Interviewing
CtrlK
BlogInterviewing GuideGovernance, Risk, and Compliance
  • Overview
  • Intro
    • General
    • Career
    • Behavioral-Based
  • AWS
    • General
      • Can you describe the different components of AWS security?
      • Ensure the security of its data centers?
      • Concept of least privilege and how it applies to AWS?
      • How does AWS implement network security?
      • Types of AWS Identity and Access Management (IAM) policies?
      • AWS Secure Sockets Layer (SSL) and Transport Layer Security (TLS) work?
      • AWS Security Groups and how they can be used to control inbound and outbound traffic
      • How does AWS implement encryption to protect data at rest and in transit?
      • Can you describe the different types of AWS firewalls (e.g. Network Firewall, Web Application Firewa
      • Enable secure access to resources using IAM roles and temporary credentials?
      • How does AWS enable secure data transfer using AWS Transfer Family (e.g. SFTP, FTPS)?
      • How does AWS enable secure application development using services such as AWS Secrets Manager and AW
      • Features of AWS Shield and how it can be used to protect against DDoS
      • Enable secure communication between services using VPC endpoints and AWS PrivateLink?
      • Can you describe the security features of AWS Direct Connect and how it can be used to establish a s
    • Securing
    • S3
  • Security Domains & Technical Aptitude
    • General
    • Security & Privacy Governance
    • Cloud Security
    • Compliance
    • Cryptographic Protections
    • Data Classification & Handling
    • Identification & Authentication
    • Network Security
    • Privacy
    • Risk Management
    • Mobile Device Management
    • Third-Party Management
    • Web Security
  • Project Coordination & Collaboration
    • Project Management
  • Not Ready
    • Vulnerability & Patch Management (Empty)
    • Threat Management (Empty)
    • Security Awareness & Training (Empty)
    • Security Operations (Empty)
    • Secure Engineering & Architecture (Empty)
    • Information Assurance (Empty)
    • Incident Response (Empty)
    • Endpoint Security (Empty)
    • Continuous Monitoring (Empty)
    • Configuration Management (Empty)
    • Asset Management (Empty)
    • Change Management (Empty)
    • Business Continuity & Disaster Recovery (Empty)
Powered by GitBook
On this page
  1. AWS

General

PreviousWhat project have you done that you're most proud of?NextCan you describe the different components of AWS security?

Last updated 2 years ago