Bash, the Crucial Exams Chat Bot
AI Bot

IAM and Security Management  Flashcards

It simplifies access management by assigning permissions to roles rather than individuals
Deny, unless explicitly allowed
Disable or delete them to reduce the attack surface
What should you do with unused IAM User accounts
What is the function of IAM service-linked roles
To organize and track access policies and resource ownership
A JSON document that defines permissions for users, groups, or roles in IAM
What is the purpose of cloud resource tagging in security management
To allow cloud services to manage resources on behalf of users securely
What type of access is granted by default in IAM
What is an IAM policy
Why is role-based access control (RBAC) important
FrontBack
What does a Deny statement in an IAM policy doExplicitly prevents users from performing specified actions
What does IAM stand forIdentity and Access Management
What does the term "key rotation" refer toThe process of periodically changing cryptographic keys to maintain security
What is a Security Incident Response PlanA documented strategy to manage and recover from security breaches
What is an IAM policyA JSON document that defines permissions for users, groups, or roles in IAM
What is Multi-Factor Authentication (MFA)An authentication method that requires multiple forms of verification to prove identity
What is the difference between an IAM User and an IAM RoleUsers are identities for individuals, while Roles are temporary identities for tasks or applications
What is the function of IAM service-linked rolesTo allow cloud services to manage resources on behalf of users securely
What is the main purpose of access keysTo allow programmatic access to cloud services for users and applications
What is the principle of least privilegeGranting users only the permissions they need to perform their job functions
What is the purpose of a WAF (Web Application Firewall)To protect applications from common web threats like SQL injection and XSS
What is the purpose of an audit trail in security managementTo track and log access and activity for detecting unauthorized actions
What is the purpose of cloud resource tagging in security managementTo organize and track access policies and resource ownership
What is the shared responsibility model in cloud securityA model where cloud providers manage the infrastructure security while customers handle data and application security
What should you do with unused IAM User accountsDisable or delete them to reduce the attack surface
What should you monitor to ensure IAM securityLogins, permission changes, and usage of elevated privileges
What type of access is granted by default in IAMDeny, unless explicitly allowed
Why is least privilege considered a best practiceIt reduces the risk of malicious or accidental misuse of permissions
Why is role-based access control (RBAC) importantIt simplifies access management by assigning permissions to roles rather than individuals
Why should you rotate access keys regularlyTo minimize the risk of key compromise
Front
What is a Security Incident Response Plan
Click the card to flip
Back
A documented strategy to manage and recover from security breaches
Front
What type of access is granted by default in IAM
Back
Deny, unless explicitly allowed
Front
What is an IAM policy
Back
A JSON document that defines permissions for users, groups, or roles in IAM
Front
What is the main purpose of access keys
Back
To allow programmatic access to cloud services for users and applications
Front
Why should you rotate access keys regularly
Back
To minimize the risk of key compromise
Front
What does a Deny statement in an IAM policy do
Back
Explicitly prevents users from performing specified actions
Front
What should you do with unused IAM User accounts
Back
Disable or delete them to reduce the attack surface
Front
What is the purpose of a WAF (Web Application Firewall)
Back
To protect applications from common web threats like SQL injection and XSS
Front
What is Multi-Factor Authentication (MFA)
Back
An authentication method that requires multiple forms of verification to prove identity
Front
What is the shared responsibility model in cloud security
Back
A model where cloud providers manage the infrastructure security while customers handle data and application security
Front
What is the function of IAM service-linked roles
Back
To allow cloud services to manage resources on behalf of users securely
Front
Why is role-based access control (RBAC) important
Back
It simplifies access management by assigning permissions to roles rather than individuals
Front
What does IAM stand for
Back
Identity and Access Management
Front
What is the purpose of an audit trail in security management
Back
To track and log access and activity for detecting unauthorized actions
Front
Why is least privilege considered a best practice
Back
It reduces the risk of malicious or accidental misuse of permissions
Front
What does the term "key rotation" refer to
Back
The process of periodically changing cryptographic keys to maintain security
Front
What is the purpose of cloud resource tagging in security management
Back
To organize and track access policies and resource ownership
Front
What should you monitor to ensure IAM security
Back
Logins, permission changes, and usage of elevated privileges
Front
What is the difference between an IAM User and an IAM Role
Back
Users are identities for individuals, while Roles are temporary identities for tasks or applications
Front
What is the principle of least privilege
Back
Granting users only the permissions they need to perform their job functions
1/20
This deck focuses on Identity and Access Management (IAM), security best practices, and incident response procedures tailored for CloudOps Engineers.
Share on...
Follow us on...