-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable security login best practices for AWS login #298
Comments
2FA is now enforced on all accounts with a change I made a few weeks ago. As long as we use our predefined roles that have the policy to enforce set. I think what we need to do is define some roles we want to support and then apply policies to them that match our definition of those roles. I'm not sure how to configure time limited credentials in an automated way but until we figure that out maybe we can review the list of folks who have access on a regular basis. Presumably folks who need access would be attending the weekly sync-up meetings. So maybe we can set a policy that says if these folks haven't joined a weekly sync up meeting for x weeks or months then we will disable their IAM account. |
@jeanschmidt mentioned on the call we should define a few Outside of this we will likely want to grant Folks who need to run Terraform will need |
Looks like creating access policy based on a time range is possible with AWS IAM https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_aws-dates.html |
The goal of this Pull Request is to create an access policy that the PyTorch CI Infra team can enforce and grant access to community contributors whom require access to the PyTorch Foundation's AWS Account. Closes: #298 Signed-off-by: Thanh Ha <thanh.ha@linuxfoundation.org>
The goal of this Pull Request is to create an access policy that the PyTorch CI Infra team can enforce and grant access to community contributors whom require access to the PyTorch Foundation's AWS Account. Issue: #298 Signed-off-by: Thanh Ha <thanh.ha@linuxfoundation.org> Co-authored-by: Zain Rizvi <ZainRizvi@users.noreply.github.com>
Merged the document but we still need to actually implement the policies in the document so keeping this issue open. |
Problem
Currently the AWS account used by LF has a fixed set of users with permanent access. This poses two challenges:
Desired solution
We need a way to secure the Linux Foundation AWS account in a way that offers the following features
Ideally the credential duration and roles/permissions would be configurable so that they're easy to edit as our needs evolve.
The text was updated successfully, but these errors were encountered: