-
Q: What are the three pillars of a Least Privilege Strategy in AWS?A: 1. Identity and Access Management (IAM), 2. Network Access and Segmentation Design, 3. Cloud Security Posture Management (CSPM).
-
Q: What is 'Compliance-forward cloud planning'?A: The concept of making cloud infrastructure planning decisions based on adhering to compliance of data first, not as an afterthought.
-
Q: What is the shared responsibility model for AWS?A: AWS is responsible for security *of* the cloud (infrastructure), while the customer is responsible for security *in* the cloud (data, applications, identity).
-
Q: What is Amazon Macie used for?A: A security service that uses machine learning to automatically discover, classify, and protect sensitive data (like PII) in AWS.
-
Q: What are the two major types of visibility needed in the cloud?A: 1. Event-driven visibility (logs, alerts from API calls), 2. Behavior-driven visibility (patterns over time like traffic flows).
-
Q: What is the 'Pets vs. Cattle' concept in cloud security?A: Pets are unique systems that require care (patching/fixing); Cattle are disposable systems that are replaced rather than fixed.
-
Q: What is Cloud Security Posture Management (CSPM)?A: Tools that continuously monitor cloud environments to manage risk, maintain visibility, and understand operations across AWS accounts.
-
Q: What service records API calls made in AWS?A: AWS CloudTrail records API calls, including identity, time, source IP, and request parameters.
-
Q: What is 'S3 Block Public Access'?A: A security feature that prevents S3 buckets from being publicly accessible via the internet.
-
Q: What is 'VPC Traffic Mirroring'?A: A feature that copies network traffic from an elastic network interface to a target for deep packet inspection and monitoring.
-
Q: What is the 'Cyber Defense Matrix'?A: A framework that maps the five NIST functions against five asset classes (Devices, Applications, Networks, Data, Users) to identify gaps.
-
Q: What is 'Serverless' security?A: Securing code and configuration without managing the underlying OS; focus on static code review, IAM privileges, and logging.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.