0
0
Cybersecurityknowledge~5 mins

Cloud identity and access management in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is Cloud Identity and Access Management (IAM)?
Cloud IAM is a system that helps control who can access cloud resources and what actions they can perform. It ensures only authorized users can use specific cloud services or data.
Click to reveal answer
beginner
What are 'roles' in Cloud IAM?
Roles are sets of permissions that define what actions a user or group can perform on cloud resources. Assigning a role to a user grants them those permissions.
Click to reveal answer
intermediate
Why is the principle of least privilege important in Cloud IAM?
It means giving users only the permissions they need to do their job, no more. This reduces the risk of accidental or malicious misuse of cloud resources.
Click to reveal answer
beginner
What is multi-factor authentication (MFA) in Cloud IAM?
MFA requires users to provide two or more verification methods to access cloud resources, such as a password plus a code from a phone. This adds extra security.
Click to reveal answer
intermediate
How does Cloud IAM help with auditing and compliance?
Cloud IAM tracks who accessed what and when. This audit trail helps organizations check compliance with rules and investigate security incidents.
Click to reveal answer
What does Cloud IAM primarily control?
AThe cost of cloud services
BWho can access cloud resources and what they can do
CThe speed of cloud network connections
DThe physical location of cloud servers
Which of the following best describes a 'role' in Cloud IAM?
AA cloud storage bucket
BA user’s password
CA set of permissions assigned to users
DA type of cloud server
Why use the principle of least privilege in Cloud IAM?
ATo give users all permissions by default
BTo increase cloud storage space
CTo speed up cloud performance
DTo reduce security risks by limiting permissions
What does multi-factor authentication (MFA) require?
ATwo or more verification methods
BA single username
COnly a password
DNo authentication
How does Cloud IAM support auditing?
ABy tracking user access and actions
BBy deleting user data automatically
CBy increasing cloud speed
DBy encrypting all files
Explain how Cloud IAM helps keep cloud resources secure.
Think about who can do what and how access is protected.
You got /4 concepts.
    Describe the role of auditing in Cloud IAM and why it matters.
    Consider how knowing past actions helps security and rules.
    You got /4 concepts.