0
0
AWScloud~5 mins

Security pillar principles in AWS - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the main goal of the Security pillar in cloud architecture?
To protect data, systems, and assets by implementing strong controls and managing risks effectively.
Click to reveal answer
beginner
What does 'Identity and Access Management' mean in the Security pillar?
It means controlling who can access resources and what actions they can perform, using tools like user accounts and permissions.
Click to reveal answer
beginner
Why is 'Data Protection' important in the Security pillar?
Because it keeps information safe from unauthorized access or changes, often using encryption and backups.
Click to reveal answer
intermediate
What role does 'Detective Controls' play in the Security pillar?
They help find and respond to security events quickly by monitoring and logging activities.
Click to reveal answer
intermediate
How does 'Infrastructure Protection' contribute to security?
By securing the hardware and software that run cloud services, such as firewalls and network controls.
Click to reveal answer
Which of the following is a key focus of the Security pillar?
AImproving application speed
BManaging user access and permissions
CReducing storage costs
DIncreasing server uptime
What is a common method to protect data in the cloud?
ACompression
BCaching
CEncryption
DLoad balancing
Which tool helps detect security issues by recording activities?
ALogging
BScaling
CCaching
DReplication
What does Identity and Access Management control?
AWho can use resources and what they can do
BHow fast data moves
CHow much storage is used
DHow many servers run
Which of these protects the cloud infrastructure itself?
AUser training
BData backups
CApplication updates
DFirewalls and network controls
Explain the main principles of the Security pillar in cloud architecture.
Think about how to control access, protect data, detect issues, and secure infrastructure.
You got /4 concepts.
    Describe how Identity and Access Management helps secure cloud resources.
    Focus on who can do what and limiting permissions.
    You got /4 concepts.