Awesome
Data Perimeter Policy Examples
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
Table of Contents
- DISCLAIMER
- Introduction
- Getting started
- Policy types
- Tagging conventions
- Implementation
- License summary
DISCLAIMER
The sample code; software libraries; command line tools; proofs of concept; templates; or other related technology (including any of the foregoing that are provided by our personnel) is provided to you as AWS Content under the AWS Customer Agreement, or the relevant written agreement between you and AWS (whichever applies). You should not use this AWS Content in your production accounts, or on production or other critical data. You are responsible for testing, securing, and optimizing the AWS Content, such as sample code, as appropriate for production grade use based on your specific quality control practices and standards.
Introduction
This repository contains example policies to help you implement a data perimeter on AWS. The policy examples in this repository cover some common patterns and are for reference purposes only. Tailor and extend these examples to suit the needs of your environment.
Getting started
A data perimeter is a set of preventive guardrails to help ensure that only your trusted identities are accessing trusted resources from expected networks. To get started with data perimeters on AWS, review the following resources:
Policy types
You implement data perimeters primarily by using three different policy types: service control policies (SCPs), resource-based policies, and VPC endpoint policies. This repo provides examples of these policy types. The following table illustrates the relationship between data perimeter objectives and policy types used to achieve them.
Data perimeter | Control objective | Policy type | Primary IAM capability | Policy examples |
---|---|---|---|---|
Identity perimeter | Only trusted identities can access my resources | Resource-based policy | aws:PrincipalOrgID, aws:PrincipalIsAWSService | resource_based_policies |
Only trusted identities are allowed from my network | VPC endpoint policy | aws:PrincipalOrgID, aws:PrincipalIsAWSService | vpc_endpoint_policies | |
Resource perimeter | My identities can access only trusted resources | SCP | aws:ResourceOrgID | service_control_policies |
Only trusted resources can be accessed from my network | VPC endpoint policy | aws:ResourceOrgID | vpc_endpoint_policies | |
Network perimeter | My identities can access resources only from expected networks | SCP | aws:SourceIp, aws:SourceVpc/aws:SourceVpce, aws:ViaAWSService | service_control_policies |
My resources can only be accessed from expected networks | Resource-based policy | aws:SourceIp, aws:SourceVpc/aws:SourceVpce, aws:ViaAWSService, aws:PrincipalIsAWSService | resource_based_policies |
Policy examples in this repository include various data access patterns you might need to account for when implementing a data perimeter on AWS. The README.md in the folder for each policy type contains information about the included access patterns.
Tagging conventions
Policy examples in this repository use the aws:PrincipalTag/tag-key
global condition key to control the scope of data perimeter guardrails with the following tagging conventions. You should follow your existing tagging strategy or AWS tagging best practices when implementing in your environment.
- Tag AWS Identity and Access Management (IAM) principals in your accounts that you would like to target with network perimeter controls with the
data-perimeter-include
tag key and the value set totrue
. You may want to start with IAM principals used by human users to access AWS services interactively in the AWS Management Console, or programmatically with the AWS CLI, AWS Tools for PowerShell, or API. - Tag IAM principals in your accounts that should be excluded from the network perimeter with the
network-perimeter-exception
tag key and the value set totrue
. This tag key is designed for human users and applications that should be able to use AWS services from outside of your expected network. - Tag IAM principals in your accounts that should be excluded from the identity perimeter with the
identity-perimeter-exception
tag key and the value set totrue
. This tag key is designed for human users and applications that should be able to use AWS services without being restricted by identity perimeter controls. - Tag IAM principals in your accounts that should be excluded from the resource perimeter with the
resource-perimeter-exception
tag key and the value set totrue
. This tag key is designed for human users and applications that should be able to access resources that do not belong to your organization. - Tag IAM principals in your accounts that should be excluded from the resource perimeter with the
<service>-resource-perimeter-exception
tag key and the value set totrue
. This tag key is designed for human users and applications that should be able to access service specific resources that do not belong to your organization. - Tag IAM principals in your accounts that should be excluded from all data perimeters with the
data-perimeter-exception
tag key and the value set totrue
. This tag key is designed for human users and applications that should be able to use AWS services without being restricted by any perimeter control.
Because the preceding tags are used for authorization, the data_perimeter_governance_policy_1 SCP example includes a statement to protect these tags from unauthorized changes. In the data_perimeter_governance_policy_1
example, only principals with the team
tag and the value set to admin
will be able to apply and modify these tags. You can modify the example policies based on the tagging strategy and governance adopted in your organization.
Note that if you are using AWS Control Tower to centrally manage and govern your accounts, you might also need to exclude AWSControlTowerExecution and other roles that the service uses to manage accounts on your behalf.
Implementation
To effectively use the example policies in this repository, follow these steps:
-
Determine which policy and perimeter types to implement based on the control objectives they help achieve and your security requirements.
-
Replace the placeholder values in the example policies based on your definition of trusted identities, trusted resources, and expected networks:
- Replace
<my-org-id>
with your AWS Organizations organization ID. - Replace
<my-account-id>
with an account ID that owns the resource to which you are applying the resource-based policy. - Replace
<region>
with the AWS Region to which you are deploying the policy. - Replace
<my-corporate-cidr>
with your corporate public IP space. - Replace
<my-vpc>
with a list of VPC IDs that constitute your network perimeter for a resource or an AWS Organizations entity to which you are applying a policy. - Replace
<my-data-bucket>
with the name of the bucket to which you are applying the resource-based policy. - Replace
<load-balancing-account-id>
with the ID of the AWS account that belongs to the Elastic Load Balancing services (based on the Region for your load balancer) if access logging is in use. See Enable access logs for your Classic Load Balancers and Access logs for your Application Load Balancer for a complete list of account IDs. - Replace
<ecr-account-id>
with the ID of the AWS account that owns Amazon Elastic Container Registry (Amazon ECR) repositories that you require to be used in your environment. See "Sid":"EnforceResourcePerimeterAWSResourcesECR" and "Sid": "AllowRequestsByOrgsIdentitiesToAWSResources" for more details. - Replace
<lambdalayer-account-id>
with the ID of the AWS account that owns AWS Lambda layers that you require to be used within your environment. See "Sid":"EnforceResourcePerimeterAWSResourcesLambdaLayer" for more details. - Replace the following values to support third party integrations where access to third party resources or by third party identities is required:
- Replace
<third-party-account-a>
and<third-party-account-b>
with account IDs of third parties. - Replace
<action>
with specific actions required for third party integrations. - Replace
<third-party-resource-arn>
with the Amazon Resource Name (ARN) of the resource owned by a third party. - If you do not have third party integrations that require access to your resources or networks:
- Remove
<third-party-account-a>
and<third-party-account-b>
from theaws:PrincipalAccount
condition key in the resource-based policy examples. - Remove
"Sid": “AllowRequestsByOrgsIdentitiesToThirdPartyResources"
and"Sid": "AllowRequestsByThirdPartyIdentitiesToThirdPartyResources"
statements from the VPC endpoint policy examples. - Remove the
"Sid":"EnforceResourcePerimeterThirdPartyResources"
statement from theresource_perimeter_policy
SCP example.
- Remove
- Replace
- Tag IAM identities in your accounts in accordance with the tagging conventions for applying data perimeter controls (see the Tagging conventions earlier in this document).
- Replace
-
Deploy policies by using the AWS Management Console or AWS CLI. You can also automate the deployment by using your Infrastructure as Code and CI/CD solutions.
- Implement SCPs:
- Implement resource-based policies:
- See AWS services that work with IAM for services that support resource-based policies and follow links in the Resource-based policies column, or see AWS Documentation (select the applicable service) for instructions about how to apply a resource-based policy.
- Implement VPC endpoint policies:
License Summary
The documentation is made available under the Creative Commons Attribution-ShareAlike 4.0 International License. See the LICENSE file.
The sample code within this documentation is made available under the MIT-0 license. See the LICENSE-SAMPLECODE file.