Bash, the Crucial Exams Chat Bot
AI Bot

Security and Permissions for Data Solutions  Flashcards

What is a VPC used for in AWS
Name one key benefit of data encryption
What does the principle of least privilege entail
Define permissions for users, groups, and roles
What is the primary purpose of IAM policies
Granting the minimal permissions necessary for a task
Server-Side Encryption (SSE) and Client-Side Encryption
What type of encryption does AWS S3 provide
To isolate and secure network resources
Protects sensitive information from unauthorized access
Roles are assumed temporarily by users or services, users have long-term credentials
How does an IAM Role differ from an IAM User
FrontBack
How can you ensure end-to-end encryption in your data pipelineBy encrypting data at rest and in transit
How does an IAM Role differ from an IAM UserRoles are assumed temporarily by users or services, users have long-term credentials
Name one key benefit of data encryptionProtects sensitive information from unauthorized access
What AWS service can you use to monitor unusual activity in your accountAmazon GuardDuty
What does IAM stand forIdentity and Access Management
What does the principle of least privilege entailGranting the minimal permissions necessary for a task
What feature in AWS ensures encrypted data delivery between VPCsVPN or VPC Peering with encryption
What is a compliant data pipelineOne that adheres to regulatory standards like GDPR or HIPAA
What is a VPC used for in AWSTo isolate and secure network resources
What is the benefit of multi-factor authentication (MFA) for IAM usersAdds an extra layer of security beyond passwords
What is the difference between symmetric and asymmetric encryptionSymmetric encryption uses one key; asymmetric uses a public-private key pair
What is the function of a Security Group in AWSTo act as a virtual firewall for controlling inbound and outbound traffic
What is the function of AWS WAFProtects web applications from common threats such as SQL injection
What is the primary purpose of IAM policiesDefine permissions for users, groups, and roles
What is the purpose of a Key Management Service (KMS)To create and manage cryptographic keys
What is the role of AWS CloudTrail in securityTracks API activity for auditing and compliance
What tool in AWS can you use to enforce compliance policiesAWS Config
What type of encryption does AWS S3 provideServer-Side Encryption (SSE) and Client-Side Encryption
When should S3 Bucket Policies be usedFor fine-grained access controls to S3 objects
Which service helps manage control over shared credentials in AWSSecrets Manager or Systems Manager Parameter Store
Front
What is the difference between symmetric and asymmetric encryption
Click the card to flip
Back
Symmetric encryption uses one key; asymmetric uses a public-private key pair
Front
What does the principle of least privilege entail
Back
Granting the minimal permissions necessary for a task
Front
When should S3 Bucket Policies be used
Back
For fine-grained access controls to S3 objects
Front
What is a VPC used for in AWS
Back
To isolate and secure network resources
Front
How can you ensure end-to-end encryption in your data pipeline
Back
By encrypting data at rest and in transit
Front
Name one key benefit of data encryption
Back
Protects sensitive information from unauthorized access
Front
What is a compliant data pipeline
Back
One that adheres to regulatory standards like GDPR or HIPAA
Front
How does an IAM Role differ from an IAM User
Back
Roles are assumed temporarily by users or services, users have long-term credentials
Front
What type of encryption does AWS S3 provide
Back
Server-Side Encryption (SSE) and Client-Side Encryption
Front
What is the purpose of a Key Management Service (KMS)
Back
To create and manage cryptographic keys
Front
What does IAM stand for
Back
Identity and Access Management
Front
Which service helps manage control over shared credentials in AWS
Back
Secrets Manager or Systems Manager Parameter Store
Front
What is the function of AWS WAF
Back
Protects web applications from common threats such as SQL injection
Front
What is the primary purpose of IAM policies
Back
Define permissions for users, groups, and roles
Front
What AWS service can you use to monitor unusual activity in your account
Back
Amazon GuardDuty
Front
What is the benefit of multi-factor authentication (MFA) for IAM users
Back
Adds an extra layer of security beyond passwords
Front
What is the role of AWS CloudTrail in security
Back
Tracks API activity for auditing and compliance
Front
What is the function of a Security Group in AWS
Back
To act as a virtual firewall for controlling inbound and outbound traffic
Front
What tool in AWS can you use to enforce compliance policies
Back
AWS Config
Front
What feature in AWS ensures encrypted data delivery between VPCs
Back
VPN or VPC Peering with encryption
1/20
This deck covers IAM policies, data encryption, VPCs, and compliance-related features for securing data pipelines and AWS resources.
Share on...
Follow us on...