1- Authentication
2- ###########################
1+ # Authentication
32
4-
5- Notes to be Organized and Completed
6- ---------------------------------------
7-
8- Authentication
9- .........................
10-
11- * Give EC2 instance a role, access to S3, etc, NOT an AWS key, pass instance profile
12- (contains role, role contains privileges. Role must have permission to read secret)
13- * Role, create
14-
15- * What kind of thing, service, i.e. EC2, lambda, SAML assertion?
16- * What permissions? Can use or edit AWS managed permissions policy, What can it do,
17- JSON defines,
18- * Trust relationship, AssumeRole
19- * User can get roles through Group or permission/policy document directly
20- * Access Advisor - see what has been used or not, and pare down the permissions
21-
22- * Security group (ports, inbound, outbound)
23-
24- * Can include all traffic from another SG, need to do that for both SGs
25-
26- * Parameter store (cheaper) stores less secret info, define config for a project,
27- need read parameter policy on the role using it, no additional charge for standard
28- parameters, up to 10k, less than 4k,
29-
30- * Secure parameters , will encrypt them, can use KMS key, need to add to your policy doc
31- * Can make public parameters
32-
33- * Secrets - 0.40/mo per secret 0.05/10,000 accesses
34- * Temporary credentials with IAM Roles? Vs Access keys for long-term access?
35- * Identities = AWS resources (EC2 instance, lambda functions)
36- * Secrets for roles/identities for initiating contact/processes
37-
38- * https://docs.aws.amazon.com/secretsmanager/latest/userguide/hardcoded.html
39- * APIkey/secret, user/password, private key, token, certificate …
40- * Create a role to manage the secrets
41- * Create a role to retrieve secrets - grant the role permission to access only select
42- secrets, give that role to the code/process of interest
43-
44- Allow S3 access from EC2 instance
45- -------------------------------------------
3+ ## Allow S3 access from EC2 instance
464
475* Create a role for the instance, with permissions for whatever it will use (i.e.
486 read/write for specific bucket folders, read secret, Redshift, etc):
497 AmazonRedshiftAllCommandsFullAccess, AmazonS3ReadOnlyAccess, SecretsManagerReadWrite
508* Assign that role to the instance
51- *
529
5310https://repost.aws/knowledge-center/ec2-instance-access-s3-bucket
5411
55- Troubleshooting
56- ------------------------
12+ ## Troubleshooting
5713
58- EC2 slowly or never responds
59- ...................................
14+ ### EC2 slowly or never responds
6015
6116"EBS throughput is under-provisioned""
6217
@@ -75,17 +30,51 @@ Storage interface, and Network interface.
7530
7631https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/resize-limitations.html
7732
78- EC2 stops responding during docker compose
79- .................................................
33+ ### EC2 stops responding during docker compose
8034
8135=> [ front-end base-front-end 4/6] RUN npm install
8236
37+ ## Questions remaining
8338
84-
85- Questions remaining
86- ---------------------------------------
8739* Roles for “workload”
8840* Travis: How to assign broad privileges to a process, run it, then identify the minimum
8941 privileges it needs?
9042* Temporary access roles vs static
91- * Access Control ???
43+ * Access Control ???
44+
45+ ## Notes to be Organized and Completed
46+
47+ ### Authentication
48+
49+ * Give EC2 instance a role, access to S3, etc, NOT an AWS key, pass instance profile
50+ (contains role, role contains privileges. Role must have permission to read secret)
51+ * Role, create
52+
53+ * What kind of thing, service, i.e. EC2, lambda, SAML assertion?
54+ * What permissions? Can use or edit AWS managed permissions policy, What can it do,
55+ JSON defines,
56+ * Trust relationship, AssumeRole
57+ * User can get roles through Group or permission/policy document directly
58+ * Access Advisor - see what has been used or not, and pare down the permissions
59+
60+ * Security group (ports, inbound, outbound)
61+
62+ * Can include all traffic from another SG, need to do that for both SGs
63+
64+ * Parameter store (cheaper) stores less secret info, define config for a project,
65+ need read parameter policy on the role using it, no additional charge for standard
66+ parameters, up to 10k, less than 4k,
67+
68+ * Secure parameters , will encrypt them, can use KMS key, need to add to your policy doc
69+ * Can make public parameters
70+
71+ * Secrets - 0.40/mo per secret 0.05/10,000 accesses
72+ * Temporary credentials with IAM Roles? Vs Access keys for long-term access?
73+ * Identities = AWS resources (EC2 instance, lambda functions)
74+ * Secrets for roles/identities for initiating contact/processes
75+
76+ * https://docs.aws.amazon.com/secretsmanager/latest/userguide/hardcoded.html
77+ * APIkey/secret, user/password, private key, token, certificate …
78+ * Create a role to manage the secrets
79+ * Create a role to retrieve secrets - grant the role permission to access only select
80+ secrets, give that role to the code/process of interest
0 commit comments