Skip to content

Commit 691ebe4

Browse files
Remove this
1 parent 068ceac commit 691ebe4

File tree

6 files changed

+31
-28
lines changed

6 files changed

+31
-28
lines changed

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/centralize-identity-management.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ identity management, allowing you to enforce those policies effectively.
1111

1212
There are several ways to grant access to systems. Most systems have built-in
1313
identity solutions that allow you to create local users and groups. Those users
14-
and groups only have access to that specific system. While this approach may
15-
seem secure, it does not scale well and may introduce more security risks than
16-
centralizing identity management.
14+
and groups only have access to that specific system. While isolated identity
15+
management may seem secure, it does not scale well and may introduce more
16+
security risks than centralizing identity management.
1717

1818
## What is centralized identity management
1919

@@ -25,9 +25,9 @@ integrate the identity provider with other systems and authorize access for thos
2525
users. Each user has a single username and password, but can access the systems
2626
required to perform their job.
2727

28-
Compare this to having a local user on your laptop. You can log in to the laptop
29-
with the local user, but that username and password do not provide access to
30-
your email or other systems.
28+
Having individual user accounts on multiple platforms is similar to having a
29+
local user on your laptop. You can log in to the laptop with the local user, but
30+
that username and password do not provide access to your email or other systems.
3131

3232
## Why centralize identity management
3333

@@ -37,7 +37,7 @@ authentication (MFA), password complexity, and rotation policies.
3737

3838
From an end user perspective, centralizing identity management provides a
3939
single sign-on (SSO) experience, allowing users to access the systems they need
40-
with a single set of credentials. This approach reduces the risk of password
40+
with a single set of credentials. Using SSO reduces the risk of password
4141
fatigue and improves security by reducing the number of passwords that users
4242
need to remember.
4343

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/create-permissions-guardrails.mdx

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ policies.
1212

1313
Creating policies and enforcing guardrails is the process of translating
1414
requirements into policies that define what users, applications, and systems can
15-
do. This process involves converting the requirements for each
15+
do. Writing effective permissions involves converting the requirements for each
1616
role or function within your organization when you [defined your access
1717
requirements](/well-architected-framework/secure-systems/identity-access-management/define-access-requirements)
1818
into policies for your systems.
@@ -39,10 +39,11 @@ GRANT SELECT ON ALL TABLES IN SCHEMA public TO readonly_user;
3939

4040
</CodeBlockConfig>
4141

42-
The PostgreSQL role `readonly_user` with this permission can select data from
42+
The PostgreSQL role `readonly_user` with the `SELECT` permission can select data from
4343
tables, but not write or modify data.
4444

45-
This AWS IAM policy allows read-only access to download files from the "company-reports" S3 bucket.
45+
An example AWS IAM policy that follows least privilege allows read-only access
46+
to download files from the "company-reports" S3 bucket.
4647

4748
```json
4849
{
@@ -81,9 +82,9 @@ like Active Directory may require scripting the policies in other languages like
8182
PowerShell to create Group Policy Objects (GPOs).
8283

8384
Terraform helps you manage your policies for supported tools and services,
84-
allowing you to define, update, and enforce policies as code. This approach
85-
ensures that your policies are consistent, auditable, and can be version
86-
controlled.
85+
allowing you to define, update, and enforce policies as code. Using automation
86+
to manage policies ensures that your policies are consistent, auditable, and can
87+
be version controlled.
8788

8889
HashiCorp resources:
8990

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/define-access-requirements.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,9 @@ standards.
4545
You should also designate a group responsible for staying up-to-date on changes to
4646
regulations and standards that may affect your access requirements. When
4747
regulations, standards, or best practices change, you need to update your access
48-
requirements accordingly. The group responsible for this evangelizes the need for
49-
strong security practices across your organization.
48+
requirements accordingly. The group responsible for staying up-to-date on
49+
regulation updates evangelizes the need for strong security practices across
50+
your organization.
5051

5152
Documenting and maintaining your access requirements helps you ensure that you
5253
can meet audit requirements, such as those for SOC 2 or ISO 27001. Auditors will

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/grant-least-privilege.mdx

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ you can use that information to write identity and access management (IAM) polic
1515
## What is least privilege
1616

1717
Least privilege means that users, applications, and systems have the minimum
18-
permissions necessary to perform their required tasks. This approach reduces the risk
19-
of unauthorized access or actions that can compromise the security of your systems
20-
and [secure
18+
permissions necessary to perform their required tasks. Following the princple of
19+
least privilege reduces the risk of unauthorized access or actions that can
20+
compromise the security of your systems and [secure
2121
data](/well-architected-framework/secure-systems/data/classify-data).
2222

2323
<VideoEmbed url="https://www.youtube.com/watch?v=PTqVlftfK_U"/>
@@ -50,9 +50,9 @@ have access to the specific resources they need. If a user’s credentials becom
5050
compromised using least privilege policies, the attacker can access just the
5151
limited set of resources defined in the policy, reducing the potential damage.
5252

53-
At this stage, you should have identified and collected the access requirements,
53+
You have now identified and collected the access requirements,
5454
and used that information to write documentation that follows least privilege.
55-
Some examples of documentation at this stage include:
55+
Some examples of documentation to write include:
5656

5757
- Software engineers do not have access to production.
5858
- Site reliability engineers have access to production, but not permanently.
@@ -75,8 +75,9 @@ services that users need access to, eliminating access to the entire network
7575
like conventional VPN solutions do.
7676

7777
Terraform helps you manage the policies for Vault and Boundary, allowing you to
78-
define, update, and enforce policies as code. This approach ensures that your
79-
policies are consistent, auditable, and can be version controlled.
78+
define, update, and enforce policies as code. Using automation to manage
79+
policies ensures that your policies are consistent, auditable, and can be
80+
version controlled.
8081

8182
HashiCorp resources:
8283

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/manage-access-lifecycle.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ by unauthorized access.
3535
By [centralizing identity
3636
management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management),
3737
you can streamline the access lifecycle for provisioning and deprovisioning
38-
users. This allows you to update group membership, reset passwords, or
39-
deprovision accounts when they are no longer needed.
38+
users. Centralizing identity management allows you to update group membership,
39+
reset passwords, or deprovision accounts when they are no longer needed.
4040

4141
When you combine centralized identity management with [dynamic
4242
credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials),

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/use-dynamic-credentials.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ security risk.
2323

2424
You can generate dynamic credentials for various services, applications,
2525
and users, allowing them to authenticate without exposing their long-term credentials.
26-
This approach minimizes the attack surface and reduces the likelihood of
26+
Using dynamic credentials minimizes the attack surface and reduces the likelihood of
2727
credential theft or misuse.
2828

2929
When a service needs to connect to another service, such as a database, it
30-
requires some method to authenticate. Traditionally, this might be a username
30+
requires some method to authenticate. Traditionally, you might use a username
3131
and password or an API token. When these credentials are available for an
3232
extended period, there is a greater potential for them to become compromised.
3333

@@ -50,8 +50,8 @@ having to share or expose the credentials.
5050
<VideoEmbed url="https://www.youtube.com/watch?v=69UFSAIDQgM"/>
5151

5252
HCP Terraform integrates with Vault allowing Terraform to generate dynamic
53-
credentials during a deployment. This approach allows you to avoid managing
54-
credentials separately.
53+
credentials during a deployment. Configuring Terraform to request dynamic
54+
credentials from Vault allows you to avoid managing static credentials separately.
5555

5656
HashiCorp resources:
5757

0 commit comments

Comments
 (0)