Skip to content

Commit 068ceac

Browse files
Updates from 1x1 w CJ
1 parent d5c19a3 commit 068ceac

File tree

7 files changed

+148
-30
lines changed

7 files changed

+148
-30
lines changed

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/centralize-identity-management.mdx

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,29 @@ description: Centralize identity management to manage access and improve securit
55

66
# Centralize identity management
77

8-
Designing and planning policies to manage access is part of a complete identity and access management strategy. A key part of that strategy is to centralize identity management, allowing you to enforce those policies effectively.
8+
Designing and planning policies to manage access is part of a complete identity
9+
and access management strategy. A key part of that strategy is to centralize
10+
identity management, allowing you to enforce those policies effectively.
911

10-
There are several ways to grant access to systems. Most systems have built-in identity solutions that allow you to create local users and groups. Those users and groups only have access to that specific system. While this approach may seem secure, it does not scale well and may introduce more security risks than centralizing identity management.
12+
There are several ways to grant access to systems. Most systems have built-in
13+
identity solutions that allow you to create local users and groups. Those users
14+
and groups only have access to that specific system. While this approach may
15+
seem secure, it does not scale well and may introduce more security risks than
16+
centralizing identity management.
1117

1218
## What is centralized identity management
1319

1420
Centralizing identity management allows you to manage access to all systems
1521
from a single location. Solutions like LDAP, Active Directory, or cloud identity
16-
providers like Okta, Azure Active Directory, or Google Cloud Identity provide a way to
22+
providers like Okta, Azure EntraID, or Google Cloud Identity provide a way to
1723
centralize identity management. After you centralize authentication, you then
1824
integrate the identity provider with other systems and authorize access for those
1925
users. Each user has a single username and password, but can access the systems
2026
required to perform their job.
2127

22-
Compare this to having a local user on your laptop. You can log in to the laptop with the local user, but that username and password do not provide access to your email or other systems.
28+
Compare this to having a local user on your laptop. You can log in to the laptop
29+
with the local user, but that username and password do not provide access to
30+
your email or other systems.
2331

2432
## Why centralize identity management
2533

@@ -33,14 +41,31 @@ with a single set of credentials. This approach reduces the risk of password
3341
fatigue and improves security by reducing the number of passwords that users
3442
need to remember.
3543

36-
You can deploy HashiCorp Vault to act as an OIDC provider for other systems.
37-
This gives you complete control over your identity management workflow and
38-
allows you to expose the OIDC provider based on your security requirements.
44+
You can deploy HashiCorp Vault to support centralized identity management by:
45+
46+
- **Act as an OIDC provider** - Deploy Vault as an OIDC provider gives you
47+
complete control over your identity management workflow and allows you to
48+
expose the OIDC provider based on your security requirements.
49+
- **Generate credentials** - Generate dynamic, short-lived credentials that
50+
eliminate static passwords stored in different systems.
51+
52+
Boundary provides identity-aware proxying to infrastructure without exposing
53+
credentials to end users:
54+
55+
- **Integrate with identity providers** - Connect Boundary to OIDC providers or
56+
Active Directory to authenticate users based on their existing corporate
57+
identities.
58+
- **Role-based access control** - Map users and groups from your identity
59+
provider to Boundary roles, controlling which systems each user can access.
60+
- **Session recording and auditing** - Track which users accessed which systems,
61+
creating an audit trail tied to real identities rather than shared
62+
credentials.
3963

4064
Most HashiCorp tools and services like the [HashiCorp Cloud
4165
Platform](https://portal.cloud.hashicorp.com/sign-in), HCP Terraform, Boundary,
4266
and Vault integrate with third party identity providers natively or through
43-
OIDC.
67+
OIDC allowing you to manage access to these tools from your centralized identity
68+
provider.
4469

4570
HashiCorp resources:
4671

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/create-permissions-guardrails.mdx

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,13 @@ Permissions are the specific actions that users, applications, or systems can
2323
take on resources. Permissions are typically defined in policies and used to
2424
control access to resources in a system.
2525

26-
You can grant or deny permissions based on various factors, including the user's role, group membership, the resources they access, and the context of the access request. For example, a user may have permission to read data from a database but not to write data to it.
26+
You can grant or deny permissions based on various factors, including the user's
27+
role, group membership, the resources they access, and the context of the access
28+
request. For example, a user may have permission to read data from a database
29+
but not to write data to it.
2730

28-
The following is an example of a database permission and AWS S3 bucket policy that follows least privilege:
31+
The following is an example of a database permission and AWS S3 bucket policy
32+
that follows least privilege:
2933

3034
<CodeBlockConfig hideClipboard>
3135

@@ -46,11 +50,18 @@ This AWS IAM policy allows read-only access to download files from the "company-
4650
"Statement": [
4751
{
4852
"Effect": "Allow",
49-
"Action": ["s3:GetObject"],
50-
"Resource": "arn:aws:s3:::company-reports/*"
53+
"Action": [
54+
"s3:GetObject",
55+
"s3:ListBucket"
56+
],
57+
"Resource": [
58+
"arn:aws:s3:::company-reports",
59+
"arn:aws:s3:::company-reports/*"
60+
]
5161
}
52-
]
62+
]
5363
}
64+
```
5465

5566
## Define permissions as code
5667

@@ -67,7 +78,12 @@ the HashiCorp Configuration Language (HCL). JSON is another widely supported
6778
format. HashiCorp Vault supports JSON based policies, in addition to HCL. AWS
6879
Identity and Access Management (IAM) supports JSON-based policies. Other systems
6980
like Active Directory may require scripting the policies in other languages like
70-
PowerShell.
81+
PowerShell to create Group Policy Objects (GPOs).
82+
83+
Terraform helps you manage your policies for supported tools and services,
84+
allowing you to define, update, and enforce policies as code. This approach
85+
ensures that your policies are consistent, auditable, and can be version
86+
controlled.
7187

7288
HashiCorp resources:
7389

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/define-access-requirements.mdx

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,11 @@ description: Identify and collect requirements to help you identify access requi
55

66
# Define access requirements
77

8-
Defining access requirements for your organization is an important step in creating secure systems. Identifying what requirements you need to implement can seem overwhelming. There are steps you can take to simplify identifying the requirements you need and collecting the necessary documentation to implement the access requirements.
8+
Defining access requirements for your organization is an important step in
9+
creating secure systems. Identifying what requirements you need to implement can
10+
seem overwhelming. There are steps you can take to simplify identifying the
11+
requirements you need and collecting the necessary documentation to implement
12+
the access requirements.
913

1014
## What are access requirements
1115

@@ -19,16 +23,18 @@ several sources, including:
1923
- Local, federal, or international regulatory standards that define data privacy
2024
and protection (CCPA, Sarbanes-Oxley, GDPR).
2125
- Current best operational practices that define security controls (SOC 2, NIST,
22-
ISO 127001).
26+
ISO 27001).
2327

2428
When you understand which regulations and standards apply to your organization, you can
2529
begin to identify the specific access requirements that you need to implement
2630
for your systems and teams.
2731

2832
## How to define access requirements
2933

30-
Start by identifying the regulations and standards that apply to your organization from both an industry and geographic perspective. These regulations often align with specific security practices, such as [NIST SP 800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) for access
31-
control.
34+
Start by identifying the regulations and standards that apply to your
35+
organization from both an industry and geographic perspective. These regulations
36+
often align with specific security practices, such as [NIST SP
37+
800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) for access control.
3238

3339
Once you have identified and collected the requirements that apply to your
3440
organization, you need to document those requirements and begin mapping the
@@ -53,6 +59,16 @@ as code](/well-architected-framework/secure-systems/compliance-and-governance/po
5359
such as policies for Vault or Sentinel to manage access controls across your
5460
systems.
5561

62+
[Project
63+
infragraph](https://www.hashicorp.com/en/blog/building-intelligent-infrastructure-automation-with-hashicorp),
64+
announced at HashiConf 2025, is a real-time infrastructure graph that provides
65+
visibility into your infrastructure and its relationships. By understanding
66+
relationships between your resources, you can better define and manage access
67+
requirements.
68+
69+
You can apply to our private beta for project infragraph
70+
[here](https://www.hashicorp.com/en/project-infragraph-private-beta).
71+
5672
HashiCorp resources:
5773

5874
- [Access controls with Vault policies](/vault/tutorials/policies/policies)

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/grant-least-privilege.mdx

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,11 @@ While most regulations do not have explicit requirements for least privilege,
3939
they do require controls that show you have a strong identity and access
4040
management program.
4141

42-
Consider conventional virtual private network (VPN) solutions, where a user connects to the VPN and gains access to the entire network. If a user’s credentials are compromised, an attacker can access all data on the network. A VPN is generally unable to follow the principle of least privilege because it provides broad access to the network.
42+
Consider conventional virtual private network (VPN) solutions, where a user
43+
connects to the VPN and gains access to the entire network. If a user’s
44+
credentials are compromised, an attacker can access all data on the network. A
45+
VPN is generally unable to follow the principle of least privilege because it
46+
provides broad access to the network.
4347

4448
In contrast, a zero trust model with least privilege ensures that users
4549
have access to the specific resources they need. If a user’s credentials become
@@ -53,14 +57,27 @@ Some examples of documentation at this stage include:
5357
- Software engineers do not have access to production.
5458
- Site reliability engineers have access to production, but not permanently.
5559
- Access to production requires approval and multi-factor authentication (MFA)
56-
- Logging is enabled and monitored for access to production.
60+
- Logging enabled and monitoring access to production.
5761
- Centralized authentication and authorization for all services.
5862

5963
HashiCorp tools and services like [Vault](/vault/tutorials/get-started) and
6064
[Boundary](/boundary/tutorials/get-started-hcp) allow you to implement least
6165
privilege access controls, while Terraform helps you manage the policies for
6266
Vault and Boundary.
6367

68+
With Vault and Boundary, you can provision dynamic credentials allowing users to
69+
remotely access systems without managing long-lived credentials. When the
70+
session is complete, Vault revokes the credentials, reducing the risk of
71+
compromise.
72+
73+
Boundary also allows you to provide access to the specific systems and
74+
services that users need access to, eliminating access to the entire network
75+
like conventional VPN solutions do.
76+
77+
Terraform helps you manage the policies for Vault and Boundary, allowing you to
78+
define, update, and enforce policies as code. This approach ensures that your
79+
policies are consistent, auditable, and can be version controlled.
80+
6481
HashiCorp resources:
6582

6683
- [Access controls with Vault policies](/vault/tutorials/policies/policies)

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/implement-strong-sign-in-workflows.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ workflows include:
3131
## Why implement strong sign-in workflows
3232

3333
Writing policies that follow [least
34-
privilege](/secure-systems/identity-access-management/grant-least-privilege)
34+
privilege](/well-architected-framework/secure-systems/identity-access-management/grant-least-privilege)
3535
ensures that an authorized user does not have access to systems or data they
3636
should not have access to. It does not, however, ensure that unauthorized users
3737
have not improperly gained access to credentials that allow authentication to
@@ -40,7 +40,7 @@ those systems or data.
4040
When you implement strong sign-in workflows, you add another layer of security
4141
by validating the identity of users before granting access. When you combine
4242
strong sign-in workflows with [centralized identity
43-
management](/secure-systems/identity-access-management/centralize-identity-management),
43+
management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management),
4444
you have an authentication model that ensures authorized users have access to systems.
4545

4646
HashiCorp tools and services like the HashiCorp Cloud Platform, Vault, and

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/manage-access-lifecycle.mdx

Lines changed: 38 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,24 @@ environment and reduces the risk of unauthorized access.
1313

1414
## What is access lifecycle management
1515

16-
Access lifecycle management is the process of managing user accounts and their access permissions throughout their lifecycle, from creation to deprovisioning. The management includes onboarding new users, modifying access as roles change, and removing access when it is no longer needed.
16+
Access lifecycle management is the process of managing user accounts and their
17+
access permissions throughout their lifecycle, from creation to deprovisioning.
18+
The management includes onboarding new users, modifying access as roles change,
19+
and removing access when it is no longer needed.
1720

1821
## Why manage access lifecycle
1922

20-
Failing to manage identity and access for users and services can lead to incidents, whether malicious or accidental. For example, if a user leaves the organization or changes roles and their account is not deprovisioned, they may still have access to systems and data to which they are not authorized.
23+
Failing to manage identity and access for users and services can lead to
24+
incidents, whether malicious or accidental. For example, if a user leaves the
25+
organization or changes roles and their account is not deprovisioned, they may
26+
still have access to systems and data to which they are not authorized.
2127

22-
A publishing company in the 2000s let go of one of its system administrators but failed to deprovision their account in an email system that they had not securely managed. The former employee logged in and forwarded thousands of spam emails to employees, causing a significant disruption to their day. By properly managing accounts from creation through deletion, you can avoid incidents caused by unauthorized access.
28+
A publishing company in the 2000s let go of one of its system administrators but
29+
failed to deprovision their account in an email system that they had not
30+
securely managed. The former employee logged in and forwarded thousands of spam
31+
emails to employees, causing a significant disruption to their day. By properly
32+
managing accounts from creation through deletion, you can avoid incidents caused
33+
by unauthorized access.
2334

2435
By [centralizing identity
2536
management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management),
@@ -49,6 +60,30 @@ and [rotating
4960
secrets](/well-architected-framework/secure-systems/secrets/rotate-secrets)
5061
builds a strong security foundation for your organization.
5162

63+
HashiCorp Vault fundamentally changes how you manage access lifecycle by
64+
eliminating long-lived credentials:
65+
66+
- **Dynamic secrets** - Instead of creating permanent credentials during user
67+
onboarding, Vault generates temporary credentials on-demand when users need
68+
access. These credentials automatically expire, removing the need for manual
69+
deprovisioning in many scenarios.
70+
- **Lease management** - Every secret issued by Vault has an associated lease.
71+
When a user’s employment ends or their role changes, revoking their Vault
72+
token automatically revokes all associated dynamic credentials across
73+
databases, cloud providers, and other systems.
74+
75+
HashiCorp Boundary enforces access lifecycle through just-in-time access
76+
patterns:
77+
78+
- **Session-based access** - Rather than granting permanent access to
79+
infrastructure, Boundary creates temporary sessions. When a session ends,
80+
access automatically terminates.
81+
- **Time-limited targets** - Configure targets with expiration times to
82+
automatically deprovision access to specific systems after a defined period.
83+
- **Identity integration** - Connect Boundary to your identity provider so that
84+
when you deprovision a user from the identity provider, they lose the ability to
85+
create new sessions to infrastructure resources.
86+
5287
HashiCorp resources:
5388

5489
- [Understand static and dynamic secrets](/vault/tutorials/get-started/understand-static-dynamic-secrets)

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/use-dynamic-credentials.mdx

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,21 @@
11
---
22
page_title: Use dynamic credentials
3-
description: Use dynamic credentials to replace long lived accounts that are not used often to improve security.
3+
description: Use dynamic credentials to replace long-lived accounts that are not used often to improve security.
44
---
55

66
# Use dynamic credentials
77

8-
Strong identity and access management practices are critical to building a secure environment. While some credentials must always be available, others can be dynamic and short-lived, reducing the risk of exposure while enhancing your security posture.
8+
Strong identity and access management practices are critical to building a
9+
secure environment. While some credentials must always be available, others can
10+
be dynamic and short-lived, reducing the risk of exposure while enhancing your
11+
security posture.
912

1013
## What are dynamic credentials
1114

12-
Dynamic credentials are temporary, short-lived credentials generated on demand and automatically expire after a specified period. The credentials are typically used in scenarios where long-lived credentials are not necessary or pose a security risk.
15+
Dynamic credentials are temporary, short-lived credentials generated on demand
16+
and automatically expire after a specified period. The credentials are typically
17+
used in scenarios where long-lived credentials are not necessary or pose a
18+
security risk.
1319

1420
<VideoEmbed url="https://www.youtube.com/watch?v=1YNDSCcGbcQ"/>
1521

@@ -20,7 +26,10 @@ and users, allowing them to authenticate without exposing their long-term creden
2026
This approach minimizes the attack surface and reduces the likelihood of
2127
credential theft or misuse.
2228

23-
When a service needs to connect to another service, such as a database, it requires some method to authenticate. Traditionally, this might be a username and password or an API token. When these credentials are available for an extended period, there is a greater potential for them to become compromised.
29+
When a service needs to connect to another service, such as a database, it
30+
requires some method to authenticate. Traditionally, this might be a username
31+
and password or an API token. When these credentials are available for an
32+
extended period, there is a greater potential for them to become compromised.
2433

2534
<VideoEmbed url="https://www.youtube.com/watch?v=E9XDfOVNN2U"/>
2635

@@ -73,6 +82,6 @@ identity and access management program.
7382
- [Manage access lifecycle](/well-architected-framework/secure-systems/identity-access-management/manage-access-lifecycle)
7483

7584
In this section of **Identity and access management** you learned how replacing
76-
long live, static credentials with temporary credentials helps improve security.
85+
long-lived, static credentials with temporary credentials helps improve security.
7786
Identity and access management is part of the [Secure
7887
systems](/well-architected-framework/secure-systems) pillar.

0 commit comments

Comments
 (0)