InterviewStack.io LogoInterviewStack.io

Infrastructure Security and Access Control Questions

Design and implementation of security controls within infrastructure and access management. Topics include network segmentation and isolation, security groups and network access control lists, identity and access management policies and least privilege principles, encryption at rest and in transit, secrets management and key management practices, audit logging and monitoring, secure remote access patterns such as bastion hosts and virtual private networks, session recording and privileged access governance, threat modeling for infrastructure components, and trade offs for compliance and operational complexity.

MediumTechnical
50 practiced
A TLS certificate for your primary load balancer expired in production causing outages. Describe immediate remediation steps to restore service, and long-term changes you would implement to prevent recurrence, including monitoring and automation.
HardTechnical
44 practiced
Write a script (bash or Python) that audits a fleet of Linux servers for insecure sudoers entries. Requirements: parse /etc/sudoers and /etc/sudoers.d entries, flag lines granting NOPASSWD or ALL to non-root users or groups, and produce a remediation report with suggested corrected lines. Explain how you'd deploy and run this safely.
EasyTechnical
74 practiced
What is multi-factor authentication (MFA), and which MFA patterns are recommended for system administrators accessing critical infrastructure? Discuss hardware tokens, TOTP, push-based methods, and integration points like SSO and PAM.
HardTechnical
39 practiced
Describe an algorithm and provide pseudocode or a short implementation (Python or Go) for a tool that scans firewall/security-group rules across multiple cloud accounts and flags overly permissive rules (for example, 0.0.0.0/0 on port 22 or CIDR ranges that exceed organizational limits). Outline performance and pagination handling for large inventories.
EasyTechnical
49 practiced
Explain the principle of least privilege in the context of infrastructure and access control. Provide concrete examples of how you would enforce least privilege for human users, service accounts, and CI/CD pipelines across cloud and on-prem environments, and mention automation or tools you would use to maintain it.

Unlock Full Question Bank

Get access to hundreds of Infrastructure Security and Access Control interview questions and detailed answers.

Sign in to Continue

Join thousands of developers preparing for their dream job.