Just-in-time
(JIT) access, also known as just-in-time privileged access management (JIT
PAM), is a security approach that grants privileged access or permissions only
for the finite moments needed. It eliminates always-on, persistent privileged
access, known as "standing privileges." On the other hand, Just Enough Access aka JEA model is essential
for implementing the principle of least privilege. But "true least
privilege" requires combining both models, so that organizations can
minimize potential attackers' footholds and the paths to privilege that could
escalate an attack. However, many enterprises struggle with having too many
accounts with unnecessary privileges, standing access status quo, privilege
blindness, and lack of context around privileged risk. By combining these
approaches, organizations can significantly reduce the attack surface and
minimize potential vulnerabilities. Some of the malpractices include deploying too many accounts
with unnecessary privileges, permissions, and entitlements, a standing access
status quo, privileged blindness, and lack of context around privileged risk.
In Amazon Web Services (AWS), limiting human access to cloud
resources is crucial for security. AWS offers tools like AWS Identity and
Access Management (IAM) and AWS IAM Identity Center for managing access.
Granting just-in-time access to developers for a limited time based on approval
is an effective way to limit active time frames for assignments to AWS
resources. Okta's integration with IAM Identity Center allows customers to
access AWS using their Okta identities. As an example, the roles could
correspond to different job functions within your organization. For example,
the “AWS EC2 Admin” role could correspond to a DevOps on-call site reliability
engineer (SRE) lead, whereas the “AWS EC2 Read Only” role may apply to members
of your development team. The step-by-step configuration for this involves
setting up groups representing different privilege levels, enabling automatic
provisioning of groups using SCIM protocol, assigning access for groups in Okta,
creating permissions sets in IAM identity center, assign group access in your AWS
organization, configuring Okta identity governance access requests and finally
testing the configuration. Okta's integration with AWS minimizes persistent
access assignments, granting access just in time for specific operational
functions. This solution allows empty user groups to be assigned to
highly-privileged AWS permissions, with Okta Access Requests controlling group
membership duration.
In Azure, Conditional Access templates provide a convenient
method to deploy new policies aligned with Microsoft recommendations. These
templates are designed to provide maximum protection aligned with commonly used
policies across various customer types and locations. The templates are
organized into secure foundation, zero trust, remote work, protect
administrator, and emerging threats. Certain accounts must be excluded from
these templates such as emergency-access or break-glass accounts to prevent tenant-wide
account lockout and some service accounts and service principals that are
non-interactive and tied to any particular user.
No comments:
Post a Comment