Bash, the Crucial Exams Chat Bot
AI Bot
Security and Compliance in AI Services Flashcards
Front | Back |
How can AI services be made HIPAA compliant | Use AWS services configured for PHI data, like encrypted storage and secure networking |
How can you enforce secure communication in AI services | Use HTTPS protocols and TLS encryption |
How can you limit access to AWS AI services | Use IAM policies to define fine-grained permissions |
How can you monitor activity in AWS AI services | Enable AWS CloudTrail to log API calls for auditing |
What are IAM roles used for in AWS AI services | Controlling access to resources securely |
What AWS service helps detect unauthorized changes to AI resources | AWS Config for compliance evaluation |
What AWS tool is used for automated security checks | AWS Security Hub for centralized security analysis |
What does PCI DSS compliance mean for AI services | Certifies handling of payment card information securely |
What is GDPR | The General Data Protection Regulation governing user data privacy in the EU |
What is the benefit of Amazon Macie in AI compliance | Helps discover and protect sensitive personal data using machine learning |
What is the benefit of regularly rotating access keys | Minimizes risks of leaked keys being misused |
What is the purpose of encryption in AI services | Ensuring data is secured at rest and in transit |
What is the Shared Responsibility Model | AWS manages physical infrastructure while users secure their applications and data |
What is the significance of data residency in AI compliance | Ensuring data is stored in specific geographic regions to meet legal requirements |
Which AWS service is used for managing encryption keys | AWS Key Management Service (KMS) |
Why is multi-factor authentication (MFA) important | Adds an extra layer of security to access control |
Why is versioning important in AI models | Enables rollback and auditing of model modifications |
Why should access credentials not be hardcoded in AI applications | Prevents unauthorized access and credential exposure |
Why should sensitive data be anonymized before processing in AI services | Reduces risk of exposing personal information |
Front
How can you monitor activity in AWS AI services
Click the card to flip
Back
Enable AWS CloudTrail to log API calls for auditing
Front
What is the significance of data residency in AI compliance
Back
Ensuring data is stored in specific geographic regions to meet legal requirements
Front
What is the purpose of encryption in AI services
Back
Ensuring data is secured at rest and in transit
Front
What does PCI DSS compliance mean for AI services
Back
Certifies handling of payment card information securely
Front
What are IAM roles used for in AWS AI services
Back
Controlling access to resources securely
Front
What AWS tool is used for automated security checks
Back
AWS Security Hub for centralized security analysis
Front
How can AI services be made HIPAA compliant
Back
Use AWS services configured for PHI data, like encrypted storage and secure networking
Front
What is the benefit of Amazon Macie in AI compliance
Back
Helps discover and protect sensitive personal data using machine learning
Front
Why should access credentials not be hardcoded in AI applications
Back
Prevents unauthorized access and credential exposure
Front
What is the Shared Responsibility Model
Back
AWS manages physical infrastructure while users secure their applications and data
Front
Why is versioning important in AI models
Back
Enables rollback and auditing of model modifications
Front
How can you limit access to AWS AI services
Back
Use IAM policies to define fine-grained permissions
Front
Why should sensitive data be anonymized before processing in AI services
Back
Reduces risk of exposing personal information
Front
Which AWS service is used for managing encryption keys
Back
AWS Key Management Service (KMS)
Front
How can you enforce secure communication in AI services
Back
Use HTTPS protocols and TLS encryption
Front
What is the benefit of regularly rotating access keys
Back
Minimizes risks of leaked keys being misused
Front
Why is multi-factor authentication (MFA) important
Back
Adds an extra layer of security to access control
Front
What is GDPR
Back
The General Data Protection Regulation governing user data privacy in the EU
Front
What AWS service helps detect unauthorized changes to AI resources
Back
AWS Config for compliance evaluation
1/19
This deck covers key considerations for security, compliance, and best practices when using AWS AI services to ensure data protection and regulatory adherence.