This image has an empty alt attribute; its file name is cpIyQ5AgpOquJfixKFjsvLF3ySKVi9JYmPVqZodzTAQljU6hZt5xn9p64F74W1AmOUDNfk5LOaIEzRi5as4aaZZf9JLK_9Alb_-OtWNvRlHDxmTovgxkamPnvkXzD9q5JpHJy-fl
Last Updated01 March 2022
Document Tagtch-research-next-gen-authz
Authorsimonm@thecyberhut.com
Part of Research ProductNext Generation Authorization Technology

Amazon Web Services (AWS) provides a range of identity and security services – some of which can be applied to the authorization area.

Their own categorization lists 25 native Amazon products in the “Security, Identity and Compliance” area.

For those which AWS places into the Identity & Access Management category, we can reduce that list to the following:

Use CaseAWS Service
Securely manage access to services and resourcesAWS Identity & Access Management (IAM)
Cloud single-sign-on (SSO) serviceAWS Single Sign-On
Identity management for your appsAmazon Cognito
Managed Microsoft Active DirectoryAWS Directory Service
Simple, secure service to share AWS resourcesAWS Resource Access Manager
Central governance and management across AWS accountsAWS Organizations

Some additional services that may impact both data and application authorization services could include the following:

Use CaseAWS Service
Analyze application securityAmazon Inspector
Track user activity and API usageAWS CloudTrail
Discover and protect your sensitive data at scaleAmazon Macie
Continuously audit your AWS usage to simplify how you assess risk and complianceWS Audit Manager

Across all 25 Security, Identity and Compliance AWS services, updates are periodic and can be counted as per the following:

YearNumber of Total Updates (link to update list)
202215
2021133
2020148
2019103


There have been approximately 40 updates specifically on identity and access management related capabilities since 2019.

The following are interesting from an authorization related context:

DateFeatureDetails
Dec 2019Introduction of IAM Access AnalyzerAWS Identity and Access Management (IAM) Access Analyzer is a new feature that makes it simple for security teams and administrators to check that their policies provide only the intended access to resources. Resource policies allow customers to granularly control who is able to access a specific resource and how they are able to use it across the entire cloud environment. 
Dec 2019Access Analyzer for S3 BucketsAccess Analyzer for S3 is a new feature that monitors your access policies, ensuring that the policies provide only the intended access to your S3 resources. Access Analyzer for S3 evaluates your bucket access policies and enables you to discover and swiftly remediate buckets with potentially unintended access.
Nov 2019Simplify Employee ABACAWS Identity and Access Management (IAM) enables you to use your employees’ existing identity attributes such as cost center and department from your directory to create fine-grained permissions in AWS. Your administrators can use these employee attributes in AWS to implement attribute-based access control to AWS resources and simplify permissions management at scale.  
Nov 2019Improved IAM Sharing Based on OrganizationsAWS Identity and Access Management (IAM) enables you to use your employees’ existing identity attributes such as cost center and department from your directory to create fine-grained permissions in AWS. Your administrators can use these employee attributes in AWS to implement attribute-based access control to AWS resources and simplify permissions management at scale. 
June 2019Access Adviser Ability to Set PermissionsAWS Identity and Access Management (IAM) access advisor uses data analysis to help you set permission guardrails confidently by providing service last accessed information for your accounts, organizational units (OUs), and your organization managed by AWS Organizations.
May 2019Set Fine Grained Session PermissionsAWS Security Token Service (STS) now enables you to specify IAM managed policies as session policies to create fine-grained session permissions when a user assumes a role in AWS to create a session. With this launch, you have up to 10 full-sized policies to choose from that enable you to define more fine-grained session permissions.
March 2019Enable Fine Grained Permissions for Service Control Policies You can use Service Control Policies (SCPs) to set permission guardrails with the fine-grained controls used in AWS Identity and Access Management (IAM) policies. This makes it easier to meet the specific requirements of your organization’s governance rules. 

Categories:

Signup for New Content Updates