This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Unified Authentication and Authorization Mechanisms
The security mechanisms that define and manage identity and access management are among the most critical parts of an information security program. They serve to ensure that only authenticated principals (users, roles, groups, applications, and other identities) are authorized to access the targeted resource in the manner intended and with least privilege. A major feature that many organizations strive for is unified authentication across enterprise services. This feature allows for identity validation that is applicable to the entire portfolio of services. Executing on this functionality is difficult especially when dealing with diverse systems that require custom credential formats or have incompatible authorization models.
With AWS, customers gain the ability for unified authentication and authorization
across all AWS services to enforce least privilege. AWS Identity and Access Management (IAM)
Customers can use policies in multiple ways including 1) controlling which resources a
set of users can access, 2) controlling which users can access a given resource, 3)
controlling which AWS services can be used, and 4) controlling which users are allowed to
modify policies. All policies allow the use of conditions to further scope access. For
example, a customer could enforce a policy that only allows access to contents in an Amazon Simple Storage Service (Amazon S3)
This level of control, deep integration, and wide interoperability would be exceedingly difficult to implement and manage in a traditional on-premises enterprise environment with physically separated and disparate systems. Most organizations use a combination of access and identity management solutions that vary across business unit and applications, but also across different layers of the infrastructure “stack” — network devices, virtualization, operating systems, and applications. This leads to a large set of identity services that need to be bound together and managed in a unified way. Adding to the management complexity, integration of these systems usually requires significant manual work coupled with continual care and attention as other parts of the service portfolio are brought into the fold. Additionally, uniform access policies still have to be crafted to help ensure enforcement cascades down to the system and data levels across an enterprise.
With AWS, policy-based security management gives customers several distinct advantages.
Security policies can be crafted to be both human and machine readable. This means that, while
treating policy as
code