Skip to content

Latest commit

 

History

History
35 lines (21 loc) · 1.81 KB

02_aws_access.md

File metadata and controls

35 lines (21 loc) · 1.81 KB

AWS Access

Two AWS accounts are used, both under the MHCLG AWS Organisation.

  • Production 468442790030 – Production environment only
  • Development 486283582667 – Test and Staging environments

Access for humans is managed by DLUHC, signing in via an AWS organisation account and role switching. Since we have no console users we do not set an IAM password policy in our accounts.

Service users are created directly in the relevant account and are managed by Terraform, with the exception of the Terraform CI/CD user.

We have enabled AWS GuardDuty, which can detect suspicious account activity, including unauthorised creation of new IAM users or access keys.

Permissions/Roles

These are the roles used by humans to access the account.

Managed by DLUHC:

Managed in this repository and environment specific. These are defined in roles.tf.

  • cloudwatch-monitor - CloudWatch access
  • application-support - View logs and use SSM to connect to MarkLogic and Active Directory
  • infra-support - Same as above, plus ReadOnlyAccess, Terraform state read, access to AWS support tickets, and permissions to perform some common actions, like scaling up/down servers

The full names of the roles start with assume- and end with -<environment>, for example, "assume-application-support-staging" and "assume-infra-support-production".

Alarms and monitoring

Documented as part of the Run Book on Confluence, see https://mhclgdigital.atlassian.net/wiki/spaces/DT/pages/3375129/Run+Book.