Enhance your understanding of AWS IAM security best practices with this quiz designed for cloud users. Cover essential concepts such as password policies, least privilege, and secure access management to strengthen your identity and access strategies.
Which practice reflects the principle of least privilege when granting permissions to a new user in a cloud environment?
Explanation: The correct approach is to only assign permissions needed for specific job functions, reducing the risk of unintended actions or breaches. Granting full administrative access violates this principle and increases risk. Allowing unrestricted access or duplicating permissions without assessing their necessity can expose sensitive resources unnecessarily. Properly scoped permissions maintain security and control.
Why is enabling multi-factor authentication (MFA) for user accounts considered an important security practice?
Explanation: Enabling MFA adds a second layer of security, making unauthorized access less likely even if a password is compromised. Allowing resource access without credentials removes security controls. MFA does not eliminate passwords but supplements them. It doesn’t specifically disable access from new devices; instead, it verifies the user's identity through an additional factor.
What action is recommended regarding the use of a cloud root account after its initial setup?
Explanation: The best practice is to restrict root account usage and secure it with MFA, as it has broad permissions. Using the root account for daily tasks increases risk. Sharing credentials, even with trusted staff, is unsafe and should be avoided. Disabling MFA decreases protection, making the account more vulnerable.
Which password policy setting most improves security for identity and access management users?
Explanation: Enforcing strong passwords makes it harder for attackers to guess or crack passwords. Allowing any password or never rotating them significantly weakens security. Sharing passwords, even for convenience, should be strictly avoided. Strong password requirements are basic but crucial for user account protection.
What is an advantage of using roles instead of long-term credentials for applications needing access to resources?
Explanation: Roles offer temporary credentials, reducing the risk of exposure from long-lived secrets and simplifying credential rotation. Making credentials visible in logs is a flaw, not a benefit. Manual updates increase complexity, not security. Allowing unlimited unmonitored access is never recommended.
Why is it better to assign permissions to user groups rather than to individual users directly in an identity management system?
Explanation: Assigning permissions to groups simplifies management, ensuring consistent permissions when users come or go. Groups do not inherently grant higher privileges unless configured. Individual user assignment is technically possible but impractical at scale. Groups can support varied permission sets, not just one.
What should you do first if an access key is found to be exposed or compromised?
Explanation: Deactivating or removing the exposed key prevents unauthorized use right away. Sharing the compromised key further increases risk. Merely monitoring while continuing use leaves the account vulnerable. Changing only the password is insufficient since the access key provides another access method.
How does regularly reviewing and auditing permissions in an identity and access management environment benefit security?
Explanation: Routine audits help keep permissions up to date and aligned with users’ actual needs, minimizing potential risks. Automatically blocking all users disrupts service and is not best practice. Unrestricted access sacrifices security. Making passwords never expire ignores basic security recommendations.
What is one use of service control policies (SCPs) in a managed cloud environment?
Explanation: SCPs limit or allow certain actions within accounts, providing an extra layer of permission control. Setting public network rules and configuring billing alerts are not SCP functions. Granting root access via SCPs is neither possible nor recommended.
Which action is recommended to maintain good credential hygiene for users in an identity and access management system?
Explanation: Regularly rotating passwords and keys reduces the risk of compromised credentials being used undetected. Writing passwords on notes is insecure, as is reusing passwords for multiple users. Never updating credentials increases the window of opportunity for attackers.