🤠Y’all will want to check this new feature from Access Analyzer out. Here are my reasons why…(1/8)
amzn.to/3vbu5k3
You can now preview public and cross account findings BEFORE you deploy resource permissions. (2/8) Image
This validates your permissions changes, giving you confidence the change grants only intended access. (3/8)
Best part! You can now verify that your policy changes remediates any existing Access Analyzer findings. (4/8)
You can also verify you don’t introduce any🆕unintended public or cross-account access. (5/8)
🌅This moves permission analysis closer to policy authoring. Helping you catch and remediate unintended access earlier (6/8) 🌄
You can make a bucket policy change, preview access, and then rinse and repeat using the S3 console or APIs. This helps you understand how policy changes impact public and cross account access. (7/8) 🧐
Go try it out! Let us know what you think. (8/8)
Last one - check out the blog - aws.amazon.com/blogs/security…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Brigid Johnson

Brigid Johnson Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bjohnso5y

16 Mar
Authoring secure and functional policies just got a lot easier with over 100 policy checks from Access Analyzer. Here is why this launch 🚀is a game changer (1/12) Image
The checks help you DURING policy authoring either in the IAM console or as part of your policy workflows with the API. (2/12) Image
There are 4⃣ types of checks including security warnings, errors, general warnings, and suggestions that guide your policy authoring. (3/12)
Read 12 tweets
23 Nov 19
@AWSIdentity just supercharged🔌attribute-based access control (ABAC) by adding session tags😱. This is a powerful capability and here are all the reasons why (1/9) aws.amazon.com/blogs/aws/new-…
@AWSIdentity Session tags enable you to pass attributes from your IdP to role sessions. This means your identity no longer goes “poof”🌬️when you federate into AWS (2/9)
@AWSIdentity You can use session tags for access control and they act just like principal tags. This means your identity provider becomes the source of truth for access control in AWS (3/9)
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!