AWS Cloud Practitioner Study Session Nine

I am taking the AWS Cloud Practitioner Exam in approximately two days and want to ensure I am prepared. This series will serve as non-exhaustive note taking for the information that I am internalizing as I go.

ChatGPT Summary

AWS Security & Identity – Exam-Focused Summary with Memory Aids

Security questions on the Cloud Practitioner exam are about concepts and service selection, not configuration. The key is knowing who is responsible, what service does what, and where security applies.


Core Security Concepts

Authentication vs Authorization

🧠 Memory Tip

AuthN = Name
AuthZ = Access


AWS Shared Responsibility Model (Very Testable)

Customer Responsibility — Security IN the Cloud

Customers secure:

AWS Responsibility — Security OF the Cloud

AWS secures:

🧠 Memory Tip

AWS secures the cloud, YOU secure what’s in it


AWS Security Control Goals

AWS security controls are designed to:

  1. Prevent incidents
  2. Protect networks, apps, and data
  3. Detect & Respond to threats

🧠 Memory Tip

Prevent → Protect → Detect


AWS Identity and Access Management (IAM)

Key IAM Rules

🧠 Memory Tip

Nothing is allowed unless you say so


IAM Roles

🧠 Real-World Example

Morning = barista role
Afternoon = cashier role

🧠 Memory Tip

Roles = temporary hats


Principle of Least Privilege

🧠 Exam Clue


AWS IAM Identity Center (Formerly SSO)

🧠 Memory Tip

One login, many services


AWS Secrets Manager

🧠 Memory Tip

Secrets Manager = No hardcoded passwords


AWS Systems Manager

🧠 Memory Tip

Systems Manager = Fleet control


Network & Application Attacks

DoS vs DDoS

🧠 Memory Tip

Extra D = Distributed


AWS Network-Level Protection

Built-In Infrastructure Protection

Security Groups

🧠 Memory Tip

Security Groups = Who can knock on the door


Elastic Load Balancing (ELB)

🧠 Memory Tip

ELB = Traffic shock absorber


AWS Regions

🧠 Memory Tip

Size is security


AWS Protection Services (DDoS & Web Protection)

AWS Shield

🧠 Memory Tip

Standard = automatic
Advanced = detailed & expensive


AWS WAF (Web Application Firewall)

🧠 Memory Tip

WAF = Web traffic bouncer


Data Encryption

Types of Encryption

🧠 Memory Tip

Rest = stored
Transit = traveling


AWS Data Protection Services

Encryption at Rest (Defaults)

🧠 Memory Tip

AWS encrypts by default


AWS Key Management Service (KMS)

🧠 Key Concept

🧠 Memory Tip

KMS = Key vault


Amazon Macie

🧠 Memory Tip

Macie watches your S3


AWS Certificate Manager (ACM)

🧠 Memory Tip

ACM = HTTPS made easy


Detection & Response Services

Amazon Inspector

🧠 Memory Tip

Inspector inspects


Amazon GuardDuty

🧠 Memory Tip

GuardDuty guards


Amazon Detective

🧠 Memory Tip

Detective solves the crime


AWS Security Hub

🧠 Memory Tip

Security Hub = Security command center


Exam Power Summary

Need Service
Identity & permissions IAM
Single sign-on IAM Identity Center
Secrets Secrets Manager
DDoS protection AWS Shield
Web app firewall AWS WAF
Encryption keys AWS KMS
Sensitive S3 data Macie
SSL/TLS certs ACM
Threat detection GuardDuty
Investigation Detective
Central visibility Security Hub


Study materials:


Raw Input Notes:

Authentication: Process of verifying identity of user or entity. Authorization: Grants users certain access rights / permissions.

Shared Responsibility Model

Customers: Security in the cloud: Customers are responsible for securing everything they create and manage in the AWS Cloud.

AWS: Security of the cloud: AWS operates, manages, controls components of all layers of the infrastructure. (Foundational software, virtualization, hardware and global infrastructure that supports DBs from which services operate.)


AWS Security Controls:


IAM is deny by default. IAM Roles allow users to gain temporary access to permissions. Example, an employee might need to work as a barista in morning and cashier in afternoon. An AWS account can only have one root user, which cannot be deleted.


Principle of least privilege dictactes that you should only give people and systems access to what they need and nothing else.


AWS IAM Identity Center

Federated identity management is a system that allows users to access multiple applications, services, or domains uing a single set of credentials.


AWS Secrets Manager

Secrets are confidential or private information intended to be known only to specific individuals or groups. Examples: passwords, database credentials, API keys.


AWS Systems Manager

Nodes are connection points in a network, system, or structure.


Network and Application Attacks

AWS Network and Application Protection

AWS Protection through Services


Types of Data Encryption

AWS Data Protection

AWS Protection Services

Amazon Macie

AWS Certificate Manager (ACM)

Detection and Response Services


Feedback

Have thoughts or suggestions about this post?