Secure IAM
Mateusz Borowski ???
?? Cloud Security Engineer & Consultant | MultiCloud, IaaC, Security Automation, DevSecOps
Are you following the golden rules of IAM cloud security? Here are some guidelines to consider:
When it comes to service accounts, they should be used for server-to-server interactions, and users are responsible for private key security, with the public portion stored on the cloud. Short-lived credentials can be created for service accounts.
For authentication, SAML is an open standard that allows an identity provider to pass authorization credentials to a service provider.
Creating custom roles? Always grant permissions such as resourcemanager.projects.get/list as a pair, and be aware that the setIamPolicy permission for organization, folder, and project resources allows the user to grant all other permissions.
Lastly, consider using organization policies and constraints to define and apply restrictions to your cloud services. For example, you can disable VM serial port access or service account creation, or define trusted image projects. Stay safe and secure in the cloud!
Cloud Enthusiast ?? Book Lover ?? Stock Investor ??
1 年For cloud, instead of using service accounts, you can use managed identities and then rotating keys/secrets is out of the admin scope. For rules, I would also recommend to use just-in time access whenever possible and use tools like Azure PIM :)