CNIT271_Lab3_Fall2023-1

.pdf

School

Cornell University *

*We aren’t endorsed by this school

Course

5011

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

8

Report

Uploaded by EarlRiverLapwing18

CNIT 27100 Cybersecurity Fundamentals II, Fall 2023 Lab 3: Cloud Computing Architecture and Security Due Date: Oct 14, 2023, 11:59 pm Objectives : Investigate and perform hand-on activities on two real-world cloud computing platforms: Identify security mechanisms (access control mechanisms/models) and gain experience with cloud security tools in these two cloud platforms o Amazon Web Services (AWS) Type: Individual Deliverables : o Lab Report Required: Yes Notes : You can use your Windows and/or Linux machine to complete this lab assignment. For any resource that you create in the AWS cloud, make sure to name it based on your groupnumber_resourcename. This ensures to keep your resources separate from other students’ resources. Do not alter other stud ents’ resources in the cloud. Instructions: Task 1. (35 points) Go to the AWS cloud account and login to the AWS Management console - https://aws.amazon.com/ a. The login information is posted on the Brightspace (username and password). Go to Brightspace, in Lab3 assignment. This will give you access to the AWS cloud console Dashboard (take a screenshot showing all the components being reflected in the dashboard) . Now, in AWS cloud platform, your account is main entry for using any services in the cloud. Once you login, the first thing to do is select appropriate region (select US East for this lab) from the dropdown at the top on right hand side.
Within an account, the administrator can create a set of users and assign them permissions. Each user can login to the account using their user ID and password, and then use cloud resources within that account. b. Now, you can start exploring the AWS cloud services by clicking on the Navigation Menu as shown in Figure 1. To find different products/services, scroll through the Navigation and find desired product. (Note: Remember to take screenshots as you work through the cloud products/services.) First, go to Security, Identity, and Compliance >> IAM. i. What do you see here? (include screenshot and discuss what do you understand from the dashboard you are seeing here) There is an account ID assigned to every account which is sensitive information that you should not share with anyone, only with a trusted group if needed. The users in that account will need the account ID to login along with the Sign-in URL to login, posted in Brightspace. ii. Now, in IAM, you should be able to create new users for this account (make sure to name the users starting with groupnumber_userxx ) and assign them roles and policies which defines what access they have in the AWS account. Go to Users >> Add Users. You can define a user name and add them with specific access and credentials. Figure 1
- Next, create Roles and add permissions to these roles. While adding permissions, expand the policy names to check the policy format. There are a set of default policies, but you can also create your own policy by clicking on Create Policy (you don’t need to create a new policy, but explore how policy can be created, what are the different components, at the end, after selecting different options, you can cancel or delete the policy). Make sure to take screenshots of the steps. iii. Answer the following questions here. ( Note: you will need to review AWS Cloud Documentation - https://docs.aws.amazon.com/ to answer these questions.) - What is the difference between Roles and Policies in AWS cloud? - What are the different components of a AWS policy and its meaning? - What access control model (e.g., RBAC) is AWS using? Is it one or a combination of different mechanisms/models? - While creating users, you can assign Tags (key-value pairs). What are these tags and how they might be used? - What are Access Keys and the purpose of creating these keys? Should it be shared with others? Task 2 (30 points): a. Now, explore other services Compute >> EC2 >> Launch Instance . There are several options available but for this task, you need to create a Linux virtual machine (Ubuntu 22.xx or higher) and then select t2.micro to be within the free tier limit. Set default configurations and configure a security rule for SSH access and make sure Port 22 is open ( there will be a default rule created for it, so keep it) . In the final step, Review Instance Launch take a screenshot for all your configurations. Also, remember to keep default settings for Network, Storage, and no changes in the Advanced details . i. Now, configure a secure way to remotely access your VM, you might get an option to set-up an existing key-pair. See the screenshot below. Make sure to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: population of a colony of mosquitoes obeys the law of uninhibited growth. If N is the population of…
Q: Make a sign diagram for the derivative of the function. f(x)=x+4x38x² +62 f'(x) [ increase 0…
Q: Data Analysis Question, please answer the question in the simplest terms and explain where some…
Q: For your answers, write out the units (i.e. millivolt). For the circuit shown in Figure 11 below,…
Q: what does this mean/do in Python? when loading in a text file for i in f: line =…
Q: Use the definition of Ax to write the matrix equation as a vector equation. 19 0 2 4-3 -2 9 5 3 22 6…
Q: The atoms of different elements have: Group of answer choices A) the same atomic number and same…
Q: 4 = Suppose sin 0 = and is in quadrant IV 5 Find the exact values of the other five trigonometric…
Q: Write the equation for the graphed function. y = y 6t -4 -2 2 21
Q: Shifting from second to third gear in a car is an example of which type of motor skill?   Question 4…
Q: Solve the linear inequality. Other than Ø, graph the solution set on a number line. 3 3 - 18- 5 (5x…
Q: Consider the four heat engine systems below. Use the Clausius Inequality (Equation 7.1 in your…
Q: Let f be a function that maps X into y. Let {Gx|x€ A3 be an indexed family of subsets of Y. Show f"…
Q: An important difference between the open- and closed-loop control systems is that the   Question 9…
Q: Use the Power Rule to compute the derivative. (Use symbolic notation and fractions where needed.) d…
Q: 6. A mass attached to a spring moves horizontally on a smooth surface. The position of the spring…
Q: 2. Show that for any real number c, there is exactly one integer in the interval (c,c + 1].
Q: During a cold winter night in Boston, a family uses a 1500 W electric space heater with an applied…
Q: Ta Pare shown below. T= 38, &F= 14. Let R-T+F. Determine the components, magnitude, & direction of…
Q: Which is the correct hypothesis? A Ho: p = 5.25 Ha: p 5.25 E Ho: μ = 5.25 Ha: μ > 5.25 C Ho: p =…
Q: Questions: 1) Calculate the theoretical percent water (a) nickel(II) sulfate heptahydrate 19 NiSO4…
Q: Which of the above sketches correspond to TT (pi) character MOS? Count both T and TT* as s…