findings dashboard
- GuardDuty is for threat detection
- AWS Config is for configuration tracking
- Inspector is for EC2 vulnerability scanning
- Use Security Hub, GuardDuty, Inspector, and AWS Config for security services
Quick Wins
- Public access to S3 buckets should be blocked
- Security groups should be tightened by limiting ports
IAM Policy Example
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::my-bucket/*"
}
]
}
Essential AWS Services
- Essential services include: IAM, S3, EC2, VPC, CloudTrail, CloudWatch, GuardDuty, AWS Config
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.