Security
When you build systems on AWS infrastructure, security responsibilities are shared
between you and AWS. This shared model
IAM roles
This solution creates IAM roles to control and isolate permissions, following the best practice of least privilege. The solution grants services the following permissions:
Hub template
RegisterSpokeAccountsFunctionLambdaRole
-
Write permission to Amazon DynamoDB table where spoke accounts are registered
InvokeECSTaskRole
-
Permission to create and run Amazon ECS tasks
CostOptimizerAdminRole
-
Read permissions to an Amazon DynamoDB table where spoke accounts are registered
-
Assume role permissions to
WorkspacesManagementRole
in spoke accounts -
Read only permissions to AWS Directory Service
-
Write permissions to Amazon CloudWatch Logs
-
Write permissions to Amazon S3
-
Read and write permissions to WorkSpaces
SolutionHelperRole
-
Permisison to invoke an AWS Lambda function to generate a universally unique identifier (UUID) for solution metrics
Spoke template
WorkSpacesManagementRole
-
Read only permissions to AWS Directory Service
-
Write permissions to Amazon CloudWatch Logs
-
Write permissions to Amazon S3
-
Read/write permissions to WorkSpaces
AccountRegistrationProviderRole
-
Invoke Lambda function to register spoke account with hub account stack