Some Things Happen?
IAM Who?
How to Controlling the Cloud?
Do I really have to Security?
Who needs Standards?
100

This zone has a worldwide name.

Soft Zoning

100

This component is a way of defining allowed or denied permissions for a user or resource by attaching this component.

IAM Policies

100

This AWS resource provides an additional layer of security when implemented on the VPC side, where it acts like a logical firewall.

AWS Network ACL
100

This cloud component focuses on firewalls, intrusions detection, encryption, etc.

Security Component

100

This is a security best practice that should follow when setting permissions in IAM policies.

Grant least privilege

200

This mode within IPSec has both the source and destination hosts performing cryptographic functions.

Transport mode

200

This section of an IAM policy determines what assets the IAM policy will use.

The Resource section

200

This reduces the need to sign onto multiple systems to gain access.

Single Sign-On (SSO)

200

This is when you should give out the IAM user root ID and password to an end user for logging into the system.

Never

200

This is what FISMA stands for.

Federal Information Security Management Act.

300

This federal program outlines and standardizes security assessments, authorization, and continuous monitoring for cloud products/services.

Federal Risk and Authorization Management Program (FedRAMP).

300

This is a type of AWS IAM policy that allows you to grant or deny permissions on AWS accounts or IAM users on specific objects within the Amazon S3 environments.

A bucket policy

300

The SAN security process restricts storage access between initiators and targets.

Zoning

300

This security mechanism secures access to storage resources by using an ordered list of permit and deny statements.

A storage Access Control List(ACL)

300

This networking component mimics the job of a firewall and also controls the outbound and inbound traffic.

A Security Group

400

This a zone defined by group of ports is called.

Hard Zone

400

This allows multiple organizations to be able to use the same data for identification purposes.

Federations

400

This AWS feature provides a constant monitoring service that assists in locating and solving malicious security breaches within your AWS infrastructure.

Amazon GuardDuty

400

This AWS resource is considered a federated tool that allows you to have your own single sign-on using identity providers such as Microsoft Activity Directory Federation Services(ADFS) or Google.

AWS Cognito

500

These are two security options used within Amazon S3 that can be used for preventing accidental delete action.

Versioning and Multi-Factor Authentication (MFA ) delete

500

This section of an IAM policy determines the behaviors and actions of what the policy will allow.

The Effects Section

500

This is defined as a framework/architecture which uses different protocols to provide integrity, confidentiality, and authentication of data over a TCP/IP network

IP Security(IPSec)

500

This access control method determines access rights based on the data comparing with the security properties of the system.

Mandatory Access Control (MAC)