Resource-Based Policies vs Identity Policies: Quick Comparison Quiz Quiz

Explore the key differences between resource-based policies and identity policies in access management. This quiz helps reinforce understanding of how each policy type governs permissions, their primary use cases, and important terminology for effective permissions control.

  1. Scope of Policies

    Which type of policy is typically attached directly to a resource to specify who can access it?

    1. Identity policy
    2. Role policy
    3. Network policy
    4. Resource-based policy

    Explanation: A resource-based policy is attached directly to the resource and outlines who may access it and with what permissions. An identity policy is usually connected to users or groups, not directly to resources. Role policy and network policy are not accurate in this context; the term 'role policy' refers to permissions associated with roles, and 'network policy' generally relates to network controls, not access permissions.

  2. Attachment Location

    If you want to allow an external user access to a resource without modifying their identity, which policy would you use?

    1. Identity policy
    2. Audit policy
    3. Action policy
    4. Resource-based policy

    Explanation: Resource-based policies are useful when granting access to users who are outside your organization because the permission is attached to the resource, not the user. Identity policies would require changes to the user's account, which is not always possible for external users. Action policy and audit policy are unrelated to this scenario.

  3. Policy Perspective

    Which statement best describes an identity policy?

    1. It manages system logs for auditing.
    2. It is attached to users or groups to define what resources they can access.
    3. It is attached to resources to define which actions are permitted.
    4. It controls network traffic filters.

    Explanation: Identity policies specify what actions individuals or groups can perform on various resources. Resource-based policies, by contrast, are attached to resources and specify who can access them. Managing system logs or controlling network traffic are unrelated, handled by audit and network controls, not identity policies.

  4. Policy Example Scenario

    A document allows both internal and external users to read it without changing their accounts. What type of policy supports this setup?

    1. Session policy
    2. Network-based policy
    3. Identity policy
    4. Resource-based policy

    Explanation: This scenario is best supported by a resource-based policy because it allows direct permissions on the resource for both internal and external users. Identity policy would require altering individual accounts. Session policy and network-based policy do not deal with user access to specific resources.

  5. Policy Evaluation

    Which type of policy is evaluated when a user tries to access a resource and only the user's permissions are checked?

    1. Encryption policy
    2. Identity policy
    3. Resource-based policy
    4. Group policy

    Explanation: Identity policies are checked when access depends solely on permissions granted to the user's identity. Resource-based policies are evaluated when permissions are set directly on the resource. Encryption and group policies address different aspects; encryption policies manage data protection, and group policies are structures for organizing users, not granting direct permissions.

  6. Granting Cross-Account Access

    Which policy type is best suited for granting cross-organization or cross-account access to a resource?

    1. Database policy
    2. Identity policy
    3. Resource-based policy
    4. Session-based policy

    Explanation: Resource-based policies are ideal for granting access across accounts or organizations, as they can specify permissions to users outside the primary domain. Identity policies work within a specific account or organization. Session-based and database policies do not typically handle access across accounts.

  7. Policy Modification

    If you want to grant temporary access to a group of resources for a new team, which approach is commonly used?

    1. Change the audit logging settings
    2. Attach an identity policy to the team members
    3. Attach resource-based policies to every resource
    4. Modify network firewall rules

    Explanation: It's efficient to attach an identity policy to the team members, giving them permission to use the group of resources. Attaching resource-based policies to every resource can be complicated and time-consuming. Network firewalls and audit logging settings are unrelated to user permissions in this context.

  8. Mutual Policy Evaluation

    When a system checks both the user's identity policy and the resource-based policy before allowing access, what is a possible outcome?

    1. Both policies must grant permission for access to be allowed.
    2. Either policy alone is enough for access to be granted.
    3. Only the resource-based policy matters; the identity policy is ignored.
    4. Only the identity policy matters; the resource-based policy is ignored.

    Explanation: For access to be approved, both the identity and resource-based policies must allow the action. Ignoring one or granting access if only one is satisfied would be insecure. The 'either policy alone' option doesn't reflect standard access control practices.

  9. Policy Content

    Which aspect do both resource-based and identity policies generally specify?

    1. Actions permitted on the resource
    2. Encryption algorithms used
    3. Network routes
    4. Log file retention

    Explanation: Both types of policies define which actions (such as read or write) are permissible. Encryption algorithms, network routes, and log file retention are managed through other mechanisms, not through access policies.

  10. Policy Inheritance

    If a user has an identity policy denying access, but the resource-based policy allows it, what is the effective permission?

    1. User is prompted for approval
    2. Access is allowed
    3. Policy defaults are applied
    4. Access is denied

    Explanation: A denial in any policy results in access being denied, as the safest approach is to default to least privilege. If both allowed, then access would be granted. Prompting for approval or relying on policy defaults does not accurately reflect standard access control behavior.