Skip to content

Commit 439220a

Browse files
Add diagrams for WAF IAM (#1060)
Add diagrams to new IAM section
2 parents 1400662 + 502ec3d commit 439220a

15 files changed

+27
-1
lines changed

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/centralize-identity-management.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ integrate the identity provider with other systems and authorize access for thos
2525
users. Each user has a single username and password, but can access the systems
2626
required to perform their job.
2727

28+
![Diagram showing concept of centralized identity and access management.](/img/well-architected-framework/diagram-iam-centralized.png#light-theme-only)
29+
![Diagram showing concept of centralized identity and access management.](/img/well-architected-framework/diagram-iam-centralized-dark.png#dark-theme-only)
30+
2831
Having individual user accounts on multiple platforms is similar to having a
2932
local user on your laptop. You can log in to the laptop with the local user, but
3033
that username and password do not provide access to your email or other systems.

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/create-permissions-guardrails.mdx

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,15 @@ role, group membership, the resources they access, and the context of the access
2828
request. For example, a user may have permission to read data from a database
2929
but not to write data to it.
3030

31+
Defining guardrails allows you to enforce policies at different levels of the
32+
organization, preventing you from granting excessive permissions to
33+
a user or system. This diagram shows an example of restricting permissions at
34+
various levels. The effective permissions for a user is a combination of
35+
permissions granted at the user, group, and organizational levels.
36+
37+
![Diagram showing guardrails at various levels within an organization.](/img/well-architected-framework/diagram-iam-guardrails.png#light-theme-only)
38+
![Diagram showing guardrails at various levels within an organization.](/img/well-architected-framework/diagram-iam-guardrails-dark.png#dark-theme-only)
39+
3140
The following is an example of a database permission and AWS S3 bucket policy
3241
that follows least privilege:
3342

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/define-access-requirements.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ several sources, including:
2525
- Current best operational practices that define security controls (SOC 2, NIST,
2626
ISO 27001).
2727

28+
![Diagram showing sources of access requirements including industry regulations, regulatory standards, and best practices.](/img/well-architected-framework/diagram-iam-define-acccess.png#light-theme-only)
29+
![Diagram showing sources of access requirements including industry regulations, regulatory standards, and best practices.](/img/well-architected-framework/diagram-iam-define-acccess-dark.png#dark-theme-only)
30+
2831
When you understand which regulations and standards apply to your organization, you can
2932
begin to identify the specific access requirements that you need to implement
3033
for your systems and teams.

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/grant-least-privilege.mdx

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ you can use that information to write identity and access management (IAM) polic
1515
## What is least privilege
1616

1717
Least privilege means that users, applications, and systems have the minimum
18-
permissions necessary to perform their required tasks. Following the princple of
18+
permissions necessary to perform their required tasks. Following the principle of
1919
least privilege reduces the risk of unauthorized access or actions that can
2020
compromise the security of your systems and [secure
2121
data](/well-architected-framework/secure-systems/data/classify-data).
@@ -65,6 +65,14 @@ HashiCorp tools and services like [Vault](/vault/tutorials/get-started) and
6565
privilege access controls, while Terraform helps you manage the policies for
6666
Vault and Boundary.
6767

68+
In this example, you write a policy that only permits access to the path for a
69+
a specifidc KV secrets engine. Because Vault policies follow least privilege by default, the
70+
authenticated user does not have access to other paths not defined in the
71+
policy.
72+
73+
![Diagram showing HashiCorp Vault using a policy to enforce least privilege access controls.](/img/well-architected-framework/diagram-iam-least-priv-vault.png#light-theme-only)
74+
![Diagram showing HashiCorp Vault using a policy to enforce least privilege access controls.](/img/well-architected-framework/diagram-iam-least-priv-vault-dark.png#dark-theme-only)
75+
6876
With Vault and Boundary, you can provision dynamic credentials allowing users to
6977
remotely access systems without managing long-lived credentials. When the
7078
session is complete, Vault revokes the credentials, reducing the risk of

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/manage-access-lifecycle.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,9 @@ the following key activities:
5151
- Account deprovisioning and removal
5252
- Access reviews and audits
5353

54+
![Diagram showing the account management lifecycle.](/img/well-architected-framework/diagram-iam-lifecycle.png#light-theme-only)
55+
![Diagram showing the account management lifecycle.](/img/well-architected-framework/diagram-iam-lifecycle-dark.png#dark-theme-only)
56+
5457
Following these practices helps you properly manage accounts and ensure
5558
your users and services that require access to a system have access.
5659

68.6 KB
Loading
66.8 KB
Loading
56.6 KB
Loading
66.8 KB
Loading
38.4 KB
Loading

0 commit comments

Comments
 (0)