Authoring secure and functional policies just got a lot easier with over 100 policy checks from Access Analyzer. Here is why this launch 🚀is a game changer (1/12) Image
The checks help you DURING policy authoring either in the IAM console or as part of your policy workflows with the API. (2/12) Image
There are 4⃣ types of checks including security warnings, errors, general warnings, and suggestions that guide your policy authoring. (3/12)
Each check shares actionable guidance to resolve the findings. There is also a doc link for each check to provide more detailed guidance. (4/12)
I have two favorite checks.🥖First is a security check for PassRole on * Since most accounts have an admin role, granting access to pass all roles can lead to privilege escalation and not recommended. 🥖 (5/12)
Second is invalid action, this helps you with typos and removing any actions that are fake news. This helps overall policy hygiene 🚿 making your policies more readable and accurate. (6/12)
Access Analyzer also reports invalid services in policies. Turns out “Pickles” is not an AWS service…yet. Image
You also get JSON errors. Go and fix all those missing curly brackets and semi-colons. We have all been there. (8/12)
With policy validation, Access Analyzer moves analysis closer to policy creation. Helping you catch and resolve any issues before you deploy them. (9/12)
🍾 We drank our own champagne (I love me some bubbles) and updated AWS managed policies using the same checks we are making available today. 🍾(10/12)
Finally, we are looking to add more checks to our policy validation. Send us your ideas! (11/12)
Learn more about this launch by reading the blog post by @jeffbarr aws.amazon.com/blogs/aws/iam-… (12/12)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Brigid Johnson

Brigid Johnson Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bjohnso5y

10 Mar
🤠Y’all will want to check this new feature from Access Analyzer out. Here are my reasons why…(1/8)
amzn.to/3vbu5k3
You can now preview public and cross account findings BEFORE you deploy resource permissions. (2/8) Image
This validates your permissions changes, giving you confidence the change grants only intended access. (3/8)
Read 9 tweets
23 Nov 19
@AWSIdentity just supercharged🔌attribute-based access control (ABAC) by adding session tags😱. This is a powerful capability and here are all the reasons why (1/9) aws.amazon.com/blogs/aws/new-…
@AWSIdentity Session tags enable you to pass attributes from your IdP to role sessions. This means your identity no longer goes “poof”🌬️when you federate into AWS (2/9)
@AWSIdentity You can use session tags for access control and they act just like principal tags. This means your identity provider becomes the source of truth for access control in AWS (3/9)
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!