Bash, the Crucial Exams Chat Bot
AI Bot
IAM and Security Management Flashcards
Front | Back |
What does a Deny statement in an IAM policy do | Explicitly prevents users from performing specified actions |
What does IAM stand for | Identity and Access Management |
What does the term "key rotation" refer to | The process of periodically changing cryptographic keys to maintain security |
What is a Security Incident Response Plan | A documented strategy to manage and recover from security breaches |
What is an IAM policy | A JSON document that defines permissions for users, groups, or roles in IAM |
What is Multi-Factor Authentication (MFA) | An authentication method that requires multiple forms of verification to prove identity |
What is the difference between an IAM User and an IAM Role | Users are identities for individuals, while Roles are temporary identities for tasks or applications |
What is the function of IAM service-linked roles | To allow cloud services to manage resources on behalf of users securely |
What is the main purpose of access keys | To allow programmatic access to cloud services for users and applications |
What is the principle of least privilege | Granting users only the permissions they need to perform their job functions |
What is the purpose of a WAF (Web Application Firewall) | To protect applications from common web threats like SQL injection and XSS |
What is the purpose of an audit trail in security management | To track and log access and activity for detecting unauthorized actions |
What is the purpose of cloud resource tagging in security management | To organize and track access policies and resource ownership |
What is the shared responsibility model in cloud security | A model where cloud providers manage the infrastructure security while customers handle data and application security |
What should you do with unused IAM User accounts | Disable or delete them to reduce the attack surface |
What should you monitor to ensure IAM security | Logins, permission changes, and usage of elevated privileges |
What type of access is granted by default in IAM | Deny, unless explicitly allowed |
Why is least privilege considered a best practice | It reduces the risk of malicious or accidental misuse of permissions |
Why is role-based access control (RBAC) important | It simplifies access management by assigning permissions to roles rather than individuals |
Why should you rotate access keys regularly | To minimize the risk of key compromise |
Front
What is the shared responsibility model in cloud security
Click the card to flip
Back
A model where cloud providers manage the infrastructure security while customers handle data and application security
Front
What is the purpose of a WAF (Web Application Firewall)
Back
To protect applications from common web threats like SQL injection and XSS
Front
Why should you rotate access keys regularly
Back
To minimize the risk of key compromise
Front
What is the purpose of an audit trail in security management
Back
To track and log access and activity for detecting unauthorized actions
Front
What does the term "key rotation" refer to
Back
The process of periodically changing cryptographic keys to maintain security
Front
What is Multi-Factor Authentication (MFA)
Back
An authentication method that requires multiple forms of verification to prove identity
Front
What is the main purpose of access keys
Back
To allow programmatic access to cloud services for users and applications
Front
What type of access is granted by default in IAM
Back
Deny, unless explicitly allowed
Front
What is the function of IAM service-linked roles
Back
To allow cloud services to manage resources on behalf of users securely
Front
What is the difference between an IAM User and an IAM Role
Back
Users are identities for individuals, while Roles are temporary identities for tasks or applications
Front
Why is role-based access control (RBAC) important
Back
It simplifies access management by assigning permissions to roles rather than individuals
Front
What is a Security Incident Response Plan
Back
A documented strategy to manage and recover from security breaches
Front
What does a Deny statement in an IAM policy do
Back
Explicitly prevents users from performing specified actions
Front
What does IAM stand for
Back
Identity and Access Management
Front
What should you monitor to ensure IAM security
Back
Logins, permission changes, and usage of elevated privileges
Front
What should you do with unused IAM User accounts
Back
Disable or delete them to reduce the attack surface
Front
What is an IAM policy
Back
A JSON document that defines permissions for users, groups, or roles in IAM
Front
What is the principle of least privilege
Back
Granting users only the permissions they need to perform their job functions
Front
What is the purpose of cloud resource tagging in security management
Back
To organize and track access policies and resource ownership
Front
Why is least privilege considered a best practice
Back
It reduces the risk of malicious or accidental misuse of permissions
1/20
This deck focuses on Identity and Access Management (IAM), security best practices, and incident response procedures tailored for CloudOps Engineers.