department-of-veterans-affairs / va.gov-team

Public resources for building on and in support of VA.gov. Visit complete Knowledge Hub:
https://depo-platform-documentation.scrollhelp.site/index.html
281 stars 201 forks source link

Reduce excessive access permissions in AWS #50662

Open raywangoctova opened 1 year ago

raywangoctova commented 1 year ago

LOE

Medium

Problem Statement

Currently, there is some bloating in our highest levels of access across our most important system -- AWS. We don't have hard and fast rules about who should be in what groups in AWS so we have more users than expected in the AWS Admin and AWS SSM Prod roles.

How might we ensure that we have the correct folks in the correct AWS roles not and moving forward can maintain that.

User Impact

Some people will have less access but the correct level of access for their roles.

Where was this problem reported?

Leadership noticed

What do we not know about the problem space?

We can see who has what access, we know those access levels should be very limited

What (if any) research or discovery has been done?

None Yet but we should consider more consistent use of AWS roles, Individual Users should not be getting individual access assigned, We should also be using temporary AWS credentials to allows permissions escalations when necessary.

What is the acceptance criteria?

How should we measure success?

% reduction in AWS admin access % reduction in AWS SSM Prod access

TODOs

little-oddball commented 1 year ago

Should have a spike to be more specific about the problem space but more importantly to perform research and thought into a recommended best practice path forward.