IAM Safety

Overview

CloudGuard IAMClosed Identity and Access Management (IAM) - A web service that customers can use to manage users and user permissions within their organizations. Safety controls access to services on AWSClosed Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services. environments by IAM users, and requires that these users have explicitly given permission from a CloudGuard account administrator to access these services. This hardens the AWS account console and restricts users from making that are not approved or accidental changes to account settings without the knowledge and authorization of an administrator. Users can continue to access the account to view settings without restrictions (based on their AWS permissions).

For IAM users to access protected services, they must have an authorization window opened for them for the service. The window can be opened for them by a CloudGuard admin user, on the CloudGuard portal, or by the IAM users themselves with the CloudGuard Mobile App. The authorization window is for a limited period. During this time, the IAM user can access the protected AWS services. At the end of the window, access to the services is blocked.

In addition, all actions taken by IAM users on protected services are logged, and appear in the CloudGuard Audit Trail.

How it Works

CloudGuard IAM Safety protects AWS services or specific actions for these services. To set up IAM Safety on CloudGuard, you configure a CloudGuard IAM policy on your AWS account which grants CloudGuard permissions to control select AWS services. You included in this policy the AWS services or actions that are protected by CloudGuard (AWS actions or services that are not selected can be accessed by IAM users based on their AWS permissions and are not restricted or protected by CloudGuard).

After the policy has been applied to the AWS account, you use CloudGuard to e xplicitly apply protection to the IAM users of the AWS account for the protected services you selected. This means to access the protected services or actions on AWS they are given explicit access permission from a CloudGuard admin user. This is called elevation. It is for a limited time set at the time it is granted. During this time, the IAM user can access the service based on their AWS IAM role. At the end of the time, they are blocked from access.

In addition, you can apply IAM Safety to IAM Roles. In this case, all IAM users with this role can access protected AWS services when the role is elevated.

Use one of these methods to elevate an IAM user or role:

  • By a CloudGuard super user from the CloudGuard portal.

  • They can elevate themselves if they are in addition a CloudGuard user, have installed the CloudGuard Mobile app, and associated it with a protected account.

Note - IAM users of a protected account, who do not have protection applied to them, are not restricted by CloudGuard from accessing services in the account (based on their AWS permissions only). To protect an AWS account, it is important to immediately apply protection to all IAM Users and Roles the account is protected.

Considerations

CloudGuard recommends through categories of actions and services to be protected by IAM Safety. These are grouped as Templates when you set up the IAM Safety, and cover Computing, Networking, Security & Identity, Storage, and Database actions. Check Point recommends to lock down services/actions that are not done frequently, or are irrevocable when done, or both. For example, IAM, Route53, KMSClosed AWS Key Management Service (AWS KMS) - A managed service that simplifies the creation and control of encryption keys that are used to encrypt data., services, or actions such as changing S3 bucket permissions, deleting buckets, or deleting EBSClosed Elastic Block Storage (EBS) Volume hosts virtual data in segments. It's like a storage disk with the ability to contain various sizes of data. These virtual storage devices usually replicate within one AWS region to increase their availability. snapshots.

Prerequisites

The AWS account with the services that you wish to protect with IAM Safety must be onboarded to CloudGuard. See Onboarding AWS Environments.

CloudGuard users must be associated with a protected AWS account to grant access to themselves or other users. This is done by invitation from a CloudGuard admin user.

If it is necessary for CloudGuard users to use the CloudGuard Mobile app to elevate themselves to access AWS-protected services, they must install the application and then pair it with their CloudGuard account.

Protected vs Protected with Elevation

Two procedures used to protect an AWS service:

Protected - Protected AWS IAM users cannot do protected actions on these AWS services in any circumstances. Users can only do these actions if the CloudGuard protection is permanently removed from the service.

Protected with Elevation - CloudGuard users (who are associated with the protected account) can elevate themselves or other IAM users to access protected services for limited periods.

Tamper Protection

IAM users or roles that are protected with IAM Safety are protected against tampering. These users and roles are included in restricted groups or policies in AWS (as part of the procedure CloudGuard implements the protection). If someone tries to remove a user or role from these groups or policies on the AWS console (and not through CloudGuard) it is detected by CloudGuard (and logged in the Audit trail) and rolled back.

Benefits

  • Reduce not approved or accidental access to AWS accounts to change settings or entities

  • Control who can make changes to AWS accounts settings

  • Must have more authorization (the mobile app on the user's device) to grant access

  • Access permissions are temporary, and are automatically removed at the end of the authorization window

  • Full audit trail of access to sensitive services

Use Case

An AWS IAM user account must have:

Actions