AWS recently introduced Resource Control Policies (RCPs), enhancing their tools for access management and cloud security. RCPs allow organizations to centrally enforce data perimeters across their AWS environment, improving control over resource access.
However, organizations should approach RCP implementation with caution.
What are AWS resource control policies?
Managing access to multiple resources at scale can be complex. Identifying overexposed resources within a large AWS environment requires considerable manual effort, as does maintaining the remediation of these overexposures.
RCPs are a new type of authorization policy managed within AWS Organizations. They allow administrators to set maximum available permissions on resources across the entire organization, effectively creating persistent access guardrails.
RCPs complement the existing Service Control Policies (SCPs) but operate independently, focusing on resource-level access rather than principal-level permissions.
Key features and benefits
- Centralized management: RCPs can be applied at the root, Organizational Unit (OU), or individual account level, allowing for granular control and consistent policy enforcement across multiple AWS accounts.
- Enhanced security: By restricting access to resources at scale, RCPs help establish a controlled data perimeter, reducing the risk of unauthorized access or data breaches. However, use RCPs with caution, as managing multiple RCPs can be difficult as they increase in number.
- Supported services: Currently, RCPs support five critical AWS services: Amazon Simple Storage Service (S3), AWS Security Token Service (STS), AWS Key Management Service (KMS), Amazon Simple Queue Service (SQS), and AWS Secrets Manager. They currently do not support RDS, Dynamo DB, other AWS databases, data warehouses, or data lakes.
- Cost-effective: There are no additional charges for enabling and using RCPs, making it an accessible security enhancement for organizations of all sizes.
Use cases and examples
- Preventing public access: RCPs can be used to implement a 'deny-first' model, preventing accidental public exposure of sensitive resources like S3 buckets, while allowing exceptions for intentionally public-facing resources.
- Enforcing organizational boundaries: Administrators can create policies that deny access to all identities and services outside their AWS organization, with specific exceptions as needed.
- Encryption enforcement: RCPs can ensure that all data stored in S3 buckets is encrypted at rest or in transit, maintaining a high standard of data protection.
Implementation and best practices
To get started with RCPs, follow these steps:
- Enable the feature in the AWS Organizations console under the "Policies" section
- Create custom RCPs tailored to your organization's security requirements
- Attach RCPs to the desired organizational entities (root, OUs, or accounts)
- Test thoroughly in isolated environments before applying at scale
It is important to understand that RCPs, similar to SCPs, serve as permission boundaries and cannot grant additional permissions, they are limited to restricting or denying actions. Maintaining oversight of multiple RCPs is essential to ensure that any permissions that might be restricted are anticipated.
Summary
Resource Control Policies (RCPs) represent a notable development in AWS's security offerings. By providing a centralized method to control resource access across an entire organization, RCPs address a critical gap in cloud security.
However, implementing RCPs can present certain challenges. Organizations must ensure that their policies are thoroughly tested in isolated environments to avoid unintended disruptions. Additionally, maintaining oversight of multiple RCPs can be complex and requires careful planning to anticipate and address any restricted permissions.
As the AWS ecosystem evolves, further enhancements and broader service support for RCPs are expected, reinforcing their role as an important component of an AWS security strategy. However, organizations should approach RCP implementation with caution.
Reduce your risk without taking any.
Having a comprehensive view of your AWS environment's security posture and access permissions, including the scope of RCPs, is crucial to using them effectively. Varonis for AWS provides visibility into these aspects and much more.
Get started with a free risk assessment. Our assessment takes minutes to set up and delivers immediate value, providing you a clear, risk-based view of the data that matters most and a clear path to automated remediation.
What should I do now?
Below are three ways you can continue your journey to reduce data risk at your company:
Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.
See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.
Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.