Welcome to AWS Certification Bootcamp (CLF-C02)
Not for Resale
For Education Purposes Only
Module 2 �Security and Compliance ��
Define the AWS shared responsibility model
Shared responsibility model - overview
Shared responsibility model
AWS responsibility “Security of the Cloud”
AWS is responsible for protecting the infrastructure that runs all the services offered in the AWS Cloud.
Customer responsibility “Security in the Cloud”
Customer responsibility will be determined by the AWS Cloud services that a customer selects.
Shared responsibility model - Lambda
Shared responsibility model – infra, containers and managed services
Define AWS Cloud security and compliance concepts
Finding AWS compliance information
AWS compliance program
Three Categories of AWS Compliance Program
Certifications / Attestations:– are assessed by a third-party, independent auditor and result in a certification, audit report, or attestation of compliance.
Laws / Regulations: AWS customers remain responsible for complying with applicable compliance laws and regulations. In some cases, AWS offers functionality (such as security features), enablers, and legal agreements (such as the AWS Data Processing Agreement and Business Associate Addendum) to support customer compliance.
.
Alignments / Frameworks: Compliance alignments and frameworks include published security or compliance requirements for a specific purpose, such as a specific industry or function.
y
AWS compliance benefits
Third-party validation for 1,000s of global requirement
Inherit the latest security controls AWS uses on its own infrastructure
Streamline and automate compliance
Automate compliance reporting
The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best security practices and a variety of IT security standards.
Some AWS Security Services
AWS Inspector
Automatically inspects applications for vulnerabilities and exposures based on best practices deviations
Amazon GuardDuty
Protect your AWS accounts and workloads with intelligent threat detection and continuous monitoring.
Amazon Artifact
No cost, self-service portal for on-demand access to AWS’ compliance reports to evaluate compliant with regulatory.
AWS Security Hub
Improves security position with automated security best practice checks with AWS Config rules and automated integrations.
AWS Config
Fully managed service that provides resource inventory, config history, config change notifications to enable security and governance.
AWS CloudTrail
A service that provides tracking of all users’ actions that are conducted in your AWS Account.
AWS encryption at rest
Encryption is controlled by KMS which integrates with CloudTrail for logging and recording.
All data written to the encrypted file system is encrypted by using an AES-256 encryption algorithm when stored on disk.
AWS encryption in transit
AWS DC
Encryption a Physical Layer
VPC
Encryption at Physical Layer
Web Apps
Web Apps
Viewing HSM audit log in CloudWatch
Security and compliance services
Amazon CloudWatch monitors resources and the applications in real time. CloudWatch collects and tracks metrics, which can be used to measure resources and applications.
Utilizes alarms that watch metrics and send notifications or automatically make changes to the resources you are monitoring when a threshold is breached. System-wide visibility into resource utilization, application performance, and operational health.
AWS Config provides a detailed view of the configuration of AWS resources in your AWS account. This includes how the resources are related to one another and how they were configured in the past so that you can see how the configurations and relationships change over time.
An AWS resource is an entity you can work with in AWS, such as an Amazon Elastic Compute Cloud (EC2) instance.
AWS CloudTrail is an AWS service that helps you enable operational and risk auditing, governance, and compliance of your AWS account.
Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail.
Events include actions taken in the AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs.
Least privilege access principle
Break (15 minutes)
Identify AWS access management capabilities
IAM access management
With AWS Identity and Access Management (IAM), you can specify who or what can access services and resources in AWS, centrally managed permissions, and analyze access to refine permissions across AWS. It includes identities: users, groups, roles and credentials. AWS IAM Identity Center (Successor to AWS Single Sign-On). IAM is a global service, applies to entire account/region.
IAM access management – users and groups
IAM access management – policies (authorization)
IAM access management – roles
Roles are like users. IAM policies are assigned to roles. It’s an identity with permissions. No long-term credentials or access keys. If users are assigned to a role, access keys are created dynamically and temporarily. Used to delegate access to users, applications or services that don’t normal have access to resources.
IAM - managing access keys
Rotating Keys
IAM access management – MFA
MFA adds extra security because it requires users to provide unique authentication from an AWS supported MFA mechanism:
SMS text message-based MFA – AWS ended support for enabling SMS multi-factor authentication (MFA)
IAM access management – root user tasks (required)
Security best practices
Identify components and resources for security
Native AWS security capabilities – security group
Native AWS security capabilities – NACL (network access control lists)
A network access control list (NACL) is a firewall that operates at the subnet level. It consists of inbound and outbound rules that, by default, allow all traffic.
Native AWS security capabilities – WAF (web application firewall)
Native AWS security capabilities – AWS Shield
Native AWS security capabilities – finding security documentation and information
Native AWS security capabilities – trusted advisor
Continuous monitoring of the environment and assist customers is following best practices in each category.
Native AWS security capabilities – trusted advisor
Module 2�Game Summary���1 point for each correct answer�2 points for each correct stolen answer��
Sample Question 1
Which controls are shared between customers and AWS based on shared responsibility model? (Select two)
Sample Question 2
When using RDS, which is a managed/container service, are the customers’ responsibility? (Choose two)
Sample Question 3
Which task is the customer’s responsibility when managing Lambda functions?
Sample Question 4
Which AWS service protects against DDoS attacks at the application layer?
Sample Question 5
An organization needs an automated security assessment to identify unintended network access to an EC2 instances. Which AWS service should they use?
Sample Question 6
A web application is hosted on AWS using ELB and multiple EC2 Instances and AWS RDS, which security measures fall under the responsibility of AWS? (Choose two)
Sample Question 7
Who can create and manage access key for the root user?
Sample Question 8
A company stores configuration files in AWS S3 bucket. The files must be accessed by applications that are running on EC2 instances. Based on security best practices, how should the permissions be granted to allow the application access to the S3 bucket?
Sample Question 9
Which tasks require the use of the AWS account root user? (Choose Two)
Sample Question 10
Which AWS service/feature identifies if a S3 bucket or an IAM role has been shared with an external entity?
Sample Question 11
Which feature/service provides documentation and reports to help a company evaluate whether AWS is compliant with local regulatory standards?
Sample Question 12
A company needs to continuously monitor their AWS account for suspicious activity. The service/feature must be able to initiate automated actions on the security findings, which service/feature can meet this requirement?
Sample Question 13
Which services tracks all user changes made in the AWS management console?
Sample Question 14
How does AWS Trusted Advisor provide guidance to administrators?