AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • Step 1: Define Access Requirements
  • Identify User & Service Access Needs
  • Step 2: Establish Secure Identity and Access Management
  • Centralizing Identity with AWS Identity Center (SSO)
  • IAM Policies and Resource Policies
  • Implementing IAM Role-Based Access
  • Applying Security Best Practices
  • Leveraging IAM Tools for Enhanced Security
  • Step 3: Enforcing Governance with AWS Organizations
  • Structuring AWS Organizations for Security & Governance
  • Applying Service Control Policies (SCPs) for Security Boundaries
  • Implementing IAM Permission Boundaries to Prevent Privilege Escalation
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.1: Design secure access to AWS resources

SecureCart's Journey

SecureCart is a cloud-native e-commerce platform built on AWS, designed to provide a secure, scalable, and high-performing shopping experience. Given the nature of e-commerce, SecureCart must protect customer data, prevent unauthorized access, and enforce strict security controls across its AWS infrastructure.

As SecureCart operates in a multi-account AWS environment, its security strategy aligns with Task Statement 1.1: Design Secure Access to AWS Resources, ensuring that access to AWS services is properly controlled, managed, and monitored.

Step 1: Define Access Requirements

Identify User & Service Access Needs

  • Who needs access?

    • Developers → Need access to deploy and troubleshoot services.

    • Security Team → Requires full visibility but limited write permissions.

    • Application Services → Require controlled access to AWS resources (S3, RDS, etc.).

    • Third-Party Vendors → Need temporary, scoped access.

  • What AWS resources need access control?

    • Compute (ECS, Lambda, EC2)

    • Storage (S3, EBS)

    • Databases (RDS, DynamoDB)

    • IAM & Security Controls (CloudTrail, GuardDuty, Config)

  • Multi-Account Structure in AWS Organizations

    • Management Account → Governance & Security Controls.

    • Workload Accounts → Separate accounts for Dev, Staging, Production.

    • Security & Logging Account → Centralized logging, IAM monitoring, and threat detection.


Step 2: Establish Secure Identity and Access Management

Centralizing Identity with AWS Identity Center (SSO)

  • AWS Identity Center (formerly SSO) for centralized authentication and access control.

  • Federated access via Azure AD/Okta using SAML 2.0 or OIDC to allow seamless sign-in.

  • Role-Based Access Control (RBAC) using IAM roles mapped to Identity Center permission sets.

  • Enforce MFA for all users and assign role-based access (RBAC) to AWS accounts.

  • Use Case: A developer logs in via Okta, assumes a role in AWS Identity Center, and gets read-only access to non-prod environments.

IAM Policies and Resource Policies

  • IAM Policies (Identity-Based Policies) manage permissions at the user, group, or role level.

  • Resource Policies are attached directly to AWS resources like S3, SNS, and SQS, controlling who can access them.

  • Use Case: A Lambda function needs to access an S3 bucket—IAM policy grants it permissions, while the S3 resource policy ensures only Lambda can read its data.

  • Use Case: A third-party service publishes messages to an SNS topic—a resource policy allows only the external AWS account to send messages.

Implementing IAM Role-Based Access

  • No IAM users → Use IAM roles with temporary credentials.

  • Principle of Least Privilege (PoLP) → Define custom IAM policies with only required permissions.

  • IAM permission boundaries to restrict max permissions developers can grant themselves.

  • IAM Access Analyzer to monitor unintended public access.

Applying Security Best Practices

  • Follow the principle of least privilege—grant only the permissions required for a specific task.

  • Use Service Control Policies (SCPs) in AWS Organizations to enforce security boundaries.

  • Enable IAM Access Analyzer to detect overly permissive IAM policies.

  • Use Case: To prevent developers from accidentally deleting production resources, SCPs block destructive actions in production accounts.

  • Use Case: A CI/CD pipeline requires temporary permissions to deploy an application, so it assumes an IAM role with limited deployment access.

Leveraging IAM Tools for Enhanced Security

  • IAM Access Analyzer: Detects misconfigured policies and alerts for excessive permissions.

  • AWS Organizations SCPs: Enforces security guardrails across multiple accounts.

  • IAM Credential Reports: Helps audit IAM users and identify stale access keys.

  • IAM Policy Simulator: Tests and validates IAM policies before applying them to prevent misconfigurations.


Step 3: Enforcing Governance with AWS Organizations

Structuring AWS Organizations for Security & Governance

  • Organizational Units (OUs) for different environments:

    • SecurityOU: Security & compliance enforcement.

    • WorkloadsOU: Dev, Staging, and Production workload accounts.

    • SharedServicesOU: Centralized CI/CD, logging, networking.

Applying Service Control Policies (SCPs) for Security Boundaries

  • Prevent root user access with an SCP.

  • Restrict usage of specific services (e.g., disallow Internet Gateway creation outside networking accounts).

  • Enforce encryption for S3, RDS, and EBS with SCPs.

  • Restrict AWS Region usage to comply with data residency laws.

Implementing IAM Permission Boundaries to Prevent Privilege Escalation

  • Permission Boundaries define the maximum permissions an IAM role or user can be granted, preventing privilege escalation.

  • Use case: Restricting a developer’s permissions, ensuring they can only assume specific roles without exceeding organizational limits.

  • Use Case: Allowing teams to create IAM roles but preventing them from granting admin-level permissions.

PreviousTask Statement 1.1: Design secure access to AWS resourcesNextAWS Identity & Access Management (IAM) Fundamentals

Last updated 2 months ago