Glue "Column Level Access" without LakeFormation
Customer is going to implement a DataLake solution in an AWS region without LakeFormation and they want to implement the Column Level Access with AWS native IAM/Services. Is there any work around for this requirement?
With IAM , you can only work till a glue table. It’s access to table or not and on a S3 object ( file), it’s access to a file or not.
For fine grain access (RBAC/ABAC) on file contents ( rows and columns ), you would need EMR +Ranger which will provide you with an option to specify policies that can help with fine grain access. Since you have not mentioned how the customer wants to read the data ( ex EMR/Athena ), you can think of serving the data via redshift which has its own fine authorization constructs.
If you really want to achieve and have some breather to have copies of table definitions ( ex TableA_clear/TableA_priv which excludes the columns etc ) , then you can play with
https://docs.aws.amazon.com/athena/latest/ug/fine-grained-access-to-glue-resources.html And grant access to tables. Ideally , you are creating table definitions by removing the columns that you don’t want to show to some users ( proactively defining the ddls rather than run time policy binding that you get from Ranger or Lakeformation ) — not recommended at all.
I would also advise any customer to start exploring Lakeformation as it brings the centralized model of specifying and managing security and access policies over lake artifacts which are modeled to be used as databases and tables . Any reason why they are not willing to use Lakeformation?
Relevant questions
Glue "Column Level Access" without LakeFormation
Accepted Answerasked 2 years agoHow to avoid transforming data for a dropped column without updating glue catalog
asked 3 months agoHow to escape a comma in a csv file in AWS Glue?
Accepted AnswerMultitenacy in quicksight embedded dashboard without session capacity pricing
asked 3 months agoUsing JavaScript and AWS SDK to access S3 Bucket without Credentials
asked 2 years agoAurora Row level and column level security
Accepted AnswerPassword/SSH based authentiaction for AWS CLI // authentication for AWS CLI without needing access keys
Accepted Answerasked 6 months agoAWS Glue API get-partitions can't seem to cope with the partition column name "key" in the `expression` filter
asked 4 months agoLakeFormation assumed role cannot access s3 objects during Athena requests ("Permission denied on S3 path" )
asked 5 months agoHow to best handle lake formation row level security from a shared IAM role
asked 7 months ago