Cloud
Guardrails

Identity and Auth Starter Pack

Cloud Guardrails

If you're interested in contributing guidance, please start with these instructions.

Filters
Filters
Categories
Clear
Maturity Level
Clear
Functions
Clear
Cloud Provider
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
IAM Service Users can only assume into a role which has actual permissions
Medium
AWS
Adam Cotenoff
Summary
Creating IAM roles that have the necessary permissions, and then assigning those roles to the IAM users who require access to the resources allows you to centralize the management of permissions.
Applicable to
Always
When to use/avoid
Limit IAM users
Medium
AWS
Adam Cotenoff
Summary
Limit the creation of new IAM users, and prefer using IAM roles when possible.
Applicable to
Always
When to use/avoid
Rotate IAM access keys
AWS
Adam Cotenoff
Summary
Rotate IAM access keys where IAM users are still required
Applicable to
To IAM users
When to use/avoid
OIDC Integration for popular services
Medium
AWS
Will Bengtson
Summary
Avoid using IAM users for popular services by creating a pattern to enable OIDC integrations.
Applicable to
Always
When to use/avoid
Restrict OIDC Integrations
Medium
AWS
Will Bengtson
Summary
Restrict OIDC integrations so you don't have backdoor or rogue access.
Applicable to
Always
When to use/avoid
Multi-party approval (MPA) and multi-factor authentication (MFA) should be required for all changes to production
Medium
AWS
Adam Cotenoff
Summary
Limiting engineers' access to production environments by managing infrastructure through Infrastructure as Code (IaC), enforcing identity-based changes, multi-party approval, MFA, and security linting helps ensure accountability, consistency, and reduces security risks.
Applicable to
Applies when a robust IaC CI/CD workflow is in place
When to use/avoid
Guardrails to prevent removal of security services/tooling
Medium
AWS
Adam Cotenoff
Summary
Set up baseline security services by default (logging, monitoring, IAM, etc.) and prevent them from being removed.
Applicable to
This best practice applies particularly when using AWS Organizations to centrally manage multiple AWS accounts as a single entity.
When to use/avoid
Cloud Guardrails

If you're interested in contributing guidance, please start with these instructions.

Filters
Filters
Categories
Clear
Maturity Level
Clear
Functions
Clear
Cloud Provider
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Name
IAM Service Users can only assume into a role which has actual permissions
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Adam Cotenoff
Limit IAM users
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Adam Cotenoff
Rotate IAM access keys
Categories
Maturity Level
Functionality
Cloud Provider
Author
Adam Cotenoff
OIDC Integration for popular services
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Will Bengtson
Restrict OIDC Integrations
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Will Bengtson
Multi-party approval (MPA) and multi-factor authentication (MFA) should be required for all changes to production
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Adam Cotenoff
Guardrails to prevent removal of security services/tooling
Categories
Maturity Level
Medium
Functionality
Cloud Provider
Author
Adam Cotenoff
Process
Data
Architecture
Configuration
Change Management
Compliance
Identity
Cost Management
Reliability
Security
Standards