Stream.Security introduces Cross Accounts connections via assume role

Michael Schwartz
November 6, 2023
2
min. read
Tags
No items found.
Related Resource(s)

TL;DR

As a DevOps engineer, there are cases where you need to provide cross-account access to the objects in your AWS account.
If you want to achieve that, you can use the cross-account assumption of IAM roles or resource-based policies. However, there are several problems when implementing these methods:

  • It is difficult to keep track of which resources have access to the various roles when managing multiple accounts
  • Provide the exact required IAM permissions to the user or the resource without being too over permissive, or not providing the appropriate permissions
  • Maintenance and staying in control : it is difficult to maintain all the various cross account relationships and resources when more and more resources and users are constantly being added to these accounts

With Stream Security, you can eliminate all of the above concerns and gain control of your cross-account access!
Lightlytcs now supports all methods of cross-account assume role, and will help you understand which resources and even users have access to another account, via which configuration.

Start using Stream Security to gain control over your existing infrastructure and design changes easily, and risk-free:

Cross-Account IAM-Roles

Cross-account IAM Roles are used to define access to resources within a single account, but they are not restricted to a single account. For example, The EC2 servers in your staging environment can safely get access to an S3 bucket in production by using a properly defined role to do so. Cross-account Role is the right tool to comply with best practices and simplify credential management, as it eliminates the need to manage third party credentials.

Cross account connection via assuming role policy

‍Cross account Resource-based Policies
With Resource-based policies, you can also grant cross-account access to your resources. Instead of using a role as a proxy, you can attach a policy directly to the resource you want to share. The resource that you want to share must support resource-based policies.

A resource-based policy with cross-account access has an advantage over a role-based policy. If a resource is accessed via a resource-based policy, the user still works in the trusted account and does not have to give up its user permissions in place of its role permissions. In other words, the user continues to have access to resources in the trusted account at the same time as he has access to the resource in the trusting account. This is useful for tasks such as copying information to or from the shared resource in the other account.

Resource cross-account inline policy

Cross account connection via resource based inline policy

Click here to Start your free trial now!

What's new