Search for Well Architected Advice
< All Topics
Print

Manage access based on life cycle

Integrating access controls with both operator and application lifecycle events ensures that access to your resources is always aligned with the current roles and responsibilities of users and applications. By tightly coupling access management with your centralized identity provider, you can ensure that permissions are updated or revoked automatically when users leave the organization, change roles, or when applications are decommissioned. This approach reduces the risk of orphaned accounts or excessive permissions lingering in the system.

  1. Automate access provisioning and deprovisioning: Integrate with your centralized identity provider (such as AWS Single Sign-On or an external federation provider) to automatically provision and revoke access based on lifecycle events. When users join, leave, or change roles within your organization, their access to AWS resources should be automatically updated to reflect these changes.
  2. Integrate with HR and identity systems: Use integration with your HR system or identity provider to trigger access control updates. For example, when an employee is terminated or moves to a new role, the HR system should trigger the removal or adjustment of their access privileges in AWS.
  3. Remove access when roles change or users leave: Ensure that user access is revoked when they no longer require it. This includes removing access when users change roles within the organization or leave the company entirely, preventing lingering access that could be misused.
  4. Enforce temporary access for contractors or external parties: Use time-bound access for temporary users such as contractors or external partners. Ensure that access is granted only for the duration of their work and is automatically revoked afterward.
  5. Manage application lifecycle access: As applications or services are decommissioned or retired, ensure that associated permissions and access controls are also removed. This prevents unnecessary permissions from remaining in your environment, reducing security risks.
  6. Audit access regularly: Conduct regular audits to ensure that access controls remain in line with the current lifecycle status of users and applications. Use AWS CloudTrail and IAM reports to identify any orphaned accounts or misaligned permissions.

Supporting Questions:

  • How do you ensure that user access is automatically updated or revoked when roles change or users leave the organization?
  • What systems are integrated with your identity provider to manage the lifecycle of users and applications?
  • How do you handle temporary access for contractors and ensure it is revoked when no longer needed?

Roles and Responsibilities:

Identity and Access Management Specialist:

  • Responsibilities:
    • Ensure that access is provisioned and deprovisioned automatically based on lifecycle events such as user terminations or role changes.
    • Integrate identity management systems with HR systems to automate access controls.
    • Regularly review and update access policies to ensure they reflect the current organizational structure.

Cloud Administrator:

  • Responsibilities:
    • Configure and manage access controls to ensure they align with the lifecycle of both operators and applications.
    • Ensure that temporary access for contractors and external parties is managed and revoked in a timely manner.
    • Audit lifecycle-related access changes using AWS CloudTrail and IAM reports.

Artefacts:

  • Lifecycle Access Management Policies: Documentation that outlines the processes for granting, updating, and revoking access based on user and application lifecycle events.
  • Access Deprovisioning Logs: Logs from AWS CloudTrail or IAM reports that track the removal of access following lifecycle changes, such as employee terminations or role changes.
  • Audit Reports: Reports generated from periodic access audits to ensure that permissions align with current user roles and lifecycle status.

Relevant AWS Services:

AWS Identity Services:

  • AWS Identity and Access Management (IAM): Use IAM to manage access permissions for users and applications, automatically updating or revoking access based on lifecycle changes.
  • AWS Single Sign-On (SSO): Integrate with your centralized identity provider to automate access provisioning and deprovisioning, ensuring that user permissions reflect their current roles.
  • AWS Directory Service: Manage lifecycle access for users in Active Directory or other identity directories, ensuring access is controlled based on user lifecycle status.

Monitoring and Compliance Services:

  • AWS CloudTrail: Monitor and log all changes in user and application access, ensuring that permissions are aligned with lifecycle events and any anomalies are detected.
  • AWS Config: Track changes in access policies and permissions to ensure compliance with lifecycle-based access management policies.
Table of Contents