Interviewing
search
Ctrlk
BlogInterviewing GuideGovernance, Risk, and Compliance
  • Overview
  • Intro
    • Generalchevron-right
    • Careerchevron-right
    • Behavioral-Basedchevron-right
  • AWS
    • Generalchevron-right
      • Can you describe the different components of AWS security?
      • Ensure the security of its data centers?
      • Concept of least privilege and how it applies to AWS?
      • How does AWS implement network security?
      • Types of AWS Identity and Access Management (IAM) policies?
      • AWS Secure Sockets Layer (SSL) and Transport Layer Security (TLS) work?
      • AWS Security Groups and how they can be used to control inbound and outbound traffic
      • How does AWS implement encryption to protect data at rest and in transit?
      • Can you describe the different types of AWS firewalls (e.g. Network Firewall, Web Application Firewa
      • Enable secure access to resources using IAM roles and temporary credentials?
      • How does AWS enable secure data transfer using AWS Transfer Family (e.g. SFTP, FTPS)?
      • How does AWS enable secure application development using services such as AWS Secrets Manager and AW
      • Features of AWS Shield and how it can be used to protect against DDoS
      • Enable secure communication between services using VPC endpoints and AWS PrivateLink?
      • Can you describe the security features of AWS Direct Connect and how it can be used to establish a s
    • Securingchevron-right
    • S3
  • Security Domains & Technical Aptitude
    • Generalchevron-right
    • Security & Privacy Governance
    • Cloud Security
    • Compliancechevron-right
    • Cryptographic Protectionschevron-right
    • Data Classification & Handlingchevron-right
    • Identification & Authenticationchevron-right
    • Network Securitychevron-right
    • Privacychevron-right
    • Risk Managementchevron-right
    • Mobile Device Managementchevron-right
    • Third-Party Managementchevron-right
    • Web Securitychevron-right
  • Project Coordination & Collaboration
    • Project Managementchevron-right
  • Not Ready
    • Vulnerability & Patch Management (Empty)
    • Threat Management (Empty)
    • Security Awareness & Training (Empty)
    • Security Operations (Empty)
    • Secure Engineering & Architecture (Empty)
    • Information Assurance (Empty)
    • Incident Response (Empty)
    • Endpoint Security (Empty)
    • Continuous Monitoring (Empty)
    • Configuration Management (Empty)
    • Asset Management (Empty)
    • Change Management (Empty)
    • Business Continuity & Disaster Recovery (Empty)
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. AWS

General

PreviousWhat project have you done that you're most proud of?chevron-leftNextCan you describe the different components of AWS security?chevron-right

Last updated 3 years ago