1. What are two common IAM (Identity and Access Management) security tools ?
IAM Access Analyzer
Shows the account creation time, whether the password is activated, the last time the password was changed, the last time the account was used, when the next password change is expected, whether MFA is enabled, whether access keys have been created, the last time the access key was rotated, the last time the access key was used, and the status of other access keys or authentication numbers being used.
- ๋น๋ฐ๋ฒํธ๋ ๊ณ์ ์ ์ฌ์ฉํ์ง ์๋ ์ฌ์ฉ์๋ค์ ํ์ธํ ๋ ๋งค์ฐ ์ ์ฉํจ
IAM Credential Report
Shows accessed service, policies granting permissions, last acceessed time
- ์ฌ์ฉ์๊ฐ ์ฌ๋ฐ๋ฅธ ๊ถํ์ ๊ฐ์ง๊ณ ์๋์ง ์ฌ๋ถ๋ฅผ ์ค์ ๋ก ํ์ธํ ๋ ์ ์ฉํจ
- ์ฆ ์ก์ธ์ค ๊ด๋ฆฌ์๋ AWS์์ ์ธ๋ถ์ ์ธ ์ฌ์ฉ์ ์ก์ธ์ค ๊ถํ์ ์ํํด์ผ ํ ๋ ๋งค์ฐ ์ ์ฉํจ
2. Choose the incorrect statement about IAM users
โ IAM users access AWS services through root account credentials.
โ๏ธ IAM users access AWS services through their own credentials (username & password, or access keys).
3. Which of the following is considered an IAM best practice?
โ๏ธ Do not use the root account.
4. What's IAM Policies?
โ๏ธ IAM policies define a set of permissions to create requests for AWS services, and they are used by IAM users, user groups, and IAM roles in the form of JSON documents.
5. Which principle should be applied to IAM permissions among the following?
โ๏ธ Principle of Least Privilege
6. What actions should be taken to enhance the security of the root account?
โ๏ธ Enable Multi-Factor Authentication (MFA) on the root account.
โ๏ธ Use a strong password for the root account and change it regularly.
โ๏ธ Avoid using the root account for daily tasks. Instead, create and use IAM users with the necessary permissions.
โ๏ธ Delete access keys for the root account if they are not needed.
โ๏ธ Enable CloudTrail logging to monitor all activities related to the root account.
โ๏ธ Store the root account credentials securely and ensure they are only accessible to trusted individuals.
7. (True/False) An IAM user group can include IAM users and other user groups.
False
IAM user groups can only contain IAM users. IAM user groups cannot be part of other user groups.
8. Choose the element that is not a component of a statement in an IAM policy.
IAM policies are composed of one or more statements.
Choose the element that is not a component of a statement in an IAM policy.
Effect, Principle, Version, Action, Resource
Version is part of the IAM policy itself, not a part of the statement.
IAM policy statement consists of Sid, Effect, Principal, Action, Resource, and Condition.
9. What is the correct definition of an IAM Roles?
A set of permissions to create requests for AWS services, and an IAM entity that is used by AWS services
โญ ์ ๋ฆฌ ์ ๋ ๋ธ๋ก๊ทธ
- ๋ธ๋ก๊ทธ ์ฃผ์ธ๋๋ค ๊ฐ์ฌํฉ๋๋ค๐ ์๋ณด๊ฒ ์ต๋๋ค
'Coding > AWS' ์นดํ ๊ณ ๋ฆฌ์ ๋ค๋ฅธ ๊ธ
[AWS] Certified Solutions Architect Associate ์ค์ต7์ผ์ฐจ - AWS EC2 (12) | 2025.01.22 |
---|---|
[AWS] ์ค์ต6์ผ์ฐจ - AWS ์์ฐ ๊ด๋ฆฌ Billing and Cost Managetment (setting Budget) (8) | 2025.01.22 |
[AWS] ์ค์ต4์ผ์ฐจ - AWS IAM ROLE, IAM ๋ณด์๋๊ตฌ ๋ฑ (13) | 2025.01.20 |
[AWS] ์ค์ต3์ผ์ฐจ - AWS Access Key, CLI & SDK (6) | 2025.01.19 |
[AWS] ์ค์ต2์ผ์ฐจ - IAM: JSON ๊ตฌ์กฐ & IAM MFA (๋ค์ค์ธ์ฆ) (4) | 2025.01.16 |