Trusted Cloud Credential Manager
The Trusted Cloud Credential Manager (TCCM) is a component of the SCCA. It is responsible for credential management. When establishing the TCCM, it's important to allow least-privilege access to the SCCA. This can be accomplished by using AWS identity and access management services. An additional component of the TCCM is a connection to the Virtual Data Center Managed Services (VDMS). You can use this connection as needed to access the AWS Management Console to manage the TCCM.
The TCCM is a combination of both technologies and standards that govern access to AWS. The TCCM is considered critical for most implementations because it controls access permissions. The TCCM function is not intended to place unique identity management requirements upon the commercial cloud service provider (CSP). The TCCM also does not prohibit the use of DoD CSP federation or third-party identity broker solutions to provide the intended identity control.
The TCCM policy components are based on a general understanding that CSPs offer an
identity and access management system that allows control of access to cloud systems.
Such systems can include the CSP's access console, API, and command-line interface (CLI)
service components. At the base level, the TCCM must lock down credentials that can be
used to create unauthorized networks and other resources. The TCCM is appointed by the
Authorizing Official (AO) charged with oversight of IT systems. The TCCM policies
establish the need for a least-privilege access model. These policies
are responsible for the provision and control of privileged user credentials in the
commercial cloud. This is to stay in alignment with the DoD Cloud Computing Security
Requirements Guide
The following table contains the minimum requirements for the TCCM. It explains whether the LZA addresses each requirement and which AWS services you can use to meet these requirements.
ID | TCCM security requirements | AWS technologies | Additional resources | Covered by LZA |
---|---|---|---|---|
2.1.4.1 | The TCCM shall develop and maintain a Cloud Credential Management Plan (CCMP)to address the implementation of policies, plans, and procedures that will be applied to mission owner customer portal account credential management. | N/A | N/A | Not covered |
2.1.4.2 | The TCCM shall collect, audit, and archive all Customer Portal activity logs and alerts. | N/A | Covered | |
2.1.4.3 | The TCCM shall ensure activity log alerts are shared with, forwarded to, or retrievable by DoD privileged users engaged in MCP and BCP activities. | N/A | Covered | |
2.1.4.4 | The TCCM shall, as necessary for information sharing, create log repository access accounts for access to activity log data by privileged users performing both MCP and BCP activities. | N/A | Covered | |
2.1.4.5 | The TCCM shall recover and securely control customer portal account credentials prior to mission application connectivity to the DISN. | AWS IAM Identity Center | N/A | Covered |
2.1.4.6 | The TCCM shall create, issue, and revoke, as necessary, role based access least privileged customer portal credentials to mission owner application and system administrators (i.e., DoD privileged users). | N/A | Covered |
In order to enable the TCCM to meet requirements, the LZA uses programmatic control of resources through the IAM service. You can additionally combine IAM with AWS Managed Microsoft AD to implement single sign-on to another directory. This ties your AWS environment to your on-premises infrastructure with Active Directory trusts. In the LZA, the implementation is deployed with IAM roles for temporary, session-based access IAM roles are short-lived credentials that help your organization meet the necessary TCCM requirements.
Although the LZA implements least privilege access and programmatic, short-term access to AWS resources, review the IAM best practices to ensure that you follow the recommended security guidance.
For more information about implementing AWS Managed Microsoft AD, see the AWS Managed Microsoft AD
The AWS shared
responsibility model