YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 2: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 3: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 4: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 5: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 6: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 7: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

{

"Effect":"Allow",

"Principal":{

"AWS":"arn:aws:iam::1111"

},

"Action":"sts:AssumeRole"

}

{

"Effect":"Allow",

"Action":"s3:ListBucket",

"Resource":"*"

}

Page 8: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 9: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Session

Access Key ID

Secret Access Key

Expiration

Session Token

Page 10: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 11: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

AWS Account

Instances Table

User

Page 12: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 13: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 14: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Instances Table

Role

User

Your AWS Account

Another AWS Account

Page 15: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

1Authenticate with

“Demo” user’s access

keys

Construct sign-in URL using

the temporary security

credentials to access the

AWS Management Console

3

Assume the

“CrossAccount” role to get

temporary

security credentials

2

Script

“CrossAccount” Role

Trusts: PM Team AWS Account

Grants: EC2 full and IAM read-only

Uses External ID

IAM/STS

My AWS Account

“Demo” IAM User

Can assume the

“CrossAccount” role

IAM/STS

PM Team AWS Account

Page 16: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 17: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Partner’s AWS Account

User

Instances Table

Role

External ID

Your AWS Account

ID

Page 18: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

{

"Effect": "Allow",

"Principal": {"AWS": "arn:aws:iam::EXAMPLE-CORP-ACCOUNT-ID"},

"Action": "sts:AssumeRole",

"Condition": {

"StringEquals": {

"sts:ExternalId": "ID-ISSUED-BY-EXAMPLE-CORP"

}}}

Page 19: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Partner’s AWS Account

Customer A’s AWS Account

Customer B’s AWS Account

User

Role A

Trusts: Partner account

Role B

Trusts: Partner account

1 Use role B

2 Assume role B

3 Show customer

B’s resources

Only if External ID =

Customer A’s external ID

Only if External ID =

Customer B’s external ID

Pass customer’s external

ID while assuming role

Page 20: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

“TrendMicro” Role

Trusts: Trend Micro AWS Account

Grants: Few EC2, ELB, Route53 actions

IAM/STS

My AWS Account1Authenticate using

access keys of IAM user

in Trend Micro’s AWS

account

Call AWS APIs using the

temporary security

credentials

3

Assume the role to get

temporary security

credentials

2

Route 53Amazon EC2 Elastic Load

Balancing

Trend Micro Deep Security for Web Apps

Page 21: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 22: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 23: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

User

Instances Table

Role

Your AWS Account

AWS Service’s AWS Account

Page 24: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 25: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

User

Instances Table

RoleInstance

Your AWS Account

EC2 Service’s AWS Account

Page 26: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Amazon

S3

Amazon

DynamoDB

Role: Allow Amazon S3

access but nothing else

Amazon EC2 Instance

Page 27: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 28: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 29: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
Page 30: (SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014

Please give us your feedback on this session.

Complete session evaluations and earn re:Invent swag.

http://bit.ly/awsevals


Related Documents