Skip to content

Commit 0adb6fd

Browse files
committed
first pr review
1 parent cf30a23 commit 0adb6fd

File tree

7 files changed

+41
-77
lines changed

7 files changed

+41
-77
lines changed

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/centralize-identity-management.mdx

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,9 @@ description: Centralize identity management to manage access and improve securit
55

66
# Centralize identity management
77

8-
Designing and planning policies to manage access is one part of a complete identity
9-
and access management strategy. Another key part of that strategy is to
10-
centralize identity management so you can enforce those policies effectively.
8+
Designing and planning policies to manage access is part of a complete identity and access management strategy. A key part of that strategy is to centralize identity management, allowing you to enforce those policies effectively.
119

12-
There are several ways to grant access to systems. Most systems have built in
13-
identity solutions that allow you to create local users and groups. Those users
14-
and groups only have access to that specific system. While this approach may
15-
seem like a secure approach, it does not scale well and may introduce more
16-
security risks than centralizing identity management.
10+
There are several ways to grant access to systems. Most systems have built-in identity solutions that allow you to create local users and groups. Those users and groups only have access to that specific system. While this approach may seem secure, it does not scale well and may introduce more security risks than centralizing identity management.
1711

1812
## What is centralized identity management
1913

@@ -25,9 +19,7 @@ integrate the identity provider with other systems and authorize access for thos
2519
users. Each user has a single username and password, but can access the systems
2620
required to perform their job.
2721

28-
Compare this to having a local user on your laptop. You can log into the laptop
29-
with the local user, but that username and password do not provide access to
30-
your email, or other systems.
22+
Compare this to having a local user on your laptop. You can log in to the laptop with the local user, but that username and password do not provide access to your email or other systems.
3123

3224
## Why centralize identity management
3325

@@ -73,6 +65,6 @@ identity and access management program.
7365
- [Use dynamic credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials)
7466
- [Manage access lifecycle](/well-architected-framework/secure-systems/identity-access-management/manage-access-lifecycle)
7567

76-
In this section of **Identity and access management** you learned the benefits
68+
In this section of Identity and access management you learned the benefits
7769
of centralizing identity management. Identity and access management is part of the
7870
[Secure systems](/well-architected-framework/secure-systems) pillar.

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/create-permissions-guardrails.mdx

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Write effective identity and access management (IAM) policies that
55

66
# Create permissions and guardrails
77

8-
Now that you have defined your access requirements, you can begin writing
8+
Once you have defined your access requirements, you can begin writing
99
policies that enforce permissions guardrails by using [least
1010
privilege](/well-architected-framework/secure-systems/identity-access-management/grant-least-privilege)
1111
policies.
@@ -23,12 +23,9 @@ Permissions are the specific actions that users, applications, or systems can
2323
take on resources. Permissions are typically defined in policies and used to
2424
control access to resources in a system.
2525

26-
You can grant or deny permissions based on a variety of factors, including
27-
the user's role, group membership, the resource they are attempting to access,
28-
and the context of the access request. For example, a user may have permission
29-
to read data from a database, but not to write data to the database.
26+
You can grant or deny permissions based on various factors, including the user's role, group membership, the resources they access, and the context of the access request. For example, a user may have permission to read data from a database but not to write data to it.
3027

31-
The following is an example of a database permission that follows least privilege:
28+
The following is an example of a database permission and AWS S3 bucket policy that follows least privilege:
3229

3330
<CodeBlockConfig hideClipboard>
3431

@@ -41,6 +38,20 @@ GRANT SELECT ON ALL TABLES IN SCHEMA public TO readonly_user;
4138
The PostgreSQL role `readonly_user` with this permission can select data from
4239
tables, but not write or modify data.
4340

41+
This AWS IAM policy allows read-only access to download files from the "company-reports" S3 bucket.
42+
43+
```json
44+
{
45+
"Version": "2012-10-17",
46+
"Statement": [
47+
{
48+
"Effect": "Allow",
49+
"Action": ["s3:GetObject"],
50+
"Resource": "arn:aws:s3:::company-reports/*"
51+
}
52+
]
53+
}
54+
4455
## Define permissions as code
4556

4657
Where possible, define your permissions in policies as code. Defining

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/define-access-requirements.mdx

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,7 @@ description: Identify and collect requirements to help you identify access requi
55

66
# Define access requirements
77

8-
Defining access requirements for your organization is an important step in
9-
creating secure systems. Identifying what requirements you need to implement can
10-
seem overwhelming. There are steps you can take to simplify identifying which
11-
requirements you need, and collect the necessary documentation to implement the
12-
access requirements.
8+
Defining access requirements for your organization is an important step in creating secure systems. Identifying what requirements you need to implement can seem overwhelming. There are steps you can take to simplify identifying the requirements you need and collecting the necessary documentation to implement the access requirements.
139

1410
## What are access requirements
1511

@@ -31,9 +27,7 @@ for your systems and teams.
3127

3228
## How to define access requirements
3329

34-
Start with identifying the regulations and standards that apply to your
35-
organization from both an industry and geographic perspective. These regulations
36-
often map to specific security practices such as [NIST SP 800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) for access
30+
Start by identifying the regulations and standards that apply to your organization from both an industry and geographic perspective. These regulations often align with specific security practices, such as [NIST SP 800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) for access
3731
control.
3832

3933
Once you have identified and collected the requirements that apply to your
@@ -42,10 +36,10 @@ specific access controls to your systems and teams. Documenting these
4236
requirements helps you ensure that you are meeting the necessary regulations and
4337
standards.
4438

45-
You should also create a team responsible for staying up to date on changes to
39+
You should also designate a group responsible for staying up-to-date on changes to
4640
regulations and standards that may affect your access requirements. When
4741
regulations, standards, or best practices change, you need to update your access
48-
requirements accordingly. The team responsible for this evangelizes the need for
42+
requirements accordingly. The group responsible for this evangelizes the need for
4943
strong security practices across your organization.
5044

5145
Documenting and maintaining your access requirements helps you ensure that you
@@ -86,7 +80,7 @@ identity and access management program.
8680
- [Use dynamic credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials)
8781
- [Manage access lifecycle](/well-architected-framework/secure-systems/identity-access-management/manage-access-lifecycle)
8882

89-
In this section of **Identity and access management**, you learned the importance
83+
In this section of Identity and access management, you learned the importance
9084
of identifying and collecting access requirements from common sources such as
9185
industry and regulatory standards. Identity and access management is part of the
9286
[Secure systems](/well-architected-framework/secure-systems) pillar.

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/grant-least-privilege.mdx

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Write identity and access management (IAM) policies that follow the
55

66
# Grant least privilege
77

8-
Writing policies is one part of a complete identity and access management
8+
Writing policies is part of a complete identity and access management
99
strategy. Policies should follow the principle of least privilege.
1010

1111
Once you have identified and collected security requirements to aid in [defining
@@ -39,11 +39,7 @@ While most regulations do not have explicit requirements for least privilege,
3939
they do require controls that show you have a strong identity and access
4040
management program.
4141

42-
Consider conventional virtual private network (VPN) solutions; a user connects to
43-
the VPN and has access to the entire network. If that user’s credentials are
44-
compromised, an attacker can access everything on the network. A VPN is
45-
generally unable to follow least privilege because it provides broad access to
46-
the network.
42+
Consider conventional virtual private network (VPN) solutions, where a user connects to the VPN and gains access to the entire network. If a user’s credentials are compromised, an attacker can access all data on the network. A VPN is generally unable to follow the principle of least privilege because it provides broad access to the network.
4743

4844
In contrast, a zero trust model with least privilege ensures that users
4945
have access to the specific resources they need. If a user’s credentials become
@@ -55,10 +51,9 @@ and used that information to write documentation that follows least privilege.
5551
Some examples of documentation at this stage include:
5652

5753
- Software engineers do not have access to production.
58-
- Site reliability engineers have access to production, but not on
59-
a permanent basis.
54+
- Site reliability engineers have access to production, but not permanently.
6055
- Access to production requires approval and multi-factor authentication (MFA)
61-
- Logging enabled and monitored for access to production.
56+
- Logging is enabled and monitored for access to production.
6257
- Centralized authentication and authorization for all services.
6358

6459
HashiCorp tools and services like [Vault](/vault/tutorials/get-started) and
@@ -93,7 +88,7 @@ identity and access management program.
9388
- [Use dynamic credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials)
9489
- [Manage access lifecycle](/well-architected-framework/secure-systems/identity-access-management/manage-access-lifecycle)
9590

96-
In this section of **Identity and access management**, you learned the importance
91+
In this section of Identity and access management, you learned the importance
9792
of using least privilege in your policies governing access requirements.
9893
Identity and access management is part of the [Secure
9994
systems](/well-architected-framework/secure-systems) pillar.

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/implement-strong-sign-in-workflows.mdx

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,7 @@ breaches.
1212

1313
## What are strong sign-in workflows
1414

15-
Strong sign-in workflows involve a combination of techniques and technologies to
16-
verify the identity of users before granting access to systems. Strong sign-in
17-
workflows typically consist of **something you know** - such as a password, and
18-
**something you have** - like a physical key. Strong sign-in workflows
19-
include multi-factor authentication (MFA), biometric authentication, and
20-
adaptive authentication.
15+
Strong sign-in workflows involve a combination of techniques and technologies to verify a user's identity before granting access to systems. Strong sign-in workflows typically consist of **something you know** - such as a password, and **something you have** - like a physical key. Strong sign-in workflows include multi-factor authentication (MFA), biometric authentication, and adaptive authentication.
2116

2217
<VideoEmbed url="https://www.youtube.com/watch?v=L3alw3iXaio"/>
2318

@@ -30,12 +25,9 @@ should not have access to. It does not, however, ensure that unauthorized users
3025
have not improperly gained access to credentials that allow authentication to
3126
those systems or data.
3227

33-
When you implement strong sign-in workflows, you add another layer of security
34-
by validating the identity of users before granting access. When you combine
35-
strong-sign in workflows with [centralized identity
28+
When you implement strong sign-in workflows, you add another layer of security by validating the identity of users before granting access. When you combine strong sign-in workflows with [centralized identity
3629
management](/secure-systems/identity-access-management/centralize-identity-management),
37-
you have an authentication model that allows you to ensure systems are
38-
being access by authorized users.
30+
you have an authentication model that ensures authorized users have access to systems.
3931

4032
HashiCorp tools and services like the HashiCorp Cloud Platform, Vault, and
4133
HCP Terraform support both centralized identity management and strong sign-in

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/manage-access-lifecycle.mdx

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,24 +13,13 @@ environment and reduces the risk of unauthorized access.
1313

1414
## What is access lifecycle management
1515

16-
Access lifecycle management is the process of managing user accounts and their
17-
access permissions throughout their lifecycle, from creation to deprovisioning.
18-
This includes onboarding new users, modifying access as roles change, and
19-
removing access when it is no longer needed.
16+
Access lifecycle management is the process of managing user accounts and their access permissions throughout their lifecycle, from creation to deprovisioning. The management includes onboarding new users, modifying access as roles change, and removing access when it is no longer needed.
2017

2118
## Why manage access lifecycle
2219

23-
Failing to manage identity and access for users and services can lead to
24-
incidents, whether malicious or accidental. For example, if a user leaves the
25-
organization or changes roles, and their account is not deprovisioned, they may
26-
still have access to systems and data they are not authorized to access.
27-
28-
A publishing company in the 2000's let go of one of their system
29-
administrators, but failed to deprovision their account in an email system that
30-
was not centrally managed. The former employee logged in, and forwarded
31-
thousands of spam emails to employees, causing a significant disruption
32-
to their day. By properly managing accounts from creation, through
33-
deletion, you can avoid incidents caused by unauthorized access.
20+
Failing to manage identity and access for users and services can lead to incidents, whether malicious or accidental. For example, if a user leaves the organization or changes roles and their account is not deprovisioned, they may still have access to systems and data to which they are not authorized.
21+
22+
A publishing company in the 2000s let go of one of its system administrators but failed to deprovision their account in an email system that they had not securely managed. The former employee logged in and forwarded thousands of spam emails to employees, causing a significant disruption to their day. By properly managing accounts from creation through deletion, you can avoid incidents caused by unauthorized access.
3423

3524
By [centralizing identity
3625
management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management),

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/use-dynamic-credentials.mdx

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,11 @@ description: Use dynamic credentials to replace long lived accounts that are not
55

66
# Use dynamic credentials
77

8-
Strong identity and access management practices are critical to building a secure
9-
environment. While some credentials need to always be available, some
10-
credentials can be dynamic and short-lived, reducing the risk of exposure while
11-
increasing your security posture.
8+
Strong identity and access management practices are critical to building a secure environment. While some credentials must always be available, others can be dynamic and short-lived, reducing the risk of exposure while enhancing your security posture.
129

1310
## What are dynamic credentials
1411

15-
Dynamic credentials are temporary - short-lived credentials, generated on-demand
16-
and automatically expire after a specified period. They are typically used in
17-
scenarios where long-lived credentials are not necessary or pose a security risk.
12+
Dynamic credentials are temporary, short-lived credentials generated on demand and automatically expire after a specified period. The credentials are typically used in scenarios where long-lived credentials are not necessary or pose a security risk.
1813

1914
<VideoEmbed url="https://www.youtube.com/watch?v=1YNDSCcGbcQ"/>
2015

@@ -25,11 +20,7 @@ and users, allowing them to authenticate without exposing their long-term creden
2520
This approach minimizes the attack surface and reduces the likelihood of
2621
credential theft or misuse.
2722

28-
When a service needs to connect to another service such as a database, it
29-
requires some method to authenticate. Traditionally, this might be a username
30-
and password or an API token. When these credentials are available for a long
31-
period of time, there is a greater potential for those credentials to become
32-
compromised.
23+
When a service needs to connect to another service, such as a database, it requires some method to authenticate. Traditionally, this might be a username and password or an API token. When these credentials are available for an extended period, there is a greater potential for them to become compromised.
3324

3425
<VideoEmbed url="https://www.youtube.com/watch?v=E9XDfOVNN2U"/>
3526

0 commit comments

Comments
 (0)