Case Study: AWS Identity & Access Management Policies

SHARE

Background

A large U.S. Government Agency required additional enhancements to an existing infrastructure and applications. They needed a system set up that allowed for easy tracking of resources as it applied to their billing of internal clients. They wanted to monitor data organization related to project management and budget administration within the existing infrastructure and applications which were setup by Simple Technology Solutions. It was imperative that the organization be able to determine where expenditures were happening, while also guaranteeing that they had a tagging system and policy in place that was enforced and utilized enterprise wide.

Analysis

Simple Technology Solutions offered an assessment and analysis of the agency’s issue and realized that individual policy roles based upon job duty or responsibility must first be established. The organization needed to have roles for Administrator, Billing, Networking, and more created, and in turn, specific accounts had to be assigned access to said roles. The AWS IAM policies needed to be all encompassing in this regard so individual updating on a separate level could be avoided at all costs.

 

Solution

After analysis, Simple Technology Solutions decided the best way to solve the issues that the agency was experiencing was by creating Teraform IAM policies across all of the accounts. Then, after applying custom code to the policies, they could be applied across the entire cloud via only a few clicks of a button.


Benefit

The customized AWS IAM policies are reusable and include version tracking. Through version tracking, an administrator can see what was changed, what has stopped working, and assess the overall speed and feasibility of the system as a whole.

Customized AWS IAM policies are reusable and include version tracking.

15. AWS IDENTITY & ACCESS MANAGEMENT POLICIES

Like what you're reading? Start a conversation by booking a meeting with us today

 

resources.simpletechnology.iohs-fshubfsScreen Shot 2021-04-06 at 1.46.01 PM

Though the need for cloud security is clear, many agencies don’t have the necessary skill sets in-house to deal with sophisticated, constantly evolving threats. Learn more on how you can best prepare your agency’s security by downloading the Guide to Achieving Cloud Security for Federal Agency. 

ACCESS THE EBOOK