AWS Security Services Mastery
Table of Contents
- AWS Certified Security - Specialty (SCS-C02) Drill
- AWS Identity and Access Management (IAM) drill aws_scs_c02_security aws_security
- Amazon GuardDuty drill aws_scs_c02_security aws_security
- AWS Key Management Service (KMS) drill aws_scs_c02_security aws_security
- Amazon Inspector drill aws_scs_c02_security aws_security
- AWS WAF (Web Application Firewall) drill aws_scs_c02_security aws_security
- Amazon Macie drill aws_scs_c02_security aws_security
- AWS Shield drill aws_scs_c02_security aws_security
- AWS CloudHSM drill aws_scs_c02_security aws_security
- Amazon Cognito drill aws_scs_c02_security aws_security
- AWS Security Hub drill aws_scs_c02_security aws_security
AWS Certified Security - Specialty (SCS-C02) Drill
AWS Identity and Access Management (IAM) drill aws_scs_c02_security aws_security
What is the difference between an IAM role and an IAM user?
Answer
- IAM User: A permanent identity for a specific person or service
- IAM Role: A temporary set of permissions that can be assumed by users, applications, or AWS services
Roles are ideal for providing temporary access and don't have long-term credentials like passwords or access keys.
Amazon GuardDuty drill aws_scs_c02_security aws_security
How does Amazon GuardDuty help in protecting AWS environments?
Answer
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior. It uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes events across multiple AWS data sources, such as AWS CloudTrail, Amazon VPC Flow Logs, and DNS logs.
AWS Key Management Service (KMS) drill aws_scs_c02_security aws_security
Explain the concept of customer master keys (CMKs) in AWS KMS.
Answer
Customer Master Keys (CMKs) in AWS KMS are the primary resources in KMS. They are used to:
- Encrypt and decrypt data keys
- Generate data keys for use in client-side encryption
- Perform cryptographic operations directly
CMKs can be AWS-managed or customer-managed. Customer-managed CMKs offer more control over the key lifecycle and permissions.
Amazon Inspector drill aws_scs_c02_security aws_security
What types of assessments does Amazon Inspector perform?
Answer
Amazon Inspector performs two types of assessments:
- Network assessments: Evaluate network accessibility of EC2 instances and identify potential security issues in open ports.
- Host assessments: Evaluate the security state of EC2 instances by checking for vulnerabilities and deviations from best practices.
AWS WAF (Web Application Firewall) drill aws_scs_c02_security aws_security
How can you use AWS WAF to protect web applications?
Answer
AWS WAF helps protect web applications from common web exploits by:
- Defining customizable web security rules
- Controlling which traffic to allow or block
- Filtering specific request patterns, such as SQL injection or cross-site scripting
- Integrating with Amazon CloudFront, Application Load Balancer, or API Gateway
- Creating rules based on IP addresses, HTTP headers, body, or URI strings
Amazon Macie drill aws_scs_c02_security aws_security
What is the primary function of Amazon Macie?
Answer
Amazon Macie is a fully managed data security and data privacy service that:
- Uses machine learning and pattern matching to discover and protect sensitive data in AWS
- Automatically detects sensitive data such as personally identifiable information (PII) or intellectual property
- Provides dashboards and alerts for visibility into how this data is being accessed or moved
- Assists in meeting compliance requirements for protecting sensitive data
AWS Shield drill aws_scs_c02_security aws_security
Compare AWS Shield Standard and AWS Shield Advanced.
Answer
AWS Shield Standard:
- Automatically enabled for all AWS customers at no additional cost
- Protects against common, most frequently occurring network and transport layer DDoS attacks
AWS Shield Advanced:
- Paid service providing enhanced DDoS protection
- Offers more sophisticated protection against larger and more complex attacks
- Provides 24/7 access to AWS DDoS response team (DRT)
- Offers cost protection for scaling during DDoS attacks
AWS CloudHSM drill aws_scs_c02_security aws_security
What are the key features of AWS CloudHSM?
Answer
AWS CloudHSM (Hardware Security Module) provides:
- Dedicated hardware security modules in the AWS Cloud
- FIPS 140-2 Level 3 validated HSMs
- Full control over encryption keys and cryptographic operations
- Compliance with strict key management requirements
- Integration with applications using standard APIs (PKCS#11, Java JCE, Microsoft CNG)
Amazon Cognito drill aws_scs_c02_security aws_security
How does Amazon Cognito help in managing user authentication and authorization?
Answer
Amazon Cognito provides:
- User pools for sign-up, sign-in, and user profile management
- Identity pools for granting temporary AWS credentials to users
- Support for social identity providers and enterprise identity federation
- Multi-factor authentication (MFA)
- Customizable UI for authentication flows
- Integration with AWS services and custom backends
AWS Security Hub drill aws_scs_c02_security aws_security
What is the purpose of AWS Security Hub?
Answer
AWS Security Hub provides:
- A comprehensive view of security alerts and security posture across AWS accounts
- Aggregation, organization, and prioritization of security alerts from multiple AWS services and partner solutions
- Automated security checks based on AWS best practices and industry standards
- Consolidated view of compliance status
- Integration with other AWS services for automated remediation actions