SEC03-BP03 Establish emergency access process
A process that allows emergency access to your workload in the unlikely event of an automated process or pipeline issue. This will help you rely on least privilege access, but ensure users can obtain the right level of access when they require it. For example, establish a process for administrators to verify and approve their request, such as an emergency AWS cross-account role for access, or a specific process for administrators to follow to validate and approve an emergency request.
Common anti-patterns:
-
Not having an emergency process in place to recover from an outage with your existing identity configuration.
-
Granting long term elevated permissions for troubleshooting or recovery purposes.
Level of risk exposed if this best practice is not established: Medium
Implementation guidance
Establishing emergency access can take several forms for which you should be prepared.
The first is a failure of your primary identity provider. In this case, you should rely on a
second method of access with the required permissions to recover. This method could be a
backup identity provider or a user. This second method should be tightly controlled,
monitored, and notify
You should also be prepared for emergency access where temporary elevated administrative access is needed. A common scenario is to limit mutating permissions to an automated process used for deploying changes. In the event that this process has an issue, users might need to request elevated permissions to restore functionality. In this case, establish a process where users can request elevated access and administrators can validate and approve it. The implementation plans detailing the best practice guidance for pre-provisioning access and setting up emergency, break-glass, roles are provided as part of SEC10-BP05 Pre-provision access.
Resources
Related documents:
Related video: