You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am trying to set up a comprehensive solution around ABAC for our development teams. One big thing is ensuring that we identify IAM policies that allow too many permissions. However, those ABAC permissions typically look like "Allow reading S3 buckets and objects where the bucket has a tag like MyTag = MyValue." Actual example from AWS:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
I am trying to set up a comprehensive solution around ABAC for our development teams. One big thing is ensuring that we identify IAM policies that allow too many permissions. However, those ABAC permissions typically look like "Allow reading S3 buckets and objects where the bucket has a tag like MyTag = MyValue." Actual example from AWS:
Does KICS audit for condition strings? Does anybody have any suggestions for effectively auditing these?
Beta Was this translation helpful? Give feedback.
All reactions