OpsWorks Security
In this, we will learn the basics of OpsWorks Security.
- IAM lists credentials to access resources.
- OpsWorks Stacks integrates with IAM
- IAM can control
- How users can interact with OpsWorks Stacks.
- How OpsWorks Stacks can act on your behalf to access stack resources like EC2 or S3
- How under OpsWorks Stacks can access other AWS resources
- Managing user-based SSH keys
- How to use SSH or RDP to connect to instances.
- updating instances’ operating system
- configure EC2 security groups to control network traffic to and from instances.
- specify custom security groups
User Permissions
- Attach IAM AWSOpsWorksFullAccess policy to every
IAM user, to handle OpsWorks Stacks permissions
- But, it will allow user to perform every OpsWorks Stacks action on every stack.
- Hence, restrict OpsWorks Stacks users to a specified actions or resources.
- Control AWS OpsWorks Stacks user permissions by
- using the AWS OpsWorks Stacks Permissions page
- by attaching an appropriate IAM policy.
- Using the Permissions page, to control
- Who can access each stack.
- Which actions each user is allowed to perform on each stack.
- Who can manage each stack.
- Who has user-level SSH access and sudo privileges (Linux) or RDP access and administrator privileges (Windows) on each stack’s Amazon EC2 instances.
Sample for managing user permissions assuming an administrative user.
- Use IAM console to attach AWSOpsWorksFullAccess policies to administrative users.
- Create an IAM user for each nonadministrative user with a policy that grants no AWS OpsWorks Stacks permissions.
- If a user requires access only to AWS OpsWorks Stacks, you might not need to attach a policy at all. You can instead manage their permissions with the AWS OpsWorks Stacks Permissions page.
- Use the AWS OpsWorks Stacks Users page to import the nonadministrative users into AWS OpsWorks Stacks.
- For each stack, use the stack’s Permissions page to assign a permission level to each user.
- As needed, customize users’ permission levels by attaching an appropriately configured IAM policy.
Regular AWS OpsWorks Stacks Users
- Regular users don’t require an attached policy.
- Use OpsWorks Stacks Permissions page to assign
permissions levels to regular users on a stack-by-stack basis.
- Show permissions to view the stack, but not perform any operations.
- Deploy permissions allow users to deploy and update apps.
- Manage permissions allow users to perform stack management like adding layers or instances, use the Permissions page to set user permissions, and enable their own SSH/RDP and sudo/admin privileges.
- Deny permissions deny access to the stack.
To create the IAM User:
- Access the IAM console at https://console.aws.amazon.com/iam/
- Select Users in navigation pane, and then click Add user.
- Type a user name. In Select AWS access type area, select Programmatic access, and then choose Next: Permissions.
- On the Set permissions page, choose Attach existing policies directly.
- Enter OpsWorks in the Policy type filter box to display the AWS OpsWorks policies
- Select AWSOpsWorksFullAccess, and then choose Next: review.
Security Updates
To update online instances.
- Create and start new instances. Then delete the current instances.
- On Linux-based instances in Chef 11.10 or older stacks, run the Update Dependencies stack command
Security Groups
- Every EC2 instance has one or more associated security groups
- Security groups govern instance’s network traffic, like firewall.
- A security group has one or more rules, for traffic
and includes
- The type of allowed traffic, such as SSH or HTTP
- The traffic’s protocol, such as TCP or UDP
- The IP address range that the traffic can originate from
- The traffic’s allowed port range
- Two types of rules:
- Inbound rules govern inbound network traffic.
- Outbound rules govern outbound network traffic.
AWS Certified DevOps Engineer Free Practice TestTake a Quiz