@DMEdwards
Why does AWS charge for some of the services that help users keep their accounts secure? Surely this would be something that AWS wants for all customers.
I'm about to turn off one of them across my personal accounts for cost savings.
@DMEdwards
Why does AWS charge for some of the services that help users keep their accounts secure? Surely this would be something that AWS wants for all customers.
I'm about to turn off one of them across my personal accounts for cost savings.
@DMEdwards
heh. That's another challenge with the security services at AWS. It feels like there are a number of closely related services that all do similar things, and I can't keep them straight in my brain.
I went into my bill again and I can't remember if it was AWS GuardDuty, or AWS Detective, or if I was thinking about the fact that AWS Trusted Advisor only shows some checks to accounts with paid support plans.
@DMEdwards
Found it! AWS SecurityHub is costing me over $60/year, and I couldn't tell you what it does off the top of my head.
@DMEdwards
So I'm paying for an AWS service that is designed to help overcome usage issues with other AWS services. It kind of makes sense given how AWS teams are organized and run, but as a customer it's a bit frustrating.
Note: This may be coming across as an attack, but I'm a huge fan of AWS. I'm just open with sharing about areas where I get confused and where I see see room for improvement. Sometimes those things get improved.
@DMEdwards
I currently sign in to AWS with an IAM user that has no permissions except to assume (cross-account) roles, all of which require MFA.
Should I switch to a different method of authenticating myself within AWS? Is there something newly released that I should take a deeper look at for this?
@esh In general, IAM Identity Center is the future of workforce identity (human access to AWS accounts). A large part of the reason for that is that most customers benefit from having multiple AWS accounts grouped into an AWS Organization. For details on why a multi-account strategy is often the right way to go (plus information on how to organize it), I recommend looking at the multi-account strategy whitepaper:
Using multiple AWS accounts to help isolate and manage your business applications and data can help you optimize across most of the AWS Well-Architected Framework pillars including operational excellence, security, reliability, and cost optimization. This paper provides best practices for organizing your overall AWS environment. The extent to which you use these best practices depends on your stage of the cloud adoption journey and your specific business needs.
@DMEdwards
I'm sold in the multi-account approach. I have 41 accounts in my personal AWS Organization. I create a new one for each project or exploration.
Each account has an "admin" role, and my IAM user has permission to assume "admin" in any account.
@DMEdwards
Is it true that IAM Identity Center requires me to create a directory of some sort (e.g., Active Directory, Cognito User Pool)?
That seems overkill for a single user, or even a handful of users.
Are there intrinsic benefits of Identity Center that can be weighed against the extra cost, complexity, and risk?
@esh Not any more - IAM Identity Center now has its own identity store as one of the three options (Active Directory or a SAML-based Identity Provider are the other two).
With 41 accounts, it sounds like Identity Center would greatly simplify administration. It's a zero-cost service and works alongside whatever you have set up in IAM, so you might consider looking at it.
Here's a good primer video:
@DMEdwards
Let me know when office hours are over 🙂
Is the "IAM Identity Center delegated administrator account" different from the "delegated admin account for AWS Account Management"?
I'm a fan of the aws-cli and documenting what I do for repeatability, so I'm trying to see if I can designate a delegated account in the CLI.
(Every minute I spend trying to figure out things like this is one minute closer to giving up trying to use Identity Center for the day.)
@DMEdwards
Links to the two things I'm comparing:
https://docs.aws.amazon.com/singlesignon/latest/userguide/delegated-admin.html
vs
https://docs.aws.amazon.com/accounts/latest/reference/using-orgs-delegated-admin.html
Delegated administration provides a convenient way for assigned users in a registered member account to perform most IAM Identity Center administrative tasks. When you enable IAM Identity Center, your IAM Identity Center instance is created in the management account in AWS Organizations by default. This was originally designed this way so that IAM Identity Center can provision, de-provision, and update roles across all your organization's member accounts. Even though your IAM Identity Center instance must always reside in the management account, you can choose to delegate administration of IAM Identity Center to a member account in AWS Organizations, thereby extending the ability to manage IAM Identity Center from outside the management account.
@DMEdwards
Of course. You are also welcome to simply go live life and reply two days later. This is async.
Maybe we can get you into the AWS Heroes slack.
@jader Rate limiting per IP can be done through Rate-Based Rules in AWS Web Application Firewalls (WAF) which can be associated with Cloudfront distributions. There is a cost for using AWS WAF, so you will need to weigh that cost against the potential cost of excessive website use.
https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-rate-based.html