Sunday, January 22, 2023
HomeCyber SecurityLetting Governance Groups Govern. ACM.138 Stopping the riskiest actions… | by Teri...

Letting Governance Groups Govern. ACM.138 Stopping the riskiest actions… | by Teri Radichel | Cloud Safety | Jan, 2023


ACM.138 Stopping the riskiest actions and most egregious errors with cloud organizational insurance policies

https://twitter.com/tswalliance/standing/595989483834757120
  • We are able to have the ROOT profile we created deploy the preliminary governance administrator position, group, and consumer.
  • We are going to enable the governance administrator to create new customers and assign them solely to the governance group solely. These new customers can create SCPs.
  • We are going to disallow the IAM consumer from creating and assigning customers to the SCP group which is allowed to create and alter organizational insurance policies.
  • We are going to disallow the governance group from doing something apart from what’s required for them to handle service management insurance policies, so in different phrases, they are able to create an EC2 occasion to run scripts, however they will be unable to create new IAM permissions.
Medium: Teri Radichel
E-mail Checklist: Teri Radichel
Twitter: @teriradichel
Twitter (firm): @2ndSightLab
Mastodon: @teriradichel@infosec.alternate
Publish: @teriradichel
Fb: 2nd Sight Lab
Slideshare: Shows by Teri Radichel
Speakerdeck: Shows by Teri Radichel
Books: Teri Radichel on Amazon
Recognition: SANS Distinction Makers Award, AWS Hero, IANS College
Certifications: SANS
Schooling: BA Enterprise, Grasp of Sofware Engineering, Grasp of Infosec
How I acquired into safety: Girl in tech
Purchase me a espresso: Teri Radichel
Firm (Penetration Assessments, Assessments, Coaching): 2nd Sight Lab
Request providers through LinkedIn: Teri Radichel or IANS Analysis



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments