AWS - IAM Quizlet
AWS - IAM Quizlet
IAM
Identity Access Management
What is IAM?
Enables you to securely control access to AWS services and resources for your
users. Create and manage AWS users and groups and use permissions to allow and
deny their access to AWS resources.
What are some basic features of IAM?
1. Grant unique security credentials to users and groups to specify which AWS
service APIs and resources they can access.
2. Granularity to control a user's access to specific AWS services and resources
using permissions.
3. Create roles and assign permissions to them, allowing authenticated users or EC2
instances assume them
4. Assign a range of security credentials including passwords, key pairs, X.509
certificates, and multi-factor authentication (MFA), Leverage external identity
systems (federation).
5. Seamlessly integrated into AWS services
What access to AWS resources do users have granted to them when they are
created?
None. They have no access to anything.
What is Identity Federation?
Linking a person's electronic identity and attributes, stored across multiple distinct
identity management systems (Single Sign-on). Federated users can be granted
secure access to resources in your AWS account without having to create IAM
users.
Where can Federated Users come from?
From a corporate identity provider (Microsoft Active Directory or the AWS Directory
Service) or from a web identity provider, such as Amazon Cognito, Login with
Amazon, Facebook, Google or any OpenID Connect (OIDC) compatible provider.
What is the process to authenticate with AD?
1. Navigate to Active Directory Federation Service (ADFS) webserver,
2. Enter single sign-on credentials,
3. Browser receives a SAML assertion from AD server,
4. Browser posts the SAML assertion to the AWS SAML endpoint. The
AssumeRoleWithSAML API request is used to request temporary security
credentials,
5. User is then able to access the AWS console.
True or False. Custom password rotation policies can be configured in IAM?
True
How does IAM work with regards to regions?
IAM is universal and shared across ALL regions.
True or False. You should NOT set up multi-factor authentication for the root
account.
False. http://aws.amazon.com/iam/details/mfa/
True or False. You can view access keys more than once.
False. A secret access key is accessible only at the time you create it. If a secret
access key is lost, you must delete the access key for the associated user and
create a new key.
What is the purpose of the root user account?
It is created the first time you sign into your AWS account. It has complete,
unrestricted access to all resources in your AWS account, including billing
information and the ability to change your password.
What is an IAM User account?
Create individual IAM users within your account that correspond to people or
accounts within your organization. These are not separate accounts; they are users
within your account. Each one has its own password and keys, but NO permissions
when first created.
What permissions does the Power User policy give?
Allows access to all AWS services except management of users and groups w/in
IAM.
What is an Access Key ID and what is it used for?
Access Key ID and Secret Access keys are used to authenticate with AWS CLI, the
AWS SDKs, or the APIs for individual AWS services.
What is an IAM Group?
An IAM group is a collection of IAM Users. Use groups to specify permissions for a
collection of users.
What is an IAM Role?
An identity with permission policies that determine what the identity can and cannot
do in AWS. No credentials (password or access keys). Intended to be assumable by
anyone who needs it (ex. federated users or applications)
What is an IAM Policy?
Policy is a (JSON) document that explicitly lists permissions. Specify Actions,
Resources, and Effects.
What objects can an IAM Policy be attached to?
1. IAM user,
2. Group,
3. Role,
4. Resource
What is Security Access Markup Language (SAML)
XML-based, open standard data format for exchanging authentication and
authorization data between parties, particularly between an identity provider and a
service provider.
Manage IAM users and their access: you can create users, assign users individual security
credentials, or request temporary security credentials to provide users access to AWS services
and resources. You can specify permissions to control which operations a user can perform.
Manage access for federated users: you can request security credentials with configurable
expirations for users who you manage in your corporate directory, allowing you to provide
your employees and applications secure access without creating an IAM user for them. You
can specify the permissions for these security credentials to control which operations a user
can perform.
What can an IAM user do?
A user can place requests to web services such as EC2 and S3. The AWS account holder can
permit a user to access any or all of the AWS services that have been integrated with IAM.
Any AWS resources created by a user are under control of and paid for by its AWS account.
A user cannot independently subscribe to AWS services or control resources.
How do IAM users call AWS services?
Users can make requests to AWS services using security credentials. Explicit permissions
govern a user's ability to call AWS services. By default, users have no ability to call service
APIs on behalf of the account.
How are IAM users managed?
IAM supports multiple methods to:
- Create, delete, and list IAM users
- Manage group membership
- Manage user security credentials
- Assign permissions
What is an IAM group?
A group is a collection of IAM users. Manage group membership as a simple list:
- Add users to or remove them from a group
- A user can belong to multiple groups
- Groups cannot belong to other groups
- Groups can be granted permissions using access control policies. This makes it easier to
manage permissions for a collection of users, rather than having to manage permissions for
each individual user
- Groups do not have security credentials, and cannot access web services directly; they exist
solely to make it easier to manage user permissions.
What kind of security credentials can IAM users have?
IAM users can have any combination of credentials that AWS supports, such as AWS access
key, X.509 certificate, SSH key, password for web logins, or an MFA device.
Can I enable and disable IAM user access?
Yes, you can enable and disable IAM user's access keys via the IAM APIs. If you disable the
access keys, the user cannot programmatically access AWS services.
Who is able to manage IAM users for an AWS account?
The AWS account holder can manage users, groups, security credentials, and permissions. In
addition, you may grant permissions to individual users to place calls to IAM APIs in order to
manage other users.
Can I structure IAM users in a hierarchical way, such as in LDAP?
Yes, you can organize users and groups under paths, similar to object paths in Amazon S3.
Can I define IAM users regionally?
Not initially. Users are global entries, like an AWS account is today. No region is required to
be specified when you define user permissions. Users can use AWS services in any
geographic region.
Can IAM users have individual EC2 SSH keys?
Not in the initial release. IAM does not affect EC2 SSH keys or Windows RDP certificates.
This means that although each user has separate credentials for accessing web service APIs,
they must share SSH keys that are common across the AWS account under which users have
been defined.
How are IAM user passwords set?
You can set the initial password for an IAM user. User passwords never appear in clear text
after the initial provisioning and are never displayed or returned via an API call.
Can I define a password policy for my IAM user's passwords?
Yes, you can enforce strong passwords by requiring minimum length or at least one number.
You can also enforce automatic password expiration, prevent re-use of old passwords, and
require a password reset upon the next AWS sign-in.
Can I set usage quotas on IAM users?
No, all limits are on the AWS account as a whole. You cannot limit what an individual user
can do (ex how many instances they can spin up).
What is an IAM role?
An IAM role is an IAM entity that defines a set of permissions for making AWS service
requests. IAM roles are not associated with a specific user or group. Instead, trusted entities
assume roles, such as IAM users, applications, or AWS services such as EC2.
What problems do IAM roles solve?
IAM roles allow you to delegate access with defined permissions to trusted entities without
having to share long-term access keys. You can use IAM roles to delegate access to IAM
users managed within you account, to IAM users under a different AWS account, or to an
AWS service such as EC2.
How do I assume an IAM role?
You assume an IAM role by calling the AWS Security Token Service (STS) AssumeRole
APIs (in other works, AssumeRole, AssumeRoleWithWebIdentity, and
AssumeRoleWithSAML). These APIs return a set of temporary security credentials that
applications can then use to sign requests to AWS service APIs.
How many IAM roles can I assume?
There is no limit to the number of IAM roles you can assume, but you can only act as one
IAM role when making requests to AWS services.
What is the difference between an IAM role and an IAM user?
An IAM user has permanent long-term credentials and is used to directly interact with AWS
services. An IAM role does not have any credentials and cannot make direct requests to AWS
services. IAM roles are meant to be assumed by authorized entities, such as IAM users,
applications, or an AWS service such as EC2.
When should I use an IAM user, IAM group, or IAM role?
IAM user: permanent, long-term credentials, used to directly act with AWS services
IAM group: management convenience to manage the same set of permissions for a set of
IAM users
IAM role: enable permissions to make AWS service requests
*Note: IAM roles can't make direct requests to AWS services, they are meant to be assumed
by authorized entities, such as IAM users, applications, or AWS services such as EC2.
Can I add an IAM role to an IAM group?
No, not at this time.
How many IAM roles can I create?
You are limited to 500 IAM roles under your account but you can request that limit to be
increased.
What is IAM roles for EC2 instances?
IAM roles for EC2 instances enables your application running on EC2 to make requests to
AWS services such as S3, SQS, and SNS without having to copy AWS access keys to every
instance.
What are the features of IAM roles for EC2 instances?
- AWS temporary security credentials to use when making requests from EC2 to AWS
services
- Automatic rotation of the AWS temporary security credentials
- Granular AWS service permissions for applications running on EC2
What problem does IAM roles for EC2 resolve?
They simply the management and deployment of AWS access keys to EC2 instances. Using
this feature, you associate an IAM role with an instance. Then you instance provides the
temporary security credentials to applications running on the instance, and the applications
can use these credentials to make requests securely.
Can I use the same IAM role on multiple EC2 instances?
Yes
Can I associate an IAM role with an already running EC2 instance?
Yes, you can assign a role to an EC2 instance that is already running.
Can I associate an IAM role with an Auto Scaling group?
Yes, you can add an IAM role as an additional parameter in an Auto Scaling launch
configuration and create an auto scaling group with that launch configuration.
Can I associate more than one IAM role with an EC2 instance?
No, you can only associate one IAM role with an EC2 instance and this limit of one role per
instance cannot be increased.
What happens if I delete an IAM role that is associated with a running EC2 instance?
Any application running on the instance that is using the role will be denied access
immediately.
Can I control with IAM roles an IAM user can associate with an EC2 instance?
Yes
Which permissions are required to launch EC2 instances with an IAM role?
- Permission to launch EC2 instances
- Permission to associate an IAM role with EC2 instances
Who can access the access keys on an EC2 instance?
Any local user on the instance can access the access keys associated with the IAM role.
How do I rotate the temporary security credentials on the EC2 instance?
The AWS temporary security credentials associated with an IAM role are automatically
rotated multiple times a day. New temporary security credentials are made available no later
than five minutes before the existing temporary security credentials expire.
Can I use IAM roles for EC2 instances with any instance type or AMI?
Yes. IAM roles for EC2 instances also with in VPC with spot and reserved instances.
What is a service-linked role?
A service-linked role is a type of role that links to an AWS service such that only the linked
service can assume that role. Using these roles, you can delegate permissions to AWS
services to create and manage AWS resources on your behalf.
Can I assume a service-linked role?
No. A service-linked role can be assumed only be the linked service. This is the reason why
the trust police of a service-linked role cannot be modified.
How can I delete a service-linked role?
You can delete a service-linked role from the linked service. Before you delete the role, the
linked service may require you to delete all the AWS resources that depend on the role. This
ensures that you do not inadvertently delete a role required for your AWS resources to
function properly.
How do IAM permissions work?
Access control policies are attached to users, groups, and roles to assign permissions to AWS
resources. By default, IAM users, groups, and roles have no permissions; users with
sufficient permissions must use a policy to grant the desired permissions.
What are managed policies?
Managed policies are IAM resources that express permissions using the IAM policy
language. You can create, edit, and manage separately from IAM users, groups, and roles to
which they are attached. After you attach a managed policy to multiple IAM users, groups, or
roles, you can update that policy in one place and the permissions automatically extend to all
attached entities. You can have both customer managed policies and AWS managed policies.
How do I assign commonly used permissions?
AWS provides a set of commonly used permissions that you can attach to users/groups/roles
in your account (AWS managed policies). You can also create your own policies (customer
managed policies).
How do group-based permissions work?
Use IAM groups to assign the same set of permissions to multiple IAM users. A user can also
have individual permissions assigned to them.
How are IAM policies evaluated in conjunction with S3, SqS, SNS, and KMS resource-based
policies?
IAM policies are evaluated together with the service's resource-based policies. When a policy
of any type grants access (without explicitly denying it), the action is allowed.
Can I use a managed policy as a resource-based policy?
No managed policies are only for IAM users, groups, and roles.
Can I grant permissions to access or change account-level information (ex. payment
instrument, contact email, billing history)
Yes, you can delegate the ability for an IAM user or a federated user to view AWS billing
data and modify AWS account information.
Who can create and manage access keys in an AWS account?
Only the AWS account owner can manage access keys for the root account. The account
owner and IAM users or roles that have been granted the necessary permissions can manage
access keys for IAM users.
Can I grant permissions to access AWS resources owned by another AWS account?
Yes. Using IAM roles, users and federated users can access resources in another AWS
account
What is the IAM policy simulator?
The IAM policy simulator is a tool to help you understand, test, and validate the effects of
your access control policies.
How does an IAM user sign-in?
An IAM user must sign in using their account's sign-in URL, which will direct them to a page
where they can enter their IAM username and password. The sign-in URL is located on the
dashboard of the IAM console and must be communicated to the user by the System
Administrator.
Do IAM users have to use the direct link?
IAM users must use the account-specific URL for first sign-in, Thereafter, the account-
specific URL is stored as a cookie in the user's browser. This allows a user to return to the
main AWS website and simply click Sign In to the Console.
Can IAM users sign in to other Amazon.com properties with their credentials?
No, the IAM user information only works at AWS
Can users SSH to EC2 instances using their AWS username and password?
No, user security credentials created with IAM are not supported for direct authentication to
customer EC2 instances. Managed EC2 SSH credentials is the customers responsibility
within the EC2 console.
What are temporary security credentials?
Temporary Security credentials consist of the AWS access key ID, secret access key, and
security token. Temporary security credentials are valid for a specific duration and for a
specific set of permissions. Temporary security credentials are sometimes simply referred to
as tokens. Tokens can be requested for IAM users or for federated users you manage in your
own corporate directory.
What are the benefits of temporary security credentials?
- Extending your internal user directories to enable federation to AWS. Enabling you to allow
your employees access to AWS without having to create an IAM user
- Request temporary security credentials for an unlimited number of federated users
- Configure the time period after which temporary security credentials expire
Can a temporary security credential be revoked prior to its expiration?
No but if you use an IAM user and not the root account for creating temporary security
credentials you can revoke permissions of the IAM user that issues the original call to request
it. This action almost immediately revokes privileges for all temporary security credentials
issues by that IAM user.
Can I reactivate or extend the expiration of temporary security credentials?
No. You should actively check the expiration and request a new token before the old one
expires. This rotation process is handled automatically with temporary security credentials
are used in roles for EC2 instances.
Can I use temporary security credentials to restrict access to a region or a subset of regions?
No. You cannot restrict the temporary security credentials to a particular region or subset of
regions, except the tokens from AWS GovCloud and Chine, which can only be used in the
respective regions from which they originated.
What is identity federation?
IAM supports identity federation for delegated access to the AWS Console or APIs. With
identity federation, external identities are granted secure access to resources in your AWS
account without having to create IAM users.
What are federated users?
Federated users (external identities) are users you manage outside of AWS in your corporate
directory, but to whom you grant access to your AWS account using temporary security
credentials. They differ from IAM users, which are created and maintained in your AWS
account.
Do you support SAML?
Yes, AWS supports SAML 2.0.
What SAML profiles does AWS support?
AWS single sign-on (SSO) endpoint supports IdP-initiated HTTP-POST binding WebSSO
SAML Profile. This enables a federated user to sign in to the AWS Management Console
using SAML assertion. A SAML assertion can also be used to request temporary security
credentials.
Can federated users access AWS APIs and/or AWS Management Console?
Yes, they can request temporary security credentials to provide them with secure access to
AWS.
How many federated users can I give access to the AWS management console?
There is no limit
What is web identity federation?
Web identity federation allows you to create AWS-powered mobile apps that use public
identity providers (google, facebook) for authentication. When web identity federation, you
have an easy way to integrate sign-in from public identity providers (IdPs) into your apps
without having to write and server-side code and without distributing long-term AWS
security credentials with the app.
How does identity federation using AWS Directory Service differ from using 3rd party
identity management solutions?
AWS Directory Service is a managed service, customers do not need to set up or manage
federation infrastructure, but rather need to create an AD connector directory to integrate with
their on-premises directory. AWS Directory Service only provides access to the AWS
Management Console, if you are interested in providing federated users access to AWS APIs,
use a 3rd party offering or deploy your own proxy server.
Does AWS Billing provide aggregated usage and cost breakdowns by user?
No, that is not currently supported.
Is billable user activity logged in AWS usage data?
No but this is planned for a future release.
Are IAM actions logged for auditing purposes?
Yes, you can log IAM actions, STS actions, and AWS Console sign-ins through CloudTrail.
Is there any distinction between people and software agents as AWS entities?
No, both of these entities are treated like users with security credentials and permissions.
However, people are the only ones to use a password in the console.
Do users work with the AWS Support Center and Trusted Advisor?
Yes, IAM users have the ability to create and modify support cases as well as use Trusted
Advisor.
Administrator Access
What level of access does the "root" account have?
Grant her Administrator access by adding her to the Administrators' group.
A new employee has just started work, and it is your job to give her administrator access to
the AWS console. You have given her a user name, an access key ID, a secret access key, and
you have generated a password for her. She is now able to log in to the AWS console, but she
is unable to interact with any AWS services. What should you do next?
Access to all AWS services except the management of groups and users within IAM.
Power User Access allows ________.
Enact a strong password policy: user passwords must be changed every 45 days, with each
password containing a combination of capital letters, lower case letters, numbers, and special
symbols.
You have created a new AWS account for your company, and you have also configured
multi-factor authentication on the root account. You are about to create your new users. What
strategy should you consider in order to ensure that there is good security on this account.
IAM allows you to setup biometric authentication, so that no passwords are required.
Which of the following is not a feature of IAM?
Set up an account using their company email address.
You have a client who is considering a move to AWS. In establishing a new account, what is
the first thing the company should do?
IAM allows you to manage users, groups, roles, and their corresponding level of access to the
AWS Platform.
Which statement best describes IAM?
You cannot log in to the AWS console using the Access Key ID / Secret Access Key pair.
Instead, you must generate a password for the user, and supply the user with this password
and your organization's unique AWS console login URL.
You are a security administrator working for a hotel chain. You have a new member of staff
who has started as a systems administrator, and she will need full access to the AWS console.
You have created the user account and generated the access key id and the secret access key.
You have moved this user into the group where the other administrators are, and you have
provided the new user with their secret access key and their access key id. However, when
she tries to log in to the AWS console, she cannot. Why might that be?
Will be able to interact with AWS using their access key ID and secret access key using the
API, CLI, or the AWS SDKs.
When you create a new user, that user ________.
JSON
In what language are policy documents written?
Implement Multi-Factor Authentication for all accounts.
What is an additional way to secure the AWS accounts of both the root account and new
users alike?
No access to any AWS services.
What is the default level of access a newly created IAM User is granted?
Organizational Units
Which of the following is not a component of IAM?
You will need to configure Users and Policy Documents only once, as these are applied
globally.
You are a solutions architect working for a large engineering company who are moving from
a legacy infrastructure to AWS. You have configured the company's first AWS account and
you have set up IAM. Your company is based in Andorra, but there will be a small subsidiary
operating out of South Korea, so that office will need its own AWS environment. Which of
the following statements is true?
1. Create individual user accounts with minimum necessary rights and tell the staff to log in
to the console using the credentials provided.
c
Which of the following is NOT an option to set a password policy in an IAM
a. The password must have at least one uppercase character
b. The password must have at least one alphanumeric character
c. The minimum length of the password should be between 8 and 128 chars
d. The minimum length of the password should be between 6 and 128 chars
d
The possible values of Effect element included within the statement of an IAM policy
are _________
a. Full and Null
b. Pass and Block
c. 1 and 0
d. Allow and Deny
b
Every user you create in the IAM system starts with __________
a. full permissions
b. no permissions
c. admin permissions
d. edit permissions
c
The information within an IAM policy is described through a series of ___________
a. name spaces
b. classes
c. elements
d. maros
b
What does the following policy for Amazon EC2 do?
{
"Statement":[{
"Effect":"Allow",
"Action":"ec2":Describe*,
"Resource":"*"
}]
}
a. It creates a policy that is attached to a group to give the group read an write
access to all of the CloudFront resoucres
b. It creates a policy that is attached to a group to give the group read access to all
of the CloudFront distribution
c. It creates a policy that is attached to a group to provide protected access to all of
the CloudFront distributions
d. It creates a policy that is attached to a group to a group to provide private access
to all of the CloudFront distributions
c
An organization has created 10 IAM users. The organization wants those users to
work independently and access AWS. Which of the options mentioned below is not a
possible solution?
a. Create the X.509 certificate for each user and provide them access to AWS CLI
b. Enable MFA for each IAM user and assign them the virtual MFA device to access
the console
c. Create the access key and secret access key for each user and provide access to
AWS using the console
d. Provide each user with the IAM login and password for the AWS console
c
A user had defined an IAM policy similar to the one given below on a bucket:
{
"Version": "2012-10-17",
"Statemen"; [{
"Effect":"Allow",
"Principal": {
"AWS":"arn:aws:iam::12112112:user/test"
}
"Action": [
"s3:GetBucketLocation",
"s3:ListBucket",
"s3:GetObject"
],
"Resource": [
"arn:aws:s3::cloudacademy"
]
}
]
} what will this do
a. It will allow all the IAM users of the account ID 12112112 to perform
GetBucketLocation, ListBucket and GetObject on bucket CloudAcademy
b. It will result in the error saying invalid policy statement
c. Allows the user test to the AWS account ID 12112112 to perform
GetBucketLocation, List Bucket and GetObject on the bucket cloudacademy
d. it will create an IAM policy for the user test
c
True or False: There are no Amazon CloudFront resource ARN for you to use in an
IAM policy
a. False. CloudFront has its own Resource names to use in an IAM policy
b. False. All Amazon services have ARNs to use in an IAM policy
c. True, there are no such ARNs because you cannot specify the resources to
control access to
d. True, there are no such ARNs if your IAM policy is redundant
c
A sysadmin has created the below policy on the S3 bucket named CloudAcademy.
What does this policy define
"Statement:[{
"Sid":"Stmt1388811069831",
"Effect":"Allow",
"Principal":"*",
"Action":["s3:GetObjectAcl","s3:ListBucket"],
"Resource":["arn:aws:s3::cloudacademy]
}]
a. 3
b. 4
c. None
d. 1
c
Having setup a clients S3 bucket which contain videos ro make some money via
DevPay, you are now concerned that this data is not safe from unintended user
errors or application failure. To protect this S3 data from such accident failures, you
should
a. enable S3 RRS
b. access S3 via signed URL
c. enable S3 versioning
d. enable multi AZ archives and backup storage for content in S3 buckets
b
Identify a correct statement about IAM friendly names and paths
a. If a user and a group are given the same IAM path , the two are assigned different
account IDs
b. If you give a user and group the same path, the user is not automatically put in
that group
c. If you give a user and group the same path, the user is automatically put in that
group
d. If you are using the IAM API or AWS CLI to create IAM entities you cannot
optionally give the entity a path
c
In the AWS IAM , the version element specifies the policy language version. Which
of the following are currently the only allowed values?
a. 2011-10-17 , 2008-10-17
b. 2015-10-17 , 2014-10-17
c. 2012-10-17 , 2008-10-17
d. 2012-10-17 , 2009-10-17
c
Are you able to integrate a multi-factor token service with the AWS platform?
a. Yes using the AS MFA token devices to authenticate users on the AWS platfom
b. No you cannot integrate MFA token devices with the AWS platform
c. Yes you can integrate private MFA token devices to authenticate
d. IAM does not delete the group membership of which the user was a member
a
You have just taken over managing your company's AWS account. As one of your
first tasks, you are reviewing IAM groups and their associated permissions. You
notice that one of the groups has two conflicting permissions attached, one that
allows S3 access, and one that denies S3 access. If your goal is to allow members
of the group to have S3 access, what needs to be done?
a. You must remove the deny policy, as an deny policy will override an allow policy
b. Nothing, as the allow policy overrides the deny policy
c. You just need to add a second allow rule
d. You must delete and recreate the group and it's permisisons
Statement
formal definition of a single permission
Principal
An entity as defined in IAM; elements go into policies, and the details vary by service
Action
the activity, typically an API call the principal has permission to perform
Resource
the object the principal is requesting access to.
Conditions
Restrictions or details about the permission.
Keys
specific characteristics about a condition.
Requestor
The person who makes a call to an AWS service.
Evaluation
The process an AWS service uses to determine the permissions granted to a requestor.
Effect
The result of the evaluated policies, resulting in either allow or deny.
IAM
Allows you to management users, groups, roles, and their corresponding access to
the AWS Platform
Power User Access
Allows access to all services except for management of groups and users within IAM
What level of access does the "root" account have?
Administrator Access
You are a solutions architect working for a large engineering company who are
moving their existing legacy hardware to AWS. You have configured their first AWS
account and you have set up IAM. Your company will be primarily based out of West
Germany, however they will have a small subsidiary operating out of South Korea
and you will need an AWS environment configured there as well. Which of the
following statements is true;
You will need to configure Users and Policy Groups only once, as they are applied
globally
You have a client who is considering moving to AWS services and do not yet have
an account. What is the first thing the company should do to set up an AWS
Account?
Set up an account using their company email address
You are a security administrator working for a hotel chain. You have a new member
of staff who has started as a systems administrator and they will need full access to
the AWS console. You have created the user account and generated the access key
id and the secret access key. You have moved this user into the group where the
other administrators are and you have provided the new user with their secret
access key and their access key id. However when they go to log in to the AWS
console, they cannot sign in. What could be the cause of this?
You cannot login to the console using a secret access key and a key access ID,
instead you must generate a password for the user, and supply the user with the
password as well the unique link to sign in to the AWS console
What is an additional way to secure IAM for both the root login and new users alike?
Implement multi-factor authentication for all accounts
By default when you create a new user in the IAM console, what level of access do
they have?
No access to all AWS services
In what language are policy documents written in?
JSON
Format for structuring ARN's (Amazon Resource Names: uniquely identify AWS
resources)
arn:partition:service:region:account-id:resource
arn:partition:service:region:account-id:resourcetype/resource
arn:partition:service:region:account-id:resourcetype:resource
Tasks that require you to sign in as the root user
Modify root user details. This include changing the root user's password.
Change your AWS support plan.
Change or delete your payment options.
View your account's billing information. For information about how to enable billing
access for IAM users see Activating Access to the Billing and Cost Management
Console
Close an AWS account.
Sign up for GovCloud.
Submit a Reverse DNS for Amazon EC2 request. The "this form" link on that page to
submit a request works only if you sign in with root creds.
Create a CloudFront key pair.
Create an AWS-created X.509 signing certificate. (You can still make self-created
certificates for IAM users.)
Transfer an Amazon Route 53 domain to another AWS account.
Change the Amazon EC2 setting for longer resource IDs. Changing the setting as
root affects all users and roles in the account. Changing as an IAM user or IAM role
affects only that user or role.
Submit a request to perform penetration testing on your AWS infrastructure.
Open an AWS Support case where you specify Regarding: Account and Billing
Support.
Request removal of the port 25 email throttle on your EC2 instance.
A company is building software on AWS that requires access to various AWS services.
Which configuration should be used to ensure that AWS credentials (i.e., Access Key
ID/Secret Access Key combination) are not compromised?
c.) Store the AWS Access Key ID/Secret Access Key combination in software comments.