September 22, 2023

A free open source tool for managing AccessDenied Events in AWS has been introduced by Ermetic that automates time consuming cloud access policy troubleshooting and correction.

Access Undenied on AWS analyzes  AWS CloudTrail AccessDenied events, scans the environment to identify and explain the reasons for the events, and offers actionable least-privilege remediation suggestions.

Access Undenied on AWS addresses some of the Access Denied challenges encountered by DevOps and security teams on a daily basis not limited to below mentioned events

AccessDenied messages still do not provide details. Among the services for which some, or even many, messages are lacking in detail are: S3, IAM, STS, CloudWatch, EFS, DynamoDB, Redshift, Opensearch and ACM.

When the reason for AccessDenied is an explicit deny, users can have difficulty tracking down the specific policy and statement that generated the explicit deny. Specifically, if it’s an explicit deny in a service control policy, it is difficult to find and assess every single policy in the organization that applies to the account.

When the problem is a missing allow statement, it can still be challenging to create the least-privilege policy that allows the desired access without granting excessive permissions.

Access Undenied on AWS is available now and supports policies for many resources and some of the most common condition keys. This open source project is also soliciting input from the community through contributions of new issues in the repository.

Leave a Reply

%d bloggers like this: