Security and Compliance
- "Do I Know This Already?" Quiz
- The Shared Responsibility Model
- Security Policies in AWS
- Access Controls
- Review All Key Topics
- Define Key Terms
- Q and A
In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.
This chapter covers the following subjects:
The Shared Responsibility Model: This section of the chapter describes the AWS Shared Responsibility Model in great detail. It also provides examples of AWS security responsibilities as well as those of the client (you).
Security Policies in AWS: This section of the chapter describes the use of powerful security policies and other security best practices in AWS.
Access Controls: This final part of the chapter details many of the powerful access controls that exist in AWS for you to use in order to help secure your cloud-based solutions.
It is amazing just how many engineers are often scared to move to the cloud due to security reasons. In all actuality, there are many reasons to move there that might encourage a more secure infrastructure. Just think, because Amazon can afford the latest in physical security measures at their data centers, you will enjoy a level of physical security that might not be possible in your own enterprise environment.
This chapter focuses on important security topics you should know and know well for AWS. This includes a look at the Shared Responsibility Model as well as an exploration of key security policies and access controls available to you.
“Do I Know This Already?” Quiz
The “Do I Know This Already?” quiz allows you to assess if you should read the entire chapter. Table 5-1 lists the major headings in this chapter and the “Do I Know This Already?” quiz questions covering the material in those headings so you can assess your knowledge of these specific areas. The answers to the “Do I Know This Already?” quiz appear in Appendix A.
Table 5-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundations Topics Section |
Questions |
The Shared Responsibility Model |
1–2 |
Security Policies in AWS |
3–4 |
Access Controls |
5–6 |
1. Who is responsible for creating users, groups, and roles in IAM for use in an AWS architecture?
The AWS customer
AWS staff
The managed service provider
There are no users, roles, or groups in IAM
2. Who is responsible for securing the hypervisor in use in AWS?
AWS staff
The client of AWS
The managed service provider
There is no hypervisor in use in AWS
3. You would like to add DDoS protection against your EC2 instances and your Elastic Load Balancing services. What service should you use?
AWS CloudIPS
AWS Shield Advanced
AWS Cognito
AWS Shield Standard
4. What credentials would you require in order to submit a penetration testing request?
AWSFullAdmin
Root account
AWSIAMAdmin
AWS Region Admin
5. What is the IAM component that is often ideal for allowing EC2 instances to other AWS services and resources?
Groups
Users
Clusters
Roles
6. When creating a user account in AWS IAM, what are the options for access type? (Choose two.)
AWS Management Console access
Restore
Programmatic access
CLI only
Foundation Topics