Unified Authentication and Authorization Mechanisms
The security mechanisms that define and manage identity and access management are among the most critical parts of an information security program. They serve to ensure that only authenticated principals (users, roles, groups, applications, and other identities) are authorized to access the targeted resource in the manner intended and with least privilege. A major feature that many organizations strive for is unified authentication across enterprise services. This feature allows for identity validation that is applicable to the entire portfolio of services. Executing on this functionality is difficult especially when dealing with diverse systems that require custom credential formats or have incompatible authorization models.
With AWS, customers gain the ability for unified authentication
and authorization across all AWS services to enforce least
privilege. AWS Identity and Access Management (IAM)
Customers can use policies in multiple ways including 1)
controlling which resources a set of users can access, 2)
controlling which users can access a given resource, 3)
controlling which AWS services can be used, and 4) controlling
which users are allowed to modify policies. All policies allow the
use of conditions to further scope access. For example, a customer
could enforce a policy that only allows access to contents in an
Amazon Simple Storage Service (Amazon S3)
This level of control, deep integration, and wide interoperability would be exceedingly difficult to implement and manage in a traditional on-premises enterprise environment with physically separated and disparate systems. Most organizations use a combination of access and identity management solutions that vary across business unit and applications, but also across different layers of the infrastructure “stack” — network devices, virtualization, operating systems, and applications. This leads to a large set of identity services that need to be bound together and managed in a unified way. Adding to the management complexity, integration of these systems usually requires significant manual work coupled with continual care and attention as other parts of the service portfolio are brought into the fold. Additionally, uniform access policies still have to be crafted to ensure enforcement cascades down to the system and data levels across an enterprise.
With AWS, policy-based security management gives customers several
distinct advantages. Security policies can be crafted to be both
human and machine readable. This means that, while treating
policy
as code