SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using analytics to set access controls
in AWS
Ujjwal Pugalia
Sr. Product Manager
AWS Identity
S D D 2 0 4
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Access controls in AWS
Access control model that supports innovation
Tools to dial in access controls over time
Using analytics to set access controls confidently
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Related breakouts
Wednesday, June 26
FND314 - Managing and governing multi-account AWS environments
using AWS Organizations
11:00 a.m. – 12:00 p.m. | Level 0, Hall B2, Green
Wednesday, June 26
SDD314 - Enforcing security invariants with AWS Organizations
2:00 p.m. – 3:00 p.m. | Level 0, Hall B2, Red
Wednesday, June 26
SDD350 - Scale permissions management in AWS with attribute-based
access control
5:00 p.m. – 6:00 p.m. | Level 0, Hall B2, Red
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Setting access controls in AWS
Workforce users Permissions Resources
AWS account
AWS account
AWS account
Who Can access What
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Setting access controls in AWS
Workforce users Permissions Resources
AWS account
AWS account
AWS account
Who Can access What
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Types of access controls in AWS
Workforce users Permissions Resources
AWS account
AWS account
AWS account
Who Can access What
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Types of access controls in AWS
Workforce users Permissions Resources
AWS account
AWS account
AWS account
Who Can access What
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Shared ownership of access controls
Your job: Specification
Define which entities are allowed to perform which actions on
specific resources and under which conditions.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Shared ownership of access controls
AWS’s job: Enforcement
For each request, the service or application evaluates the
permissions you defined to allow or deny access.
Your job: Specification
Define which entities are allowed to perform which actions on
specific resources and under which conditions.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS is using data analysis to help simplify your
job of setting access controls on AWS.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The model
Permission
guardrails
General
workforce
permissions
Dial in
permissions
over time
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations AWS Identity and Access
Management (IAM) roles and
policies
IAM access
advisor
Permission
guardrails
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls at scale
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM access
advisor
Permission
guardrails
IAM roles and
policies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Overview of AWS Organizations
Central governance
and management for
multiple AWS
accounts
Manage billing,
control access,
compliance, and
security, across your
AWS accounts
Automate account
creation, create
groups of accounts
based on business
need. Apply policies
for these groups.
Centrally manage and govern across AWS accounts
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS accounts and organizational units (OUs)
AWS accounts contain your AWS resources
Use resource permissions or roles to share across accounts
Group accounts in your organization into organizational units (OUs) to
simplify management of these accounts
Create multiple OUs within a single organization, and you can create
OUs within other OUs to form a hierarchical structure
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Permission guardrails
• Set permission guardrails by defining the maximum available permissions for IAM entities in an account
• Permissions guardrails are set using AWS Organizations and are called Service Control Policies (SCPs)
• Attach SCPs to the organization, OUs, and individual accounts
• SCPs attached to the root and OUs apply to all OUs and accounts inside of them
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM Policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SCPs and IAM policies
• SCPs do not grant permission; they define the maximum available permissions for IAM entities in an
account
• IAM policies are general workforce permissions that you need to attach to IAM entities to grant them
permissions to a service or resource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls at scale
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM access
advisor
Permission
guardrails
IAM roles and
policies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls at scale
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM access
advisor
Permission
guardrails
IAM roles and
policies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Brigid’s session
Wednesday, June 26
SDD350 - Scale permissions management in AWS with attribute-based access control
5:00 p.m. – 6:00 p.m. | Level 0, Hall B2, Red
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The approach
Get started with access to a broader range of AWS services
Dial in permissions over time
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls at scale
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM access
advisor
Permission
guardrails
Service Control Policies (SCPs)
IAM roles and
policies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS tools for setting access controls at scale
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM access
advisor
Permission
guardrails
Service Control Policies (SCPs)
IAM roles and
policies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
IAM access advisor
• Provides service last accessed information for services allowed through
permissions
• Available for IAM entities (users, roles, groups, and IAM policies)
• Available through the IAM console or APIs
• Available for Organizations entities (organization root, OUs, accounts, and
SCPs)
New!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Overview of dialing in permissions
Step 1: Determine services
last accessed
Step 2: Compare to existing
permissions
Step 3: Remove unused
permissions
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Step 1: Determine services last accessed
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Step 1: Determine services last accessed
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Step 2: Compare to existing permissions
Has access to
Amazon SNS
Amazon S3
AWS Lambda
Amazon API Gateway
AWS KMS
AWS CloudTrail
Amazon Cognito user pools
AWS Organizations
Alexa for Business
AWS Directory Service
AWS Certificate Manager (ACM)
Service last accessed in 60 days
Amazon SNS
Amazon S3
AWS Lambda
Amazon API Gateway
AWS KMS
AWS CloudTrail
Amazon Cognito user pools
AWS Organizations
Alexa for Business
AWS Directory Service
AWS Certificate Manager (ACM)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Step 3: Remove unused permissions
Removed
permissions for
Organizations,
Alexa for Business,
Directory Service,
and ACM
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Access advisor with Organizations
• Confidently set permission guardrails i.e. SCPs using service last accessed
information for OUs and accounts
• Analyze existing SCPs to deny access to services that not used by IAM users
or roles within an account or OU
• Automate analyzing service last accessed information for your organization
using APIs
New!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Recap
General
workforce
permissions
Dial in
permissions
over time
AWS Organizations IAM roles and policies IAM access
advisor
Permission
guardrails
Service Control Policies (SCPs)
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Ujjwal Pugalia
upugalia@amazon.com

Weitere ähnliche Inhalte

Was ist angesagt?

Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Amazon Web Services
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 Amazon Web Services
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Amazon Web Services
 
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...Amazon Web Services
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...Amazon Web Services
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...Amazon Web Services
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Amazon Web Services
 
Evolving perimeters with guardrails, not gates: Improving developer agility -...
Evolving perimeters with guardrails, not gates: Improving developer agility -...Evolving perimeters with guardrails, not gates: Improving developer agility -...
Evolving perimeters with guardrails, not gates: Improving developer agility -...Amazon Web Services
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Amazon Web Services
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Amazon Web Services
 
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Amazon Web Services
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 Amazon Web Services
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Amazon Web Services
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...Amazon Web Services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 Amazon Web Services
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Amazon Web Services
 
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Amazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 

Was ist angesagt? (20)

Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...
 
Evolving perimeters with guardrails, not gates: Improving developer agility -...
Evolving perimeters with guardrails, not gates: Improving developer agility -...Evolving perimeters with guardrails, not gates: Improving developer agility -...
Evolving perimeters with guardrails, not gates: Improving developer agility -...
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 

Ähnlich wie Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019

AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...Amazon Web Services
 
Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Amazon Web Services
 
The Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech TalksThe Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech TalksAmazon Web Services
 
Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Amazon Web Services
 
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Amazon Web Services
 
Understanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and GovernanceUnderstanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and GovernanceAmazon Web Services
 
AWSome Day Online Conference 2018 - Module 3
AWSome Day Online Conference 2018 - Module 3AWSome Day Online Conference 2018 - Module 3
AWSome Day Online Conference 2018 - Module 3Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Amazon Web Services
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...Amazon Web Services
 
HK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopHK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopAmazon Web Services
 
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Amazon Web Services
 

Ähnlich wie Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 (20)

AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...
 
Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...
 
The Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech TalksThe Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
 
Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
 
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
 
Understanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and GovernanceUnderstanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and Governance
 
AWSome Day Online Conference 2018 - Module 3
AWSome Day Online Conference 2018 - Module 3AWSome Day Online Conference 2018 - Module 3
AWSome Day Online Conference 2018 - Module 3
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
HK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopHK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-Workshop
 
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Using analytics to set access controls in AWS Ujjwal Pugalia Sr. Product Manager AWS Identity S D D 2 0 4
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Access controls in AWS Access control model that supports innovation Tools to dial in access controls over time Using analytics to set access controls confidently
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Related breakouts Wednesday, June 26 FND314 - Managing and governing multi-account AWS environments using AWS Organizations 11:00 a.m. – 12:00 p.m. | Level 0, Hall B2, Green Wednesday, June 26 SDD314 - Enforcing security invariants with AWS Organizations 2:00 p.m. – 3:00 p.m. | Level 0, Hall B2, Red Wednesday, June 26 SDD350 - Scale permissions management in AWS with attribute-based access control 5:00 p.m. – 6:00 p.m. | Level 0, Hall B2, Red
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Setting access controls in AWS Workforce users Permissions Resources AWS account AWS account AWS account Who Can access What
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Setting access controls in AWS Workforce users Permissions Resources AWS account AWS account AWS account Who Can access What
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Types of access controls in AWS Workforce users Permissions Resources AWS account AWS account AWS account Who Can access What
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Types of access controls in AWS Workforce users Permissions Resources AWS account AWS account AWS account Who Can access What
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Shared ownership of access controls Your job: Specification Define which entities are allowed to perform which actions on specific resources and under which conditions.
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Shared ownership of access controls AWS’s job: Enforcement For each request, the service or application evaluates the permissions you defined to allow or deny access. Your job: Specification Define which entities are allowed to perform which actions on specific resources and under which conditions.
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS is using data analysis to help simplify your job of setting access controls on AWS.
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The model Permission guardrails General workforce permissions Dial in permissions over time
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls General workforce permissions Dial in permissions over time AWS Organizations AWS Identity and Access Management (IAM) roles and policies IAM access advisor Permission guardrails
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls at scale General workforce permissions Dial in permissions over time AWS Organizations IAM access advisor Permission guardrails IAM roles and policies
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Overview of AWS Organizations Central governance and management for multiple AWS accounts Manage billing, control access, compliance, and security, across your AWS accounts Automate account creation, create groups of accounts based on business need. Apply policies for these groups. Centrally manage and govern across AWS accounts
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS accounts and organizational units (OUs) AWS accounts contain your AWS resources Use resource permissions or roles to share across accounts Group accounts in your organization into organizational units (OUs) to simplify management of these accounts Create multiple OUs within a single organization, and you can create OUs within other OUs to form a hierarchical structure
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Permission guardrails • Set permission guardrails by defining the maximum available permissions for IAM entities in an account • Permissions guardrails are set using AWS Organizations and are called Service Control Policies (SCPs) • Attach SCPs to the organization, OUs, and individual accounts • SCPs attached to the root and OUs apply to all OUs and accounts inside of them
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM Policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SCPs and IAM policies • SCPs do not grant permission; they define the maximum available permissions for IAM entities in an account • IAM policies are general workforce permissions that you need to attach to IAM entities to grant them permissions to a service or resource
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls at scale General workforce permissions Dial in permissions over time AWS Organizations IAM access advisor Permission guardrails IAM roles and policies
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls at scale General workforce permissions Dial in permissions over time AWS Organizations IAM access advisor Permission guardrails IAM roles and policies
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Brigid’s session Wednesday, June 26 SDD350 - Scale permissions management in AWS with attribute-based access control 5:00 p.m. – 6:00 p.m. | Level 0, Hall B2, Red
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The approach Get started with access to a broader range of AWS services Dial in permissions over time
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls at scale General workforce permissions Dial in permissions over time AWS Organizations IAM access advisor Permission guardrails Service Control Policies (SCPs) IAM roles and policies
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS tools for setting access controls at scale General workforce permissions Dial in permissions over time AWS Organizations IAM access advisor Permission guardrails Service Control Policies (SCPs) IAM roles and policies
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. IAM access advisor • Provides service last accessed information for services allowed through permissions • Available for IAM entities (users, roles, groups, and IAM policies) • Available through the IAM console or APIs • Available for Organizations entities (organization root, OUs, accounts, and SCPs) New!
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Overview of dialing in permissions Step 1: Determine services last accessed Step 2: Compare to existing permissions Step 3: Remove unused permissions
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Step 1: Determine services last accessed
  • 35. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Step 1: Determine services last accessed
  • 36. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Step 2: Compare to existing permissions Has access to Amazon SNS Amazon S3 AWS Lambda Amazon API Gateway AWS KMS AWS CloudTrail Amazon Cognito user pools AWS Organizations Alexa for Business AWS Directory Service AWS Certificate Manager (ACM) Service last accessed in 60 days Amazon SNS Amazon S3 AWS Lambda Amazon API Gateway AWS KMS AWS CloudTrail Amazon Cognito user pools AWS Organizations Alexa for Business AWS Directory Service AWS Certificate Manager (ACM)
  • 37. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Step 3: Remove unused permissions Removed permissions for Organizations, Alexa for Business, Directory Service, and ACM
  • 38. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 39. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Access advisor with Organizations • Confidently set permission guardrails i.e. SCPs using service last accessed information for OUs and accounts • Analyze existing SCPs to deny access to services that not used by IAM users or roles within an account or OU • Automate analyzing service last accessed information for your organization using APIs New!
  • 40. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 41. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 42. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 43. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Recap General workforce permissions Dial in permissions over time AWS Organizations IAM roles and policies IAM access advisor Permission guardrails Service Control Policies (SCPs)
  • 44. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Ujjwal Pugalia upugalia@amazon.com