How to create true attribute based access controls with IAM

0

I want to be able to implement Attribute Based Access Controls on a complex data system. To implement this, I want to use a dynamic verification ideally completely in IAM to preserve performance. For example: Person A has been given permissions to see objects with Green, Purple and Blue categories, but cannot see objects that have a Vehicle category. Person B can see Purple and Vehicle but cannot see Green or Blue. Object A is stored in the Vehicle category S3 and is also contains Blue data.

We initially looked at tags, but the customer currently manages thousands of tags and that equates to billions of potential tag combinations - and this number is always growing.

I am looking for a clean way to implement this access control that would meet these requirements.

1개 답변
0

ABAC in AWS is implemented using tags on service resources and IAM principals and then referencing these tags in conditions in IAM policies. You can find services that support ABAC here: AWS services that work with IAM. From this doc:

ABAC (authorization based on tags) – To control access based on tags, you provide tag information in the condition element of a policy using the aws:ResourceTag/key-name, aws:RequestTag/key-name, or aws:TagKeys condition keys. If a service supports all three condition keys for every resource type, then the value is Yes for the service. If a service supports all three condition keys for only some resource types, then the value is Partial. 

IAM tutorial: Define permissions to access AWS resources based on tags

profile pictureAWS
전문가
kentrad
답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠