IAM Least Privilege

0

Do we have any documentation or resources that talks about how AWS has implemented IAM, trust, least privilege, etc.

已提問 1 年前檢視次數 300 次
3 個答案
0

I'm not sure if I understand the question correctly.

If you're asking "how does AWS implement least-privilege access for AWS personnel to AWS services" then the best answer I can give is that we are audited for that (and other things) based on many security compliance programs. The audit process ensures that we are adhering to the standards set in those programs.

If you're asking "what's the best way for me to create least-privilege IAM permissions" then I'd suggest looking at AWS IAM Access Analyzer. There is also a workshop and quite a few blog posts.

Adding: You might look at this video from the Amazon Builder's Library - lots of other good content there too.

profile pictureAWS
專家
已回答 1 年前
  • Any blog/article customer focused? To inspire how we at AWS have utilized these best practices of least privileges & IAM.

0

There is Security best practices in IAM available in the docs, specifically talking about the least privilege https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html

For refining permissions we can use Access Advisor : Access Advisor shows the services that this user can access and when those services were last accessed. Review this data to remove unused permissions. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html

AWS
已回答 1 年前
0

An AWS account is inherently least privileged. That is how they are designed. The root user has full admin but after that every resource is only given the permissions you give it as the admin.

Services can’t do anything without attached policies. You either attach those policies yourself or you deploy templates that do so. Either way, you initiated the actions.

It’s the shared responsibility model. AWS give you all the rope you want. They are security ‘of’ the cloud. You are security ‘in’ the cloud.

That is documented in most mentions of permissions and specifically in the Well Architected Frameworks security Pilar.

Review the SRM and Sec Pilar and that should give you what you are looking for.

profile picture
已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南